mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-04-11T22:00:20.204673+00:00
This commit is contained in:
parent
2674218d0d
commit
fe1c375d27
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T22:15:06.933",
|
||||
"lastModified": "2024-11-21T08:09:26.477",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-11T20:20:35.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.5.1",
|
||||
"matchCriteriaId": "035634CB-8529-410A-9D86-B0DDE1048D2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ek-Saini/security/blob/main/CSRF-Bagisto",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ek-Saini/security/blob/main/CSRF-Bagisto",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27499",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T16:15:46.597",
|
||||
"lastModified": "2024-11-21T09:04:40.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-11T20:08:14.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webkul:bagisto:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10E1B58E-9A7F-41BA-965C-552477A0A10A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bagisto/bagisto/pull/9474",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ek-Saini/security/blob/main/xss-bagisto-v1.5.1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bagisto/bagisto/pull/9474",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29918",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-27T08:15:38.530",
|
||||
"lastModified": "2024-11-21T09:08:37.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-11T20:23:06.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ays-pro:survey_maker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.0.7",
|
||||
"matchCriteriaId": "17D67194-85B2-4244-89B0-085A9771C67C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/survey-maker/wordpress-survey-maker-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/survey-maker/wordpress-survey-maker-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26647",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:48.510",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"lastModified": "2025-04-11T20:15:17.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2725",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.097",
|
||||
"lastModified": "2025-03-31T09:15:15.100",
|
||||
"lastModified": "2025-04-11T20:15:22.937",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this vulnerability is an unknown functionality of the file /api/login/auth of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability classified as critical was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this vulnerability is an unknown functionality of the file /api/login/auth of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -141,6 +141,14 @@
|
||||
"url": "https://vuldb.com/?submit.520390",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZIKH26/CVE-information/blob/master/H3C/Vulnerability%20Information_1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2726",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.280",
|
||||
"lastModified": "2025-03-31T09:15:15.310",
|
||||
"lastModified": "2025-04-11T20:15:23.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this issue is some unknown functionality of the file /api/esps of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this issue is some unknown functionality of the file /api/esps of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520393",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2727",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.450",
|
||||
"lastModified": "2025-03-31T09:15:15.490",
|
||||
"lastModified": "2025-04-11T20:15:23.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520394",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2728",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.627",
|
||||
"lastModified": "2025-03-31T09:15:15.680",
|
||||
"lastModified": "2025-04-11T20:15:23.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in H3C Magic NX30 Pro and Magic NX400 up to V100R014 and classified as critical. This vulnerability affects unknown code of the file /api/wizard/getNetworkConf. The manipulation leads to command injection. The attack needs to be approached within the local network."
|
||||
"value": "A vulnerability has been found in H3C Magic NX30 Pro and Magic NX400 up to V100R014 and classified as critical. This vulnerability affects unknown code of the file /api/wizard/getNetworkConf. The manipulation leads to command injection. The attack needs to be approached within the local network. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520462",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2729",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.800",
|
||||
"lastModified": "2025-03-31T09:15:15.863",
|
||||
"lastModified": "2025-04-11T20:15:23.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014 and classified as critical. This issue affects some unknown processing of the file /api/wizard/networkSetup of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014 and classified as critical. This issue affects some unknown processing of the file /api/wizard/networkSetup of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520494",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2730",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T03:15:16.973",
|
||||
"lastModified": "2025-03-31T09:15:16.050",
|
||||
"lastModified": "2025-04-11T20:15:23.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been classified as critical. Affected is an unknown function of the file /api/wizard/getssidname of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been classified as critical. Affected is an unknown function of the file /api/wizard/getssidname of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -140,6 +140,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520495",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2731",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T04:15:18.943",
|
||||
"lastModified": "2025-03-31T09:15:16.233",
|
||||
"lastModified": "2025-04-11T20:15:23.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/wizard/getDualbandSync of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/wizard/getDualbandSync of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -141,6 +141,14 @@
|
||||
"url": "https://vuldb.com/?submit.520497",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-2732",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-25T04:15:20.793",
|
||||
"lastModified": "2025-03-31T09:15:16.413",
|
||||
"lastModified": "2025-04-11T20:15:23.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/wizard/getWifiNeighbour of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/wizard/getWifiNeighbour of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -141,6 +141,14 @@
|
||||
"url": "https://vuldb.com/?submit.520499",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zhiliao.h3c.com/theme/details/229784",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_4.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29088",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-10T14:15:27.163",
|
||||
"lastModified": "2025-04-11T15:39:52.920",
|
||||
"lastModified": "2025-04-11T20:15:21.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en sqlite v.3.49.0 permite que un atacante provoque una denegaci\u00f3n de servicio a trav\u00e9s del componente SQLITE_DBCONFIG_LOOKASIDE"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-32071",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-04-11T17:15:43.710",
|
||||
"lastModified": "2025-04-11T17:15:43.710",
|
||||
"lastModified": "2025-04-11T20:15:24.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -77,6 +77,10 @@
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T389369",
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T389369",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
45
README.md
45
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-11T20:00:20.581972+00:00
|
||||
2025-04-11T22:00:20.204673+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-11T19:52:02.980000+00:00
|
||||
2025-04-11T20:23:06.703000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,37 +38,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-11679](CVE-2024/CVE-2024-116xx/CVE-2024-11679.json) (`2025-04-11T19:15:41.030`)
|
||||
- [CVE-2025-0119](CVE-2025/CVE-2025-01xx/CVE-2025-0119.json) (`2025-04-11T18:15:38.463`)
|
||||
- [CVE-2025-0123](CVE-2025/CVE-2025-01xx/CVE-2025-0123.json) (`2025-04-11T18:15:38.610`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `20`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2014-3211](CVE-2014/CVE-2014-32xx/CVE-2014-3211.json) (`2025-04-11T19:52:02.980`)
|
||||
- [CVE-2022-45963](CVE-2022/CVE-2022-459xx/CVE-2022-45963.json) (`2025-04-11T19:15:40.527`)
|
||||
- [CVE-2022-46763](CVE-2022/CVE-2022-467xx/CVE-2022-46763.json) (`2025-04-11T19:15:40.793`)
|
||||
- [CVE-2023-42977](CVE-2023/CVE-2023-429xx/CVE-2023-42977.json) (`2025-04-11T18:15:38.293`)
|
||||
- [CVE-2024-13939](CVE-2024/CVE-2024-139xx/CVE-2024-13939.json) (`2025-04-11T18:10:56.160`)
|
||||
- [CVE-2024-23558](CVE-2024/CVE-2024-235xx/CVE-2024-23558.json) (`2025-04-11T18:14:35.020`)
|
||||
- [CVE-2024-23560](CVE-2024/CVE-2024-235xx/CVE-2024-23560.json) (`2025-04-11T18:25:49.067`)
|
||||
- [CVE-2024-23561](CVE-2024/CVE-2024-235xx/CVE-2024-23561.json) (`2025-04-11T18:16:41.917`)
|
||||
- [CVE-2024-57547](CVE-2024/CVE-2024-575xx/CVE-2024-57547.json) (`2025-04-11T19:09:56.007`)
|
||||
- [CVE-2024-57548](CVE-2024/CVE-2024-575xx/CVE-2024-57548.json) (`2025-04-11T19:06:19.687`)
|
||||
- [CVE-2024-57549](CVE-2024/CVE-2024-575xx/CVE-2024-57549.json) (`2025-04-11T19:04:01.007`)
|
||||
- [CVE-2025-1164](CVE-2025/CVE-2025-11xx/CVE-2025-1164.json) (`2025-04-11T18:33:09.940`)
|
||||
- [CVE-2025-1381](CVE-2025/CVE-2025-13xx/CVE-2025-1381.json) (`2025-04-11T18:38:03.400`)
|
||||
- [CVE-2025-25187](CVE-2025/CVE-2025-251xx/CVE-2025-25187.json) (`2025-04-11T18:56:36.240`)
|
||||
- [CVE-2025-25877](CVE-2025/CVE-2025-258xx/CVE-2025-25877.json) (`2025-04-11T19:16:30.683`)
|
||||
- [CVE-2025-27417](CVE-2025/CVE-2025-274xx/CVE-2025-27417.json) (`2025-04-11T19:11:56.647`)
|
||||
- [CVE-2025-30067](CVE-2025/CVE-2025-300xx/CVE-2025-30067.json) (`2025-04-11T18:06:34.633`)
|
||||
- [CVE-2025-32075](CVE-2025/CVE-2025-320xx/CVE-2025-32075.json) (`2025-04-11T18:15:39.860`)
|
||||
- [CVE-2025-32366](CVE-2025/CVE-2025-323xx/CVE-2025-32366.json) (`2025-04-11T18:15:39.950`)
|
||||
- [CVE-2025-32367](CVE-2025/CVE-2025-323xx/CVE-2025-32367.json) (`2025-04-11T18:15:40.117`)
|
||||
- [CVE-2023-36237](CVE-2023/CVE-2023-362xx/CVE-2023-36237.json) (`2025-04-11T20:20:35.777`)
|
||||
- [CVE-2024-27499](CVE-2024/CVE-2024-274xx/CVE-2024-27499.json) (`2025-04-11T20:08:14.407`)
|
||||
- [CVE-2024-29918](CVE-2024/CVE-2024-299xx/CVE-2024-29918.json) (`2025-04-11T20:23:06.703`)
|
||||
- [CVE-2025-26647](CVE-2025/CVE-2025-266xx/CVE-2025-26647.json) (`2025-04-11T20:15:17.143`)
|
||||
- [CVE-2025-2725](CVE-2025/CVE-2025-27xx/CVE-2025-2725.json) (`2025-04-11T20:15:22.937`)
|
||||
- [CVE-2025-2726](CVE-2025/CVE-2025-27xx/CVE-2025-2726.json) (`2025-04-11T20:15:23.087`)
|
||||
- [CVE-2025-2727](CVE-2025/CVE-2025-27xx/CVE-2025-2727.json) (`2025-04-11T20:15:23.200`)
|
||||
- [CVE-2025-2728](CVE-2025/CVE-2025-27xx/CVE-2025-2728.json) (`2025-04-11T20:15:23.313`)
|
||||
- [CVE-2025-2729](CVE-2025/CVE-2025-27xx/CVE-2025-2729.json) (`2025-04-11T20:15:23.433`)
|
||||
- [CVE-2025-2730](CVE-2025/CVE-2025-27xx/CVE-2025-2730.json) (`2025-04-11T20:15:23.557`)
|
||||
- [CVE-2025-2731](CVE-2025/CVE-2025-27xx/CVE-2025-2731.json) (`2025-04-11T20:15:23.677`)
|
||||
- [CVE-2025-2732](CVE-2025/CVE-2025-27xx/CVE-2025-2732.json) (`2025-04-11T20:15:23.793`)
|
||||
- [CVE-2025-29088](CVE-2025/CVE-2025-290xx/CVE-2025-29088.json) (`2025-04-11T20:15:21.553`)
|
||||
- [CVE-2025-32071](CVE-2025/CVE-2025-320xx/CVE-2025-32071.json) (`2025-04-11T20:15:24.093`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
74
_state.csv
74
_state.csv
@ -67418,7 +67418,7 @@ CVE-2014-3207,0,0,6eee022dc6aa3cf273433d3ef4d000994b8195ef9e24886151d9d0ebb7f14b
|
||||
CVE-2014-3208,0,0,53dd8d74c4f0196290f740c658d6a850ce717371cf43bf49863c41e3600e330b,2024-11-21T02:07:41.307000
|
||||
CVE-2014-3209,0,0,605846fb22bc63e4f7386739e6e954d8ff6bf24e563c277e860afda6b2a27d9f,2024-11-21T02:07:41.450000
|
||||
CVE-2014-3210,0,0,1c316b910ef34f7ad8d4166fe4e6641730e0273c529bd9318f086be64eb56c9f,2024-11-21T02:07:41.560000
|
||||
CVE-2014-3211,0,1,5e1e9dda64c9e11885511748f70b0a6d1160fe57a0a9df5829226e25bb8dec63,2025-04-11T19:52:02.980000
|
||||
CVE-2014-3211,0,0,5e1e9dda64c9e11885511748f70b0a6d1160fe57a0a9df5829226e25bb8dec63,2025-04-11T19:52:02.980000
|
||||
CVE-2014-3214,0,0,407cc65692e9dc8e2cdde2648ad47e9607beb0df63641677511146546aefb36f,2024-11-21T02:07:41.840000
|
||||
CVE-2014-3215,0,0,86302e452bbf543eabfc213c720c07eca42a94c94d69b015655ca797fd13130c,2024-11-21T02:07:41.980000
|
||||
CVE-2014-3216,0,0,b052abfee8018ec1d5f4c58c23f4130fd7572d19e7f21ebbeada5dedbd8b99cf,2024-11-21T02:07:42.140000
|
||||
@ -210984,7 +210984,7 @@ CVE-2022-45956,0,0,8e9f5c00ceef59acec81137e7bc64348869dd735f814cce0c7487a3483ea6
|
||||
CVE-2022-45957,0,0,83d82ac3c27398aa12e2a84c70565621193c5d8e50f5d7191ff980e9e9a49a9e,2024-11-21T07:30:00.860000
|
||||
CVE-2022-4596,0,0,2facbbb5033343acd7d130ddd502d8e3502507f42b123e910904af2d70ae7792,2024-11-21T07:35:34
|
||||
CVE-2022-45962,0,0,9e317c143a8dd1af1df7a4add121500559514484f16aa4c4255a83fa62ec060c,2025-03-21T19:15:40.127000
|
||||
CVE-2022-45963,0,1,27a3744e362a9000ed52828cd2470c6cc0a249be92e5f5a6e4d064c42e4b3582,2025-04-11T19:15:40.527000
|
||||
CVE-2022-45963,0,0,27a3744e362a9000ed52828cd2470c6cc0a249be92e5f5a6e4d064c42e4b3582,2025-04-11T19:15:40.527000
|
||||
CVE-2022-45966,0,0,042f8a18f0e40225a7208d16c577f4f3be7204a992095c362cdbc97fa08a87be,2024-11-21T07:30:01.377000
|
||||
CVE-2022-45968,0,0,2f19e4c0b4c444860c43a696ebbdf6899ce0abc3a3d3db408c80d23ba348af0a,2024-11-21T07:30:01.600000
|
||||
CVE-2022-45969,0,0,9754aec046352a0f5084efcf3033a6a67b29098b63365b6cec24419c67820c21,2024-11-21T07:30:01.773000
|
||||
@ -211549,7 +211549,7 @@ CVE-2022-46756,0,0,507a6cbc9395275d8a2bd477712445229e76f628e8aa646749fc9a1805b3e
|
||||
CVE-2022-4676,0,0,0122dd8105abe151c00e3532031db922c52b9d89e8aee0ef20df9dfcc2e08696,2025-01-09T20:15:28.163000
|
||||
CVE-2022-46761,0,0,2d3576a29f0dbffb0a6ab05575954d958cc9450459c2b24b41668a433b8596db,2025-04-09T21:15:43.293000
|
||||
CVE-2022-46762,0,0,77a63d9ec3534d8ef7efa19682f5892a0063fff5be11549166cae96a8a20fccc,2025-04-09T21:15:43.477000
|
||||
CVE-2022-46763,0,1,44671ff2e6efc2ca05e587ee41d7526383a6c4984d5cb9e14528fd4c48eb705c,2025-04-11T19:15:40.793000
|
||||
CVE-2022-46763,0,0,44671ff2e6efc2ca05e587ee41d7526383a6c4984d5cb9e14528fd4c48eb705c,2025-04-11T19:15:40.793000
|
||||
CVE-2022-46764,0,0,3330719ef91a4f325ecc6f99ed3decd3e455a6fd2f6f6c74857bfec858931877,2025-04-11T17:15:38.437000
|
||||
CVE-2022-46768,0,0,eec52bf3a3be25e49b571453603288d392184cf83b8336813af0028f804f080a,2024-11-21T07:31:01.430000
|
||||
CVE-2022-46769,0,0,b54b9a4ac279a697f4a2f420eb93d6a07ecd7c64e95c29459c38619028446212,2025-04-09T20:15:22.957000
|
||||
@ -228904,7 +228904,7 @@ CVE-2023-3623,0,0,58f6fbc2dac7804d2f6ad4649270cd072940718c8efc97f423d912b5674a06
|
||||
CVE-2023-36234,0,0,371f1a9fe6d1b1dc16b9d1ea10ea114e7eb692627ec7f646d52589df5fbb33fc,2024-11-21T08:09:26.010000
|
||||
CVE-2023-36235,0,0,56fa8a6f0b0f2b4f0219461a84aee903f6020ec4f89b7326ea4f56a42f7e81c5,2024-11-21T08:09:26.153000
|
||||
CVE-2023-36236,0,0,ed892a5be5cd89045bf58519030585ee3526284778a1f01ad439665801e2d638,2024-11-21T08:09:26.313000
|
||||
CVE-2023-36237,0,0,3b19a0825ac20e847bef8eee8971f88e11c1ab3ed2e6b12464ecfd5301c813b9,2024-11-21T08:09:26.477000
|
||||
CVE-2023-36237,0,1,66f4fa284ac8cd77d5adf7806a99441b2c7c7fb7455a5b3f41d46f4424732243,2025-04-11T20:20:35.777000
|
||||
CVE-2023-36238,0,0,6855edc7b830b38c07ef599563cbb5b398131b27fb716584864c8ef11cb4cd5f,2024-12-04T21:15:19.377000
|
||||
CVE-2023-36239,0,0,f9d13b68c05b1055dba1062750873e061858f8074fa25ddf4d3138bb3886ad07,2024-11-21T08:09:26.837000
|
||||
CVE-2023-3624,0,0,2025944c7157b8cf2d838f068ccc1caf2355db6b7eabc04395d11fb3bbfef051,2024-11-21T08:17:41.887000
|
||||
@ -234400,7 +234400,7 @@ CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa6
|
||||
CVE-2023-42970,0,0,c243e3f30dbc477d5f0f1d4f0e82c12302a0ab4682221cbc6e86f420bad3d77f,2025-04-11T17:15:39.203000
|
||||
CVE-2023-42973,0,0,6f8afd3b5f822892be86e4577c83f01fdc0182e9cab221c010e6eb411f25200f,2025-04-11T16:15:18.637000
|
||||
CVE-2023-42974,0,0,d29cf4c12f6bfc30add86b56c7cddf36ff797f915e589c9ccb7d83e046515203,2024-12-12T14:26:18.893000
|
||||
CVE-2023-42977,0,1,3867d3a0133ce78ad57f1a69db4ea41853af8a9ca8a12a6c5dc7f21ed3fc46db,2025-04-11T18:15:38.293000
|
||||
CVE-2023-42977,0,0,3867d3a0133ce78ad57f1a69db4ea41853af8a9ca8a12a6c5dc7f21ed3fc46db,2025-04-11T18:15:38.293000
|
||||
CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000
|
||||
CVE-2023-42981,0,0,5632568fc7ce776d92367ab7b0fd3c015fc2f697dbf872ecbb01bb0793b26467,2025-04-11T16:15:18.770000
|
||||
CVE-2023-42982,0,0,8ca26c2c5f466a6a389cc550395a0b87eaf5f9d0507d76e29de2ce7a846c8379,2025-04-11T15:39:52.920000
|
||||
@ -246161,7 +246161,7 @@ CVE-2024-11675,0,0,3307440f3fbc1d0020addd10cbdefb08c2908e3f9d73aa5c6b8271db5c084
|
||||
CVE-2024-11676,0,0,fcf5d70b9ae975c1a7f068bd37af4b95546042ab6b688133671d0ee3a0794c78,2024-12-04T20:19:52.030000
|
||||
CVE-2024-11677,0,0,e54f262b29a170bcc5d5e14bcf8cefe92c998c263008d057514c86f0f18e3d8a,2024-12-04T20:33:13.023000
|
||||
CVE-2024-11678,0,0,7be8f96ddd54102217e8767d7cf1c2c97e393fb3d3cdf216618065fe375e69b2,2024-12-04T20:39:07.400000
|
||||
CVE-2024-11679,1,1,e8d7bb52ab0341a589001d777d6fd2176f287efd546028031f5c7902225e3c8d,2025-04-11T19:15:41.030000
|
||||
CVE-2024-11679,0,0,e8d7bb52ab0341a589001d777d6fd2176f287efd546028031f5c7902225e3c8d,2025-04-11T19:15:41.030000
|
||||
CVE-2024-1168,0,0,361fc3dacab1a6af3309993965ec9d946bde5b152da006d3137d0cea2c78645f,2024-11-21T08:49:57.020000
|
||||
CVE-2024-11680,0,0,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000
|
||||
CVE-2024-11681,0,0,07ce852e1f481465e000f807ac541fdf042292c0a090d70151a0f51d3eced91e,2025-01-07T16:15:32.097000
|
||||
@ -248381,7 +248381,7 @@ CVE-2024-13923,0,0,a528ee5b51622639984378ce5c82c5f3996bc4ee38135a9723b678cb2485b
|
||||
CVE-2024-13924,0,0,6771f2a575eb9b234ba437c9c60a2d5807f8aded376287df6e1ca4c3782207e4,2025-03-12T16:23:39.567000
|
||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
CVE-2024-13933,0,0,6c1d1592227807572b59c7607e13d58cd1b568936f1ec0b9bb42956c7610a4b0,2025-03-19T12:15:14.003000
|
||||
CVE-2024-13939,0,1,921141b59fb64caa413d175858785c8fecf23c4615e123e5aadc58ca56a65359,2025-04-11T18:10:56.160000
|
||||
CVE-2024-13939,0,0,921141b59fb64caa413d175858785c8fecf23c4615e123e5aadc58ca56a65359,2025-04-11T18:10:56.160000
|
||||
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
|
||||
CVE-2024-13941,0,0,0e25bcf0e89aef7755747b9909dd645785f611fc278474cc9d9d76a6dfcf2986,2025-04-02T14:58:07.527000
|
||||
CVE-2024-1395,0,0,ed536711b27a260dcabc83b13b40c152f8095e7ae0057538c9212759790c4e88,2025-03-27T17:07:28.860000
|
||||
@ -251898,10 +251898,10 @@ CVE-2024-23553,0,0,893e4a3bf0c3ee0e3a2c17db0be0e2a4b1c471e41ab84ce66926c848ad25d
|
||||
CVE-2024-23554,0,0,81b0b72a2352823a834acb899e311e2f788759cf13938a2baa140a0e861ba76a,2024-11-21T08:57:55.827000
|
||||
CVE-2024-23556,0,0,7656149cddaf292b84b4311cd6bf20293dcae98b0d68f40cf412e7f04e653158,2024-11-21T08:57:55.960000
|
||||
CVE-2024-23557,0,0,5f576a0975acd9d49b4eb45eb908f49641841cbfe7b8ddd6b3a2f5d0779c894c,2024-11-21T08:57:56.077000
|
||||
CVE-2024-23558,0,1,2806bb49d3a62264c6b3ac9e875f4e198f47ece86ad27efae5a05a4e13f599a1,2025-04-11T18:14:35.020000
|
||||
CVE-2024-23558,0,0,2806bb49d3a62264c6b3ac9e875f4e198f47ece86ad27efae5a05a4e13f599a1,2025-04-11T18:14:35.020000
|
||||
CVE-2024-23559,0,0,f8f9340406e5c0d14ab863fb06f30a10abb3c85c250e6f903bb3890d0f9ebd5b,2025-04-11T14:33:49.160000
|
||||
CVE-2024-23560,0,1,454be0a4383608d331dbd3561a812b25ef68c513000332fe224069809f07747f,2025-04-11T18:25:49.067000
|
||||
CVE-2024-23561,0,1,8cab3763ae915579c0fab73f1a83c4d04fc935c917374982a19abe3f9ff5d81f,2025-04-11T18:16:41.917000
|
||||
CVE-2024-23560,0,0,454be0a4383608d331dbd3561a812b25ef68c513000332fe224069809f07747f,2025-04-11T18:25:49.067000
|
||||
CVE-2024-23561,0,0,8cab3763ae915579c0fab73f1a83c4d04fc935c917374982a19abe3f9ff5d81f,2025-04-11T18:16:41.917000
|
||||
CVE-2024-23562,0,0,3bb828292c209fcec85e3a252b2fea62176f8c8bb9b39bd91c753893070ca596,2024-11-21T08:57:56.743000
|
||||
CVE-2024-23563,0,0,f9e9926719c593ac853dee4b0e48a00a8157c3f26978ae9e180340425e960cb5,2025-02-12T14:15:30.317000
|
||||
CVE-2024-2357,0,0,9db9e2d982cc7f87c4deab786615d4c2491074f7901aaf72f0e7eb4e46dabe0a,2024-11-21T09:09:35.103000
|
||||
@ -254985,7 +254985,7 @@ CVE-2024-27488,0,0,5320e2fdfc5da3ad09c401d0637f295f862172d42e9a14aa4b307c0ce61bc
|
||||
CVE-2024-27489,0,0,5336dca041954d1e26e4b3d0955394288c5270412febd061bddb236f9fc7126f,2025-03-27T16:15:23.117000
|
||||
CVE-2024-2749,0,0,f7099dff410859e56bea7c08e1757e94d389a4f8afbe4d8034eaaf9a5811203d,2024-11-21T09:10:25.843000
|
||||
CVE-2024-27497,0,0,62f599a501b5cf4655f3ce984b75800709d12bba5ed8533f5e10f5fa43687f31,2024-11-21T09:04:40.573000
|
||||
CVE-2024-27499,0,0,6ebf2413af9b8161e7bc930acfe2f9e91308d15314e4c0178aadceb1a45b0b78,2024-11-21T09:04:40.793000
|
||||
CVE-2024-27499,0,1,aff8399d997e8300117ba4dd5debedc8467698b2abf7cffa6e1a46591c5be175,2025-04-11T20:08:14.407000
|
||||
CVE-2024-2750,0,0,7a22bbbb3a616bb457587b001fe4c1da677362ec1b983db201c6134fde3c5544,2025-01-21T20:43:58.117000
|
||||
CVE-2024-27507,0,0,14230983f8b7c5b4991386618175ccf29a0bcb5a8c4231dfa55ab7be6d0ec71d,2024-11-21T09:04:41.003000
|
||||
CVE-2024-27508,0,0,01dd0be44ff9b2d2b7bffbdc4bf1608e07f98eb2f01050faeab4938cdacaab40,2024-11-21T09:04:41.233000
|
||||
@ -256624,7 +256624,7 @@ CVE-2024-29914,0,0,7c5531720064523c200888ff21e4ecd129aa835bc9d9b4bbb5043cd65c102
|
||||
CVE-2024-29915,0,0,17adab2f35455547d50732653773ba6585a2ab526f44bcd561def305ac4fdcc6,2025-03-19T19:37:19.997000
|
||||
CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c33d,2024-11-21T09:08:36.687000
|
||||
CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a035,2024-11-21T09:08:36.923000
|
||||
CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000
|
||||
CVE-2024-29918,0,1,465e83038d5efc5e68bff669035ad69e639783c581ad5c2b24a86725d5d719a7,2025-04-11T20:23:06.703000
|
||||
CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000
|
||||
CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000
|
||||
CVE-2024-29920,0,0,7aa0f3dfbd63856e985ea90881d8bae08070b8f3bc55a46d386dc5901809a0be,2025-01-27T15:20:38.483000
|
||||
@ -276919,9 +276919,9 @@ CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306
|
||||
CVE-2024-57544,0,0,0d7692301f68e1a54af26539095dbcdd0b4efd46060b39551d96338252e7c0b8,2025-01-22T22:15:09.613000
|
||||
CVE-2024-57545,0,0,920e5d8c212074216a1e84000536dbfa8a4a938f249df8348a02d6e14021f484,2025-01-22T22:15:09.790000
|
||||
CVE-2024-57546,0,0,ab132a817b627c329a57476e6f8a899b1211fb5342b65c187f65c86e89e83ebc,2025-01-28T20:15:55.203000
|
||||
CVE-2024-57547,0,1,8a6f220f5442d36379fa6287484d8c28cdbb6d2df21338d63915739665ff92d1,2025-04-11T19:09:56.007000
|
||||
CVE-2024-57548,0,1,e198541f9320f3d78dbba5d35fcf2bf6e52664e87bbc197937815705861cd0e7,2025-04-11T19:06:19.687000
|
||||
CVE-2024-57549,0,1,b0c2774d9899627cc5a5b885533212553b2b93df74f074f2ee03cc6ecde4b8d9,2025-04-11T19:04:01.007000
|
||||
CVE-2024-57547,0,0,8a6f220f5442d36379fa6287484d8c28cdbb6d2df21338d63915739665ff92d1,2025-04-11T19:09:56.007000
|
||||
CVE-2024-57548,0,0,e198541f9320f3d78dbba5d35fcf2bf6e52664e87bbc197937815705861cd0e7,2025-04-11T19:06:19.687000
|
||||
CVE-2024-57549,0,0,b0c2774d9899627cc5a5b885533212553b2b93df74f074f2ee03cc6ecde4b8d9,2025-04-11T19:04:01.007000
|
||||
CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000
|
||||
CVE-2024-57556,0,0,e8fd8911a1905d71db68021bd5a772f45ebb1af2144cb7a20bd64489988a9c84,2025-02-05T17:44:31.293000
|
||||
CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000
|
||||
@ -281250,11 +281250,11 @@ CVE-2025-0115,0,0,70d5d259a2d7e41a2d6bceeb38c6da10d06c8db3e3416ecd9846a5e23a387c
|
||||
CVE-2025-0116,0,0,755d3babec7a4fcd8fc3f5dd9f72be7aec497d243dc731232b3ce6e1fc0a553f,2025-03-18T00:15:12.860000
|
||||
CVE-2025-0117,0,0,c368ae59fb321c63f810db1cb0ec2feda0287727ba4def77cb7fd0f7f9859486,2025-03-12T19:15:37.883000
|
||||
CVE-2025-0118,0,0,2549278d26918d76bbeca0606d91920cad877d84c662cacbfb360849c8582ba7,2025-03-12T19:15:38.040000
|
||||
CVE-2025-0119,1,1,0a5b3ca28825fb5bc9c861106ce01ea2c5dd41e1f21f8a32e892b4cdbc879f48,2025-04-11T18:15:38.463000
|
||||
CVE-2025-0119,0,0,0a5b3ca28825fb5bc9c861106ce01ea2c5dd41e1f21f8a32e892b4cdbc879f48,2025-04-11T18:15:38.463000
|
||||
CVE-2025-0120,0,0,a71d3a1a4937cf377933679e94f42c26db7ae6a866f56967f3e6058c59f88b4c,2025-04-11T15:39:52.920000
|
||||
CVE-2025-0121,0,0,ab1b5f513492b32da52a345b509b42810605f75413b2320c976db919e45e2e95,2025-04-11T15:39:52.920000
|
||||
CVE-2025-0122,0,0,8a7047ba6772458fc769cae5828f4011d52f01fea8b67b5172f392f80be1dd9e,2025-04-11T15:39:52.920000
|
||||
CVE-2025-0123,1,1,666057a7e00feef9a82a83cc35b085da1e5361d48bfc9864afd6f2e9b0b54bee,2025-04-11T18:15:38.610000
|
||||
CVE-2025-0123,0,0,666057a7e00feef9a82a83cc35b085da1e5361d48bfc9864afd6f2e9b0b54bee,2025-04-11T18:15:38.610000
|
||||
CVE-2025-0124,0,0,e8e197ac1ff008b828a5380a9e0103c84e5c3ab32fd8d558caf3d218406b568b,2025-04-11T15:39:52.920000
|
||||
CVE-2025-0125,0,0,e554dff44f9688a52010db8440762a4a8d907276dd2745e071baf7624a2a0b91,2025-04-11T15:39:52.920000
|
||||
CVE-2025-0126,0,0,1b4453e3324d0750a93960a33294f4914c0302b059bcbcc71281d7c9d513d6bf,2025-04-11T15:39:52.920000
|
||||
@ -282004,7 +282004,7 @@ CVE-2025-1159,0,0,42f3fb3f1de6493c296780053e8d6b2a270c9ad85dbf5adc3df10913bd8c05
|
||||
CVE-2025-1160,0,0,c22737c03100e3e1df0fa435f29f02369b04953cfce1dbff34d3652ddb0572c4,2025-03-03T17:22:07.320000
|
||||
CVE-2025-1162,0,0,3b2bb2db7d54134892b769fb4423602d51c7e76dad09dbb88016ba5ca9824837,2025-02-18T18:15:30.347000
|
||||
CVE-2025-1163,0,0,f4e2973443b51d1be68e56b9561f367f31a89b968872bf1f42dc737aed17c0e9,2025-04-10T20:25:15.893000
|
||||
CVE-2025-1164,0,1,62ddb7b9fc10fb66796610a8e1844e4f7ab6f40df1e719e72ef4525c31add7b8,2025-04-11T18:33:09.940000
|
||||
CVE-2025-1164,0,0,62ddb7b9fc10fb66796610a8e1844e4f7ab6f40df1e719e72ef4525c31add7b8,2025-04-11T18:33:09.940000
|
||||
CVE-2025-1165,0,0,34dfe20c3add5e7f1a3c3253370e0b994562b1e78bd746b6a2ced4fa7e32b226,2025-02-18T18:15:30.530000
|
||||
CVE-2025-1166,0,0,2551325d90b5014a31736076b9c3b3dc593b187738d6a97309fc2c2a1bf24153,2025-02-18T18:15:30.743000
|
||||
CVE-2025-1167,0,0,2d3866f5641bb3d5b1eecb2f44d6b7f1da7ec111493e479f26cb5c3d7c480a69,2025-02-18T18:15:30.940000
|
||||
@ -282153,7 +282153,7 @@ CVE-2025-1377,0,0,19be1f82dafea985fb389f6935710bf6fb3889bba10c10bc1ad76bf361c5c3
|
||||
CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89d0,2025-02-17T06:15:13.277000
|
||||
CVE-2025-1379,0,0,5dcb3165f40d5545ed4ce19a6009cd3b7b7246346d15ef8a292528f915f8199d,2025-04-02T18:44:42.610000
|
||||
CVE-2025-1380,0,0,6bd04dd2008ea0079e8919e2e53c4972b6e83c3f4c56a4b8715e29739c2e265b,2025-04-02T19:01:09.913000
|
||||
CVE-2025-1381,0,1,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000
|
||||
CVE-2025-1381,0,0,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000
|
||||
CVE-2025-1382,0,0,f394f1bf08f0724fd105e399ff64ae7d15c16e18835cf062e0212ba4779b9249,2025-03-10T14:15:24.567000
|
||||
CVE-2025-1383,0,0,c9fb1a308be655ba73427b329ae1663f0ab56dcb4706e7cabab9a87230c6ae97,2025-03-19T20:47:28.020000
|
||||
CVE-2025-1385,0,0,cd0488ff01f383d9bed7e9dfcd438a68752b6f1d05d46ab0fe46ec06da7cead8,2025-03-20T08:15:11.723000
|
||||
@ -286049,7 +286049,7 @@ CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197
|
||||
CVE-2025-25184,0,0,2da8803a7b31a0463a88b6351bc585e918c07913590e0cf3e756bba1e93f2c10,2025-02-14T20:15:34.350000
|
||||
CVE-2025-25185,0,0,c8c4d7e6195c01462e561bb86641e48ff6d1c60670e8947883ec1f9d28a5a115,2025-03-07T20:43:41.007000
|
||||
CVE-2025-25186,0,0,c422218bc2b3a51bb7e35622bef2d3f79367445faa61fc891c243b951694bb43,2025-02-10T16:15:39.457000
|
||||
CVE-2025-25187,0,1,167f2f4b4bb5f674fa2e70d40df7a37004997cc3b8ffb43662e19608ece85e34,2025-04-11T18:56:36.240000
|
||||
CVE-2025-25187,0,0,167f2f4b4bb5f674fa2e70d40df7a37004997cc3b8ffb43662e19608ece85e34,2025-04-11T18:56:36.240000
|
||||
CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000
|
||||
CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aaac8,2025-02-11T16:15:52.313000
|
||||
CVE-2025-2519,0,0,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8da,2025-04-08T18:13:53.347000
|
||||
@ -286336,7 +286336,7 @@ CVE-2025-25872,0,0,a1ce986ae169baff711c70ebbd9e97b8c0823edac8b237dcc222449ee1faf
|
||||
CVE-2025-25873,0,0,52f0b0fe47a6c903b315867b8fcda35065195dc9e1b89f1502bbfd355b9d7ad9,2025-04-03T15:33:34.413000
|
||||
CVE-2025-25875,0,0,9acf5cc735d561c1314bdf8635f048faf010b61295cc762e39c399905b6fd444,2025-03-28T18:45:23.490000
|
||||
CVE-2025-25876,0,0,0d2421bb753cbe546ba829188f8bfa531c37468f3258baccbf7586ec9030dbf0,2025-03-28T18:45:41.700000
|
||||
CVE-2025-25877,0,1,b3fd28504a0e23ce488c969c1a770588e81ceea52f1510cebe0216471b910165,2025-04-11T19:16:30.683000
|
||||
CVE-2025-25877,0,0,b3fd28504a0e23ce488c969c1a770588e81ceea52f1510cebe0216471b910165,2025-04-11T19:16:30.683000
|
||||
CVE-2025-25878,0,0,6519a71ab63564b6276964f38d2df55cc8a3b38cf7b7d9f7eefea118ea1f4db2,2025-04-07T15:04:19.923000
|
||||
CVE-2025-2588,0,0,d844470cc65fc917dbe3080c736f24f654bd0f9a0f72c4511ecaabe70c9ff9bd,2025-04-01T20:24:28.240000
|
||||
CVE-2025-2589,0,0,b0246e27a1e75f3f77953e42dedba24e52cce0a41a13f01e0f165b00ff48a119,2025-04-01T20:23:54.560000
|
||||
@ -286695,7 +286695,7 @@ CVE-2025-26642,0,0,5e07a7f3f0d7f59f4e8c3ebaba862bbbdc274682741fc9b4dea1af99cbd3f
|
||||
CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000
|
||||
CVE-2025-26644,0,0,d546b9cd8d76e65a2da3522c0f23294e576c82b7978f0e7b900a75777d3c3ce5,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26645,0,0,c81d070a14a19f5aa832e5ee1c6a2271fc8ee18e21d17ccbca0820999b902cec,2025-03-11T17:16:44.200000
|
||||
CVE-2025-26647,0,0,62a98c58840a94676fcb335138b6f49474217d87e02394d83af61ed2baa4e1be,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26647,0,1,a969aeac86e0d83877e3a4e36488cecea8d6224c9ae4896f9c62c674b8b77632,2025-04-11T20:15:17.143000
|
||||
CVE-2025-26648,0,0,7a7377ef9f275ce530cd7def9c3a65d6410252ceeffaba3ff68a21c329843654,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26649,0,0,04595695627b5120538ce950e07f092f10ab794cc9d968513110bb2ba2652af8,2025-04-09T20:03:01.577000
|
||||
CVE-2025-2665,0,0,374db404c8969e7c1a917201d9c10b42061053e18c1f29851f060f01a96376d4,2025-03-23T22:15:13.340000
|
||||
@ -287064,13 +287064,13 @@ CVE-2025-27221,0,0,bd575e135810e32dc670f036e8c3abfa23275c9e4b932c5ac7961776f844f
|
||||
CVE-2025-2723,0,0,33219c456b6b543ae3e06cc1d92a1fbf673804c48ab14f5fe326a9768e4e03ae,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2724,0,0,a1e858381d122e680ca5e3a58ec5dd1478b56716ff45316fb532144f509919a7,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27244,0,0,4873cd4e6e99981686c6769d52c2425f4f8eaea9674a2855c6aaae272af1de80,2025-04-02T14:58:07.527000
|
||||
CVE-2025-2725,0,0,8493193c7f39b885388ed9b0ff47b8dd06da01b59393056e2e37dd9c994eb6a7,2025-03-31T09:15:15.100000
|
||||
CVE-2025-2725,0,1,4c49041f815970a2f0962172abde8e9b997e751be7cfde55bbadd432ffae1641,2025-04-11T20:15:22.937000
|
||||
CVE-2025-27253,0,0,e6fd345c99af7ee03f79cb7784a5ae2d7ed62bc20a94544c634faa9f6cea75f1,2025-03-12T11:15:41.127000
|
||||
CVE-2025-27254,0,0,1326449cb688d3d742c54aa7c26671bc1a30e863cdbd3bd942083e3395c678b9,2025-03-12T12:15:14.767000
|
||||
CVE-2025-27255,0,0,e778f08cf23683afc5d4a9e46aba9493b6f8173a4bc86a191d0135a1893c7fc7,2025-03-12T12:15:14.907000
|
||||
CVE-2025-27256,0,0,faa5f1c45cf1df7eaa32fc86b6cec46d0d1a169c24ab8cf8bd8a3126393a2add,2025-03-12T12:15:15.047000
|
||||
CVE-2025-27257,0,0,35c5381be4b8261e4f71266ede8fcd92d8a42ce97885652c7e62cfebbc1b8ddf,2025-03-12T12:15:15.187000
|
||||
CVE-2025-2726,0,0,f147c6e10ca10544fe649517b4d6262a02eb5d5ba4c767090f842f717d4fbb52,2025-03-31T09:15:15.310000
|
||||
CVE-2025-2726,0,1,9cfc0fcc043bfda05f579a7e6f6f984b284a2a8cc8a7109cf633c337996e62e5,2025-04-11T20:15:23.087000
|
||||
CVE-2025-27263,0,0,0d6473ce6be397da70ae29bc260e636ca3c6169d6fa59d6f77401b8f5578c5c3,2025-03-03T14:15:57.980000
|
||||
CVE-2025-27264,0,0,57766bee671a71e603c6190f5ecce6b6ab03f589b571849a06d4f3626124f857,2025-03-03T14:15:58.123000
|
||||
CVE-2025-27265,0,0,064ce13be3b2caa339c06df0a9bbd275da3bf393870e4191cf15429558044c93,2025-02-24T15:15:14.310000
|
||||
@ -287078,7 +287078,7 @@ CVE-2025-27266,0,0,0b43dda3510df1a6caf90e315ec8e9c1ba742b051a50a212ca0413260e311
|
||||
CVE-2025-27267,0,0,b251e57285365e6c21adac68301ddf91bd0ab6df7c5e5415376ebaccde85dc8c,2025-03-27T16:45:27.850000
|
||||
CVE-2025-27268,0,0,3174702840ac51701223fd78f030265fdecc7c2ffadea0a55057ef38d207fc0b,2025-03-03T14:15:58.260000
|
||||
CVE-2025-27269,0,0,cda17c6a54559232936df28b8cf7711d2616fcb290267724b2af86f894a9aa65,2025-03-03T14:15:58.403000
|
||||
CVE-2025-2727,0,0,11554ec0fffd55bc2dd7afdc20b1f292bb8b67f660bba8ecc232cbc92c25a250,2025-03-31T09:15:15.490000
|
||||
CVE-2025-2727,0,1,97da4eee74bb9542b647c8216898c5de52d6ab5bbc73c6de6d1608b71658fb01,2025-04-11T20:15:23.200000
|
||||
CVE-2025-27270,0,0,4345f1c1b15678a4b2ef9a6d3d453e7a5c46137ca8899ccd2e842d25a097e4f6,2025-03-03T14:15:58.540000
|
||||
CVE-2025-27271,0,0,e3c2645210f856dd2bf72e6ed4222c53429c06af30de0ffdb6eb0d99ebf0dc73,2025-03-03T14:15:58.677000
|
||||
CVE-2025-27272,0,0,031cb0c5a5ee5c0d99c125c8cfce6477a55151f9e350ba83c3bb825eb8b36e1c,2025-02-24T15:15:14.587000
|
||||
@ -287089,16 +287089,16 @@ CVE-2025-27276,0,0,38d755ee9b6acb225b7f449b7a5baa0e000c60dcb53715f6dc4116b6d4e4c
|
||||
CVE-2025-27277,0,0,1e3db72458897ceab2ba68afe91afc155436af173199d9b5d9a959fd815e4da9,2025-02-24T15:15:14.867000
|
||||
CVE-2025-27278,0,0,256de16b0bce0b2fd5dba8326d4ac9f106c7f7707f2dce3a3458f81de2f34615,2025-03-03T14:15:59.237000
|
||||
CVE-2025-27279,0,0,e02d4da30ee7c46005e2dd222aff84182ec72114143ea7720d0988b2b719c61c,2025-03-03T14:15:59.373000
|
||||
CVE-2025-2728,0,0,129a606898dab56981a749287751d884c106151ef066fcdcff980f482d9140ac,2025-03-31T09:15:15.680000
|
||||
CVE-2025-2728,0,1,c4108d420d85db5587e0dcf73439571eb7dcbb31ecfed883d872b2c28f87df29,2025-04-11T20:15:23.313000
|
||||
CVE-2025-27280,0,0,8676dde15db79bd7dff4cf239425e3f3d950b17aa3701d636d0a7bd0e166a35e,2025-02-24T15:15:15.007000
|
||||
CVE-2025-27281,0,0,9fdda88ecd2274c6eff1c09bae76e3a303f46955141b83096a7ba9176ec09e80,2025-03-15T22:15:15.697000
|
||||
CVE-2025-2729,0,0,1847656687e2689bd9cfe5ab6449307b60dfda6a980856d86ae6104ee3d81d71,2025-03-31T09:15:15.863000
|
||||
CVE-2025-2729,0,1,633dfa254e44c8067de3f0b5884c2812f55b08dcc7835e5d70f07a154269caf1,2025-04-11T20:15:23.433000
|
||||
CVE-2025-27290,0,0,aa628d5cea07d5d297c7ccfde23ff70de2a1958791da61d5415ca3597f031c14,2025-02-24T15:15:15.153000
|
||||
CVE-2025-27294,0,0,c0b6fc5af6ea72ce95deb09b1966be2a148292fc28e45c7d495dbcb943cd9ee4,2025-02-24T15:15:15.287000
|
||||
CVE-2025-27296,0,0,f7aed2bd994db7600652c28570e7742995619d861eb9e40b04a8a3c93de0a4f5,2025-02-24T15:15:15.423000
|
||||
CVE-2025-27297,0,0,95db9906477d52c2de1a8a456daf46e161b9abe5a8e730d3f29b26be2dd97704,2025-02-24T15:15:15.567000
|
||||
CVE-2025-27298,0,0,9960151b7da8df7d6db69029a962ee932aee7b76aba6ce4658ecfc21ab71df47,2025-02-24T15:15:15.703000
|
||||
CVE-2025-2730,0,0,6c445939bdc1d786069d314a503fe445b3d256653cc7a95c07f68fe6fd9045aa,2025-03-31T09:15:16.050000
|
||||
CVE-2025-2730,0,1,79dab41cf2c97130e14f30923b3ec0febfb05f98e79bf94ba6795796a409c7f6,2025-04-11T20:15:23.557000
|
||||
CVE-2025-27300,0,0,d66647b7f71200d1677535353b3d6824f3bc7339b0da601cd7547880b84dbd6f,2025-02-24T15:15:15.853000
|
||||
CVE-2025-27301,0,0,64f043779c78c2ed84c27b8523770671a1fb6421af68da8a432cb4c7bf0ebc7c,2025-02-24T15:15:15.983000
|
||||
CVE-2025-27303,0,0,a7a6d6c25ce6950b41fb76e8348a73edf41cf16dfbeb4a8d683f81caa1910109,2025-02-24T15:15:16.123000
|
||||
@ -287106,14 +287106,14 @@ CVE-2025-27304,0,0,9d2160199dafe840e771986f204c061835c7ed7add0f4ae4cf8c99555b7a3
|
||||
CVE-2025-27305,0,0,bf074d91fed5e21564acaf77c0028ab2d84637020401d70d2a04e7068101daf4,2025-02-24T15:15:16.387000
|
||||
CVE-2025-27306,0,0,80702ad22c275e37a0cbac8c8257049e2cc59528c7889d8099c083916777eab3,2025-02-24T15:15:16.523000
|
||||
CVE-2025-27307,0,0,51f2191ce96fb79adb3f67c48699c360eaca5adb32f81b1526864b04b25e65bf,2025-02-24T15:15:16.653000
|
||||
CVE-2025-2731,0,0,ece110fcd11dd9cec8b0d0f4d7609d34fc3e6003a46f01fd0c7b675a7273b218,2025-03-31T09:15:16.233000
|
||||
CVE-2025-2731,0,1,febe4920dde8cc8d5dd78bbc47bfecf52e8fafaf30d7b64cf83ef4c45b0dcf79,2025-04-11T20:15:23.677000
|
||||
CVE-2025-27311,0,0,887daf3ca5e659c3544c21201f804fbc1bf8b2cd8c00da7ecaf2899ee756ead7,2025-02-24T15:15:16.783000
|
||||
CVE-2025-27312,0,0,b581bf2145bb64186de8cfc506dddf34a2209eb697269956dc9c4e9722d7a127,2025-02-24T15:15:16.917000
|
||||
CVE-2025-27315,0,0,6e14eabdb3c0e89a0edb103c9452c91b7720a99d50fe2048c64c3b2ac69e2725,2025-02-24T15:15:17.047000
|
||||
CVE-2025-27316,0,0,78a664ed18e2a3f09c84cff8eafbb3e667c271b347b6c49cb4057c71b6fb2f84,2025-02-24T15:15:17.193000
|
||||
CVE-2025-27317,0,0,6890f6ed99867285ecccef44abce2bb31cd702302b365d74843fb1b631d8a7e0,2025-02-24T15:15:17.353000
|
||||
CVE-2025-27318,0,0,01062c1cc7b69a94a4b00c3bba687232094c6f37680977c56572c43c965cbcbe,2025-02-24T15:15:17.487000
|
||||
CVE-2025-2732,0,0,cea65fbf3b3c903adc48e36471a2834086c1b157d9c7e952bd80f2dc800bda02,2025-03-31T09:15:16.413000
|
||||
CVE-2025-2732,0,1,91eb64f3a8bcc02556b497e701ba65aee1eded4ed4ab5df1bac85e8bed0cb9b0,2025-04-11T20:15:23.793000
|
||||
CVE-2025-27320,0,0,8ddde046a5073fb57db51ac32c278ea72fd103a7b6698e137a1a5af8558b1579,2025-02-24T15:15:17.620000
|
||||
CVE-2025-27321,0,0,57e789f06d16f73e5a359b61adef9f6f0ec207245e4ca47b20a61f61292b4b5b,2025-02-24T15:15:17.753000
|
||||
CVE-2025-27323,0,0,6b3c8bfca9a52e8e86879d19ce880fdf9f7a54b902cbc68d3d2a6df3d91b39a9,2025-02-24T15:15:17.887000
|
||||
@ -287178,7 +287178,7 @@ CVE-2025-27413,0,0,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5
|
||||
CVE-2025-27414,0,0,929fb75122881174d77a5f272353ca474f8f31f3e2150b8f4eb15693c5e1bce0,2025-02-28T21:15:27.957000
|
||||
CVE-2025-27415,0,0,5c13e45a51ec2cff72537e412ce1ec86fb678a4cb1991d54966cfc60572ae3df,2025-03-19T19:15:47.257000
|
||||
CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193dd23,2025-03-01T01:15:28.857000
|
||||
CVE-2025-27417,0,1,ee1e3efde910e9007af830c9d06b9f6f19cd40389d408d386d8a1b099aea3181,2025-04-11T19:11:56.647000
|
||||
CVE-2025-27417,0,0,ee1e3efde910e9007af830c9d06b9f6f19cd40389d408d386d8a1b099aea3181,2025-04-11T19:11:56.647000
|
||||
CVE-2025-27418,0,0,ce03ffe0e1a6816def89a3cebbfeaee21b3c942d6de29fd04f2c3e58f1b4e2c0,2025-04-10T18:37:15.777000
|
||||
CVE-2025-27419,0,0,d7b7cf11d35eeb3fa0afbc8e178d471065b3eebc40c5e5d6f63fef0c0db9e934,2025-03-07T20:42:56.750000
|
||||
CVE-2025-2742,0,0,be494b2d3b5a09439fa21991cd6e1054e4944fa1b4fc88eed659469c0542a31a,2025-03-27T16:45:46.410000
|
||||
@ -287675,7 +287675,7 @@ CVE-2025-29072,0,0,fd95fded2fd85d3027eac83af76782f039ae97bbb9711a4bf20a00b195ae0
|
||||
CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29087,0,0,089a9780b1f166bd8c072181912d7d69f969a758f54ce8dafb3cbd6601949045,2025-04-08T18:13:53.347000
|
||||
CVE-2025-29088,0,0,3cfe39f489b2a5394aa60a8f18dd6be501eb14322fdae4a7d56cc960d8fada65,2025-04-11T15:39:52.920000
|
||||
CVE-2025-29088,0,1,7d5dacaf56422a7d5f1eb1761cfdbddb4f62a79eceaaf1e73ee2a7a26416b91d,2025-04-11T20:15:21.553000
|
||||
CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2910,0,0,63b1776a3174c1a360045ac9eb5899920566d03dfd18cf1878580a96741c5eb9,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29100,0,0,03e4a9cc3df0d3df440cd5953f31e0b258dcc8840a20f25006f01137c8594a87,2025-04-01T20:06:53.017000
|
||||
@ -287938,7 +287938,7 @@ CVE-2025-3005,0,0,83c2b2a70a550d4a6c8e1a1f6935b07d00d86944febad7db7be72bdebca42a
|
||||
CVE-2025-3006,0,0,b148bda232b4ae278c90e7cf899bdd3025264d8ea920cb3dfefd652f369302a0,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30065,0,0,3870ef7177281ff4f09a5255aee64701c3ef01d2b4a153660bfc98c0f9fbb36e,2025-04-02T22:15:19.823000
|
||||
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
|
||||
CVE-2025-30067,0,1,3843c785594bc5e1c732a61f3e083d60771e2437a750335f1f735e5b5e49877c,2025-04-11T18:06:34.633000
|
||||
CVE-2025-30067,0,0,3843c785594bc5e1c732a61f3e083d60771e2437a750335f1f735e5b5e49877c,2025-04-11T18:06:34.633000
|
||||
CVE-2025-3007,0,0,cf6ca44c81194e87c5d14f59676cf6026888c665f4ee2ec76e7e2ceff83021f0,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000
|
||||
@ -289166,11 +289166,11 @@ CVE-2025-32068,0,0,4b25bee8cfa1b17cdc184a6ffdb0b469a5a5f2fdae06d1826a8d204edaa3e
|
||||
CVE-2025-32069,0,0,f6f6f644ca48f6e312d261d0d8282ba16be7e1e8981e295649716c438a39416b,2025-04-11T17:15:43.460000
|
||||
CVE-2025-3207,0,0,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000
|
||||
CVE-2025-32070,0,0,cf4990b6b2efe9f09e8d4dd45f2c45ef0e58327a67b296820907fa6f68d1fbf6,2025-04-11T17:15:43.587000
|
||||
CVE-2025-32071,0,0,35b89b95ffbddb4e27e6e8637452e5c4ee0c6817e995485a3569a1448a012997,2025-04-11T17:15:43.710000
|
||||
CVE-2025-32071,0,1,c4267f64d60b4b8523ea363a3c02f197e3d36cdf8a0efabe04e3817e451a84f5,2025-04-11T20:15:24.093000
|
||||
CVE-2025-32072,0,0,d5a2194f941ee5719a0b57d707c4245ccc4a0eaac2fcbaa385acd455371d557d,2025-04-11T17:15:43.840000
|
||||
CVE-2025-32073,0,0,e331f31a023191333360553dcbac5456cd718ecb1b93e574c8bb5358091bbdfd,2025-04-11T17:15:43.973000
|
||||
CVE-2025-32074,0,0,c5f9e8906cb249df30925788bac19b423542d7b3f645b78dc73cc8f420f4bf9f,2025-04-11T17:15:44.097000
|
||||
CVE-2025-32075,0,1,b33fbef2a5462c99be0e5a8062e9442557119ec3245005284eeb7f16218d17d6,2025-04-11T18:15:39.860000
|
||||
CVE-2025-32075,0,0,b33fbef2a5462c99be0e5a8062e9442557119ec3245005284eeb7f16218d17d6,2025-04-11T18:15:39.860000
|
||||
CVE-2025-32076,0,0,68efb06ddaed46ef7688aa730ea02a1f725f375e641bedde194793053a5a06e5,2025-04-11T17:15:44.363000
|
||||
CVE-2025-32077,0,0,411348f5557a256087b3cdb415032e36f456c55a31c487a91fb2f4af718bbe86,2025-04-11T17:15:44.513000
|
||||
CVE-2025-32078,0,0,3ab2d10c6db26081e2bb789760bf7cc49b3691f82ee2e5dc7f73397e2584d13b,2025-04-11T17:15:44.683000
|
||||
@ -289365,8 +289365,8 @@ CVE-2025-3236,0,0,ef4d355000efef27b7fbfd93f6e2c4e4b8b82870080e3074b9ce7622d96bc4
|
||||
CVE-2025-32360,0,0,9b4631aa9212cd8ff436558b652207dfc563895faae222463ae0d243f1512315,2025-04-07T14:17:50.220000
|
||||
CVE-2025-32364,0,0,e894db5f7d73d7313223c296f4a47feb8ad50e78e5cf8ff87fc79232ef635220,2025-04-07T14:17:50.220000
|
||||
CVE-2025-32365,0,0,ade41b47e186b36ef3a8ffb90bcc36f39e4b9fcb4f5e42cad9936ea94190fde8,2025-04-07T14:17:50.220000
|
||||
CVE-2025-32366,0,1,2cb122d34d9646a6a43a36f2eb474f65496bd6cc784a6e4ac53a72eb6b15670f,2025-04-11T18:15:39.950000
|
||||
CVE-2025-32367,0,1,be8f17c16ec5be781415d13ccb8fb34086cbfd7ecda47a075999340e22fc7816,2025-04-11T18:15:40.117000
|
||||
CVE-2025-32366,0,0,2cb122d34d9646a6a43a36f2eb474f65496bd6cc784a6e4ac53a72eb6b15670f,2025-04-11T18:15:39.950000
|
||||
CVE-2025-32367,0,0,be8f17c16ec5be781415d13ccb8fb34086cbfd7ecda47a075999340e22fc7816,2025-04-11T18:15:40.117000
|
||||
CVE-2025-32369,0,0,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000
|
||||
CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32370,0,0,52539d7c5e40c96e3c6580caaac756c4f836d7993783b3dbdb4c110f6e19f5e4,2025-04-08T18:54:51.523000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user