mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2025-03-05T23:00:20.893617+00:00
This commit is contained in:
parent
7e5ea7c339
commit
00da308cc4
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33351",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T22:15:09.480",
|
||||
"lastModified": "2024-11-21T06:08:44.347",
|
||||
"lastModified": "2025-03-05T21:15:13.477",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33352",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T22:15:09.537",
|
||||
"lastModified": "2024-11-21T06:08:44.500",
|
||||
"lastModified": "2025-03-05T21:15:14.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47480",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-03-10T21:15:14.143",
|
||||
"lastModified": "2024-11-21T07:32:02.970",
|
||||
"lastModified": "2025-03-05T21:15:14.917",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47481",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-03-10T21:15:14.197",
|
||||
"lastModified": "2024-11-21T07:32:03.103",
|
||||
"lastModified": "2025-03-05T21:15:15.067",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47482",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-03-10T21:15:14.250",
|
||||
"lastModified": "2024-11-21T07:32:03.223",
|
||||
"lastModified": "2025-03-05T21:15:15.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47483",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-03-10T21:15:14.307",
|
||||
"lastModified": "2024-11-21T07:32:03.347",
|
||||
"lastModified": "2025-03-05T21:15:15.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49411",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:17.613",
|
||||
"lastModified": "2025-02-26T07:01:17.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T22:15:34.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bfq: Aseg\u00farese de que bfqg para el que estamos poniendo en cola las solicitudes est\u00e9 en l\u00ednea. Las BIOS en cola en el programador de E/S de BFQ se pueden asociar con un cgroup que ya estaba fuera de l\u00ednea. Esto puede provocar la inserci\u00f3n de este bfq_group en un \u00e1rbol de servicios. Pero este bfq_group se liberar\u00e1 tan pronto como se complete la \u00faltima bio asociada con \u00e9l, lo que genera problemas de use-after-free para los usuarios del \u00e1rbol de servicios. Solucione el problema asegur\u00e1ndose de que siempre operamos en bfq_group en l\u00ednea. Si el bfq_group asociado con la bio no est\u00e1 en l\u00ednea, elegimos el primer padre en l\u00ednea."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49489",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:25.083",
|
||||
"lastModified": "2025-02-26T07:01:25.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T22:15:34.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/disp/dpu1: establecer la configuraci\u00f3n de hardware de vbif en NULL para evitar su uso despu\u00e9s de liberar memoria durante la reanudaci\u00f3n del tiempo de ejecuci\u00f3n de pm ERROR: No se puede gestionar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual 006b6b6b6b6b6be3 Call trace: dpu_vbif_init_memtypes+0x40/0xb8 dpu_runtime_resume+0xcc/0x1c0 pm_generic_runtime_resume+0x30/0x44 __genpd_runtime_resume+0x68/0x7c genpd_runtime_resume+0x134/0x258 __rpm_callback+0x98/0x138 rpm_callback+0x30/0x88 rpm_resume+0x36c/0x49c __pm_runtime_resume+0x80/0xb0 dpu_core_irq_uninstall+0x30/0xb0 dpu_irq_uninstall+0x18/0x24 msm_drm_uninit+0xd8/0x16c Patchwork: https://patchwork.freedesktop.org/patch/483255/ [DB: fixed Fixes tag] "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/134760263f6441741db0b2970e7face6b34b6d1c",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49694",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:44.170",
|
||||
"lastModified": "2025-02-26T07:01:44.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T22:15:34.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: block: deshabilitar el elevador int del_gendisk El elevador solo se usa para solicitudes del sistema de archivos, que se detienen en del_gendisk. Mueva la desactivaci\u00f3n del elevador y la liberaci\u00f3n de las etiquetas del programador al final de del_gendisk en lugar de hacer ese trabajo en disk_release y blk_cleanup_queue para evitar un use-after-free en q->tag_set desde disk_release ya que tag_set podr\u00eda no estar activo en ese punto. Mueva tambi\u00e9n la llamada blk_qos_exit, ya que solo depende de la salida del elevador y ser\u00eda la \u00fanica raz\u00f3n para mantener la congelaci\u00f3n de la cola no exactamente barata en disk_release."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50e34d78815e474d410f342fbe783b18192ca518",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0030",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-08T23:15:10.963",
|
||||
"lastModified": "2024-11-21T07:36:25.820",
|
||||
"lastModified": "2025-03-05T21:15:15.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,13 +32,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,6 +68,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -115,6 +145,14 @@
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230413-0010/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1161",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-03-06T21:15:10.990",
|
||||
"lastModified": "2024-11-21T07:38:34.827",
|
||||
"lastModified": "2025-03-05T21:15:15.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20628",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-03-07T21:15:10.730",
|
||||
"lastModified": "2024-11-21T07:41:15.213",
|
||||
"lastModified": "2025-03-05T22:15:35.140",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20630",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-03-07T21:15:10.787",
|
||||
"lastModified": "2024-11-21T07:41:15.333",
|
||||
"lastModified": "2025-03-05T21:15:16.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -215,6 +245,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/bulletins/sb23-072",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20632",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-03-07T21:15:10.847",
|
||||
"lastModified": "2024-11-21T07:41:15.453",
|
||||
"lastModified": "2025-03-05T21:15:16.213",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -215,6 +245,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/bulletins/sb23-072",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T21:15:10.643",
|
||||
"lastModified": "2024-11-21T07:45:35.347",
|
||||
"lastModified": "2025-03-05T21:15:16.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T21:15:10.760",
|
||||
"lastModified": "2024-11-21T07:45:35.647",
|
||||
"lastModified": "2025-03-05T21:15:16.683",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-06T16:15:10.187",
|
||||
"lastModified": "2024-11-21T07:48:24.780",
|
||||
"lastModified": "2025-03-05T21:15:16.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25145",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2023-03-10T21:15:15.010",
|
||||
"lastModified": "2024-11-21T07:49:11.720",
|
||||
"lastModified": "2025-03-05T21:15:16.993",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25146",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2023-03-10T21:15:15.140",
|
||||
"lastModified": "2024-11-21T07:49:11.830",
|
||||
"lastModified": "2025-03-05T21:15:17.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25147",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2023-03-10T21:15:15.203",
|
||||
"lastModified": "2024-11-21T07:49:11.940",
|
||||
"lastModified": "2025-03-05T21:15:17.313",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25148",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2023-03-10T21:15:15.257",
|
||||
"lastModified": "2024-11-21T07:49:12.047",
|
||||
"lastModified": "2025-03-05T21:15:17.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26106",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-03-06T05:15:12.200",
|
||||
"lastModified": "2024-11-21T07:50:47.253",
|
||||
"lastModified": "2025-03-05T21:15:17.863",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26111",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-03-06T05:15:12.920",
|
||||
"lastModified": "2024-11-21T07:50:47.830",
|
||||
"lastModified": "2025-03-05T21:15:18.010",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50961",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-27T13:15:46.300",
|
||||
"lastModified": "2024-11-21T08:37:36.783",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-05T20:50:02.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,83 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275939",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7145262",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275939",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7145262",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-22T13:15:10.920",
|
||||
"lastModified": "2025-02-23T04:15:23.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-05T21:28:15.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpvivid:wpvivid_backup_\\&_migration:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "0.9.113",
|
||||
"matchCriteriaId": "12A92821-C7A2-4C53-97A1-C73DAE8D5D0E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/d0n601/CVE-2024-13869",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3242904/wpvivid-backuprestore",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ryankozak.com/posts/cve-2024-13869/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0082e46d-fdbe-4ab7-bba3-0681a25d4495?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27270",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-27T13:15:47.213",
|
||||
"lastModified": "2024-11-21T09:04:13.080",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-05T20:50:02.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
|
||||
"versionStartIncluding": "23.0.0.3",
|
||||
"versionEndExcluding": "24.0.0.4",
|
||||
"matchCriteriaId": "19AFD9C1-3BDA-415B-8F4E-9186494EDDCC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284576",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7145231",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284576",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7145231",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30177",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-27T11:15:47.413",
|
||||
"lastModified": "2024-11-21T09:11:22.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-05T20:50:02.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.9",
|
||||
"matchCriteriaId": "2D965130-2C9B-49DD-8583-1E55F54E5D7E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30232",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-03-26T12:15:50.610",
|
||||
"lastModified": "2024-11-21T09:11:30.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-05T20:50:02.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.0",
|
||||
"matchCriteriaId": "0A5BEBE2-AAB8-4961-BABF-BF281E597819"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45774",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-18T19:15:16.387",
|
||||
"lastModified": "2025-02-18T19:15:16.387",
|
||||
"lastModified": "2025-03-05T21:15:18.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337461",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-45779",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T15:15:14.660",
|
||||
"lastModified": "2025-03-03T15:15:14.660",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T21:15:19.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow flaw was found in the BFS file system driver in grub2. When reading a file with an indirect extent map, grub2 fails to validate the number of extent entries to be read. A crafted or corrupted BFS filesystem may cause an integer overflow during the file reading, leading to a heap of bounds read. As a consequence, sensitive data may be leaked, or grub2 will crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla de desbordamiento de enteros en el controlador del sistema de archivos BFS en grub2. Al leer un archivo con un mapa de extensi\u00f3n indirecto, grub2 no puede validar la cantidad de entradas de extensi\u00f3n que se leer\u00e1n. Un sistema de archivos BFS manipulado o da\u00f1ado puede causar un desbordamiento de enteros durante la lectura del archivo, lo que genera una gran cantidad de lecturas de los l\u00edmites. Como consecuencia, se pueden filtrar datos confidenciales o grub2 puede fallar."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345854",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-45780",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T15:15:14.950",
|
||||
"lastModified": "2025-03-03T15:15:14.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T21:15:19.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in grub2. When reading tar files, grub2 allocates an internal buffer for the file name. However, it fails to properly verify the allocation against possible integer overflows. It's possible to cause the allocation length to overflow with a crafted tar file, leading to a heap out-of-bounds write. This flaw eventually allows an attacker to circumvent secure boot protections."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en grub2. Al leer archivos tar, grub2 asigna un b\u00fafer interno para el nombre del archivo. Sin embargo, no verifica correctamente la asignaci\u00f3n contra posibles desbordamientos de n\u00fameros enteros. Es posible provocar que la longitud de la asignaci\u00f3n se desborde con un archivo tar manipulado, lo que lleva a una escritura fuera de los l\u00edmites en el mont\u00f3n. Esta falla finalmente permite a un atacante eludir las protecciones de arranque seguro."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345856",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53458",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T18:15:37.053",
|
||||
"lastModified": "2025-03-05T18:15:37.053",
|
||||
"lastModified": "2025-03-05T21:15:19.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,11 +11,50 @@
|
||||
"value": "Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/182468/Sysax-Multi-Server-6.99-SSH-Denial-Of-Service.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/182468",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-571xx/CVE-2024-57174.json
Normal file
25
CVE-2024/CVE-2024-571xx/CVE-2024-57174.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57174",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T21:15:19.410",
|
||||
"lastModified": "2025-03-05T21:15:19.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible to access sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chenzw.medium.com/internal-domain-names-f1cd2886c654",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/geo-chen/BSides-SG-2022---Internal-Domain-Names?tab=readme-ov-file#finding-1---cve-2024-57174-alphion-routers",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-58013",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T03:15:12.287",
|
||||
"lastModified": "2025-02-27T03:15:12.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T22:15:35.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: MGMT: Corregir lectura slab-use-after-free en mgmt_remove_adv_monitor_sync Esto corrige el siguiente fallo: ===================================================================== ERROR: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543 Read of size 8 at addr ffff88814128f898 by task kworker/u9:4/5961 CPU: 1 UID: 0 PID: 5961 Comm: kworker/u9:4 Not tainted 6.12.0-syzkaller-10684-gf1cd565ce577 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: hci0 hci_cmd_sync_work Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Allocated by task 16026: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4314 kmalloc_noprof include/linux/slab.h:901 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296 remove_adv_monitor+0x102/0x1b0 net/bluetooth/mgmt.c:5568 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:726 sock_write_iter+0x2d7/0x3f0 net/socket.c:1147 new_sync_write fs/read_write.c:586 [inline] vfs_write+0xaeb/0xd30 fs/read_write.c:679 ksys_write+0x18f/0x2b0 fs/read_write.c:731 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 16022: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2338 [inline] slab_free mm/slub.c:4598 [inline] kfree+0x196/0x420 mm/slub.c:4746 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259 __mgmt_power_off+0x183/0x430 net/bluetooth/mgmt.c:9550 hci_dev_close_sync+0x6c4/0x11c0 net/bluetooth/hci_sync.c:5208 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline] hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508 sock_do_ioctl+0x158/0x460 net/socket.c:1209 sock_ioctl+0x626/0x8e0 net/socket.c:1328 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl+0xf5/0x170 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0f3d05aacbfcf3584bbd9caaee34cb02508dab68",
|
||||
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2025-0689",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T15:15:16.147",
|
||||
"lastModified": "2025-03-03T15:15:16.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T21:15:19.503",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al leer datos del disco, el m\u00f3dulo de sistema de archivos UDF de grub utiliza los metadatos de longitud de datos controlados por el usuario para asignar sus b\u00faferes internos. En ciertos escenarios, al iterar a trav\u00e9s de los sectores del disco, asume que el tama\u00f1o de lectura del disco siempre es menor que el tama\u00f1o de b\u00fafer asignado, lo que no est\u00e1 garantizado. Una imagen de sistema de archivos manipulado puede provocar un desbordamiento de b\u00fafer basado en el mont\u00f3n que da como resultado la corrupci\u00f3n de datos cr\u00edticos, lo que genera el riesgo de ejecuci\u00f3n de c\u00f3digo arbitrario que pasa por alto las protecciones de arranque seguro."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346122",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0690",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-24T08:15:09.503",
|
||||
"lastModified": "2025-02-24T08:15:09.503",
|
||||
"lastModified": "2025-03-05T21:15:19.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346123",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0918",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-22T13:15:11.687",
|
||||
"lastModified": "2025-02-22T13:15:11.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-05T21:28:15.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,28 +69,71 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.4",
|
||||
"matchCriteriaId": "47DFF634-7BAD-4340-8435-31C67286B4D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3056461/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3234377/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/smtp-sendgrid/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0953",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-22T13:15:11.850",
|
||||
"lastModified": "2025-02-22T13:15:11.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-05T21:28:15.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,28 +69,71 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "95B58D8D-E4C5-41FD-9332-B0DDBB3DD4DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Functions.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Helper/Utils.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3234379/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/smtp-sendinblue/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ba65ac-e568-4c13-961d-6453f281d9fc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2025-1125",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T15:15:16.300",
|
||||
"lastModified": "2025-03-03T15:15:16.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-05T21:15:19.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al leer datos de un sistema de archivos hfs, el m\u00f3dulo hfs filesystem de grub utiliza par\u00e1metros controlados por el usuario de los metadatos del sistema de archivos para calcular el tama\u00f1o de los b\u00faferes internos, sin embargo, no comprueba correctamente si hay desbordamientos de n\u00fameros enteros. Un sistema de archivos manipulado con fines malintencionados puede provocar que algunos de esos c\u00e1lculos de tama\u00f1o de b\u00fafer se desborden, lo que hace que realice una operaci\u00f3n grub_malloc() con un tama\u00f1o menor al esperado. Como resultado, la funci\u00f3n hfsplus_open_compressed_real() escribir\u00e1 m\u00e1s all\u00e1 de la longitud del b\u00fafer interno. Esta falla puede aprovecharse para corromper los datos cr\u00edticos internos de grub y puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario que elude las protecciones de arranque seguro."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346138",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25362.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25362.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T21:15:19.803",
|
||||
"lastModified": "2025-03-05T21:15:19.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/explosion/spacy-llm/issues/492",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25632.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25632.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25632",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T21:15:19.890",
|
||||
"lastModified": "2025-03-05T21:15:19.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25634.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25634.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25634",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T21:15:19.980",
|
||||
"lastModified": "2025-03-05T21:15:19.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19GetParentControlInfo.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-275xx/CVE-2025-27508.json
Normal file
60
CVE-2025/CVE-2025-275xx/CVE-2025-27508.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27508",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-05T22:15:35.867",
|
||||
"lastModified": "2025-03-05T22:15:35.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/emissary/commit/da3a81a8977577597ff2a944820a5ae4e9762368",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-275xx/CVE-2025-27516.json
Normal file
82
CVE-2025/CVE-2025-275xx/CVE-2025-27516.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27516",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-05T21:15:20.073",
|
||||
"lastModified": "2025-03-05T21:15:20.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pallets/jinja/commit/90457bbf33b8662926ae65cdde4c4c32e756e403",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pallets/jinja/security/advisories/GHSA-cpwx-vrp4-4pq7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27643",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:35.847",
|
||||
"lastModified": "2025-03-05T06:15:35.847",
|
||||
"lastModified": "2025-03-05T21:15:20.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Hardcoded AWS API Key V-2024-006."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la clave API de AWS codificada de forma r\u00edgida V-2024-006."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27644",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:35.990",
|
||||
"lastModified": "2025-03-05T06:15:35.990",
|
||||
"lastModified": "2025-03-05T21:15:20.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Local Privilege Escalation V-2024-007."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la escalada de privilegios locales V-2024-007."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27645",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.117",
|
||||
"lastModified": "2025-03-05T06:15:36.117",
|
||||
"lastModified": "2025-03-05T21:15:20.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.933 Application 20.0.2368 allows Insecure Extension Installation by Trusting HTTP Permission Methods on the Server Side V-2024-005."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.933 La aplicaci\u00f3n 20.0.2368 permite la instalaci\u00f3n de extensiones inseguras al confiar en los m\u00e9todos de permisos HTTP en el lado del servidor V-2024-005."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27646",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.257",
|
||||
"lastModified": "2025-03-05T06:15:36.257",
|
||||
"lastModified": "2025-03-05T21:15:20.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Edit User Account Exposure V-2024-001."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite editar la exposici\u00f3n de cuentas de usuario V-2024-001."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27647",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.387",
|
||||
"lastModified": "2025-03-05T06:15:36.387",
|
||||
"lastModified": "2025-03-05T21:15:20.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Addition of Partial Admin Users Without Authentication V-2024-002."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite la adici\u00f3n de usuarios administradores parciales sin autenticaci\u00f3n V-2024-002."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27648",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.523",
|
||||
"lastModified": "2025-03-05T06:15:36.523",
|
||||
"lastModified": "2025-03-05T21:15:21.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Cross Tenant Password Exposure V-2024-003."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.913 La aplicaci\u00f3n 20.0.2253 permite la exposici\u00f3n de contrase\u00f1as entre inquilinos V-2024-003."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27649",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.667",
|
||||
"lastModified": "2025-03-05T06:15:36.667",
|
||||
"lastModified": "2025-03-05T21:15:21.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.893 Application 20.0.2140 allows Incorrect Access Control: PHP V-2023-016."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.893 La aplicaci\u00f3n 20.0.2140 permite un control de acceso incorrecto: PHP V-2023-016."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27650",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.817",
|
||||
"lastModified": "2025-03-05T06:15:36.817",
|
||||
"lastModified": "2025-03-05T21:15:21.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Private Keys in Docker Overlay V-2023-013."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite claves privadas en Docker Overlay V-2023-013."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:36.950",
|
||||
"lastModified": "2025-03-05T06:15:36.950",
|
||||
"lastModified": "2025-03-05T21:15:21.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: Elatec V-2023-014."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:37.077",
|
||||
"lastModified": "2025-03-05T06:15:37.077",
|
||||
"lastModified": "2025-03-05T21:15:21.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.862 La aplicaci\u00f3n 20.0.2014 permite Server-Side Request Forgery: rfIDEAS V-2023-015."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:38.840",
|
||||
"lastModified": "2025-03-05T06:15:38.840",
|
||||
"lastModified": "2025-03-05T21:15:21.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Antivirus Protection and thus drivers can have known malicious code OVE-20230524-0009."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una protecci\u00f3n antivirus insuficiente y, por lo tanto, los controladores pueden tener el c\u00f3digo malicioso conocido OVE-20230524-0009."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27666",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:38.970",
|
||||
"lastModified": "2025-03-05T06:15:38.970",
|
||||
"lastModified": "2025-03-05T21:15:22.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Authorization Checks OVE-20230524-0010."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite comprobaciones de autorizaci\u00f3n insuficientes OVE-20230524-0010."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27667",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:39.100",
|
||||
"lastModified": "2025-03-05T06:15:39.100",
|
||||
"lastModified": "2025-03-05T21:15:22.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Administrative User Email Enumeration OVE-20230524-0011."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la enumeraci\u00f3n de correo electr\u00f3nico de usuario administrativo OVE-20230524-0011."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27668",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:39.237",
|
||||
"lastModified": "2025-03-05T06:15:39.237",
|
||||
"lastModified": "2025-03-05T21:15:22.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la inclusi\u00f3n de contenido arbitrario a trav\u00e9s de Iframe OVE-20230524-0012."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27669",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:39.373",
|
||||
"lastModified": "2025-03-05T06:15:39.373",
|
||||
"lastModified": "2025-03-05T21:15:22.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Remote Network Scanning (XSPA)/DoS OVE-20230524-0013."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite escaneo de red remoto (XSPA)/DoS OVE-20230524-0013."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:39.537",
|
||||
"lastModified": "2025-03-05T06:15:39.537",
|
||||
"lastModified": "2025-03-05T21:15:22.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Signature Validation OVE-20230524-0014."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite una validaci\u00f3n de firma insuficiente OVE-20230524-0014."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27671",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:39.903",
|
||||
"lastModified": "2025-03-05T06:15:39.903",
|
||||
"lastModified": "2025-03-05T21:15:22.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Device Impersonation OVE-20230524-0015."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la suplantaci\u00f3n de dispositivo OVE-20230524-0015."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:40.043",
|
||||
"lastModified": "2025-03-05T06:15:40.043",
|
||||
"lastModified": "2025-03-05T21:15:22.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows OAUTH Security Bypass OVE-20230524-0016."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 22.0.843 La aplicaci\u00f3n 20.0.1923 permite la omisi\u00f3n de seguridad OAUTH OVE-20230524-0016."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:41.427",
|
||||
"lastModified": "2025-03-05T06:15:41.427",
|
||||
"lastModified": "2025-03-05T21:15:23.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Driver Unrestricted Upload of File with Dangerous Type V-2022-006."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la carga sin restricciones de archivos con el tipo peligroso V-2022-006."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:41.540",
|
||||
"lastModified": "2025-03-05T06:15:41.540",
|
||||
"lastModified": "2025-03-05T21:15:23.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Debug Bundle Contains Sensitive Data V-2022-003."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite la depuraci\u00f3n El paquete contiene datos confidenciales V-2022-003."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-215"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27685",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-05T06:15:41.663",
|
||||
"lastModified": "2025-03-05T06:15:41.663",
|
||||
"lastModified": "2025-03-05T21:15:23.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0.735 Application 20.0.1330 allows Configuration File Contains CA & Private Key V-2022-001."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vasion Print (anteriormente PrinterLogic) anterior a Virtual Appliance Host 1.0.735 La aplicaci\u00f3n 20.0.1330 permite el archivo de configuraci\u00f3n que contiene CA y clave privada V-2022-001."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm",
|
||||
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-05T21:00:20.119253+00:00
|
||||
2025-03-05T23:00:20.893617+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-05T20:50:02.120000+00:00
|
||||
2025-03-05T22:15:35.867000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284254
|
||||
284260
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-31525](CVE-2024/CVE-2024-315xx/CVE-2024-31525.json) (`2025-03-05T19:15:37.340`)
|
||||
- [CVE-2024-48246](CVE-2024/CVE-2024-482xx/CVE-2024-48246.json) (`2025-03-05T19:15:37.453`)
|
||||
- [CVE-2024-51144](CVE-2024/CVE-2024-511xx/CVE-2024-51144.json) (`2025-03-05T20:16:05.603`)
|
||||
- [CVE-2025-2003](CVE-2025/CVE-2025-20xx/CVE-2025-2003.json) (`2025-03-05T19:15:39.630`)
|
||||
- [CVE-2025-27513](CVE-2025/CVE-2025-275xx/CVE-2025-27513.json) (`2025-03-05T19:15:39.337`)
|
||||
- [CVE-2025-27515](CVE-2025/CVE-2025-275xx/CVE-2025-27515.json) (`2025-03-05T19:15:39.483`)
|
||||
- [CVE-2025-27517](CVE-2025/CVE-2025-275xx/CVE-2025-27517.json) (`2025-03-05T20:16:05.960`)
|
||||
- [CVE-2024-57174](CVE-2024/CVE-2024-571xx/CVE-2024-57174.json) (`2025-03-05T21:15:19.410`)
|
||||
- [CVE-2025-25362](CVE-2025/CVE-2025-253xx/CVE-2025-25362.json) (`2025-03-05T21:15:19.803`)
|
||||
- [CVE-2025-25632](CVE-2025/CVE-2025-256xx/CVE-2025-25632.json) (`2025-03-05T21:15:19.890`)
|
||||
- [CVE-2025-25634](CVE-2025/CVE-2025-256xx/CVE-2025-25634.json) (`2025-03-05T21:15:19.980`)
|
||||
- [CVE-2025-27508](CVE-2025/CVE-2025-275xx/CVE-2025-27508.json) (`2025-03-05T22:15:35.867`)
|
||||
- [CVE-2025-27516](CVE-2025/CVE-2025-275xx/CVE-2025-27516.json) (`2025-03-05T21:15:20.073`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `51`
|
||||
Recently modified CVEs: `59`
|
||||
|
||||
- [CVE-2023-29420](CVE-2023/CVE-2023-294xx/CVE-2023-29420.json) (`2025-03-05T19:15:34.933`)
|
||||
- [CVE-2023-29854](CVE-2023/CVE-2023-298xx/CVE-2023-29854.json) (`2025-03-05T19:15:35.153`)
|
||||
- [CVE-2023-36679](CVE-2023/CVE-2023-366xx/CVE-2023-36679.json) (`2025-03-05T20:50:02.120`)
|
||||
- [CVE-2023-49031](CVE-2023/CVE-2023-490xx/CVE-2023-49031.json) (`2025-03-05T19:15:37.110`)
|
||||
- [CVE-2024-28784](CVE-2024/CVE-2024-287xx/CVE-2024-28784.json) (`2025-03-05T20:50:02.120`)
|
||||
- [CVE-2024-53384](CVE-2024/CVE-2024-533xx/CVE-2024-53384.json) (`2025-03-05T19:15:37.560`)
|
||||
- [CVE-2024-55570](CVE-2024/CVE-2024-555xx/CVE-2024-55570.json) (`2025-03-05T19:15:37.710`)
|
||||
- [CVE-2025-1470](CVE-2025/CVE-2025-14xx/CVE-2025-1470.json) (`2025-03-05T18:54:18.150`)
|
||||
- [CVE-2025-1471](CVE-2025/CVE-2025-14xx/CVE-2025-1471.json) (`2025-03-05T18:54:18.150`)
|
||||
- [CVE-2025-1889](CVE-2025/CVE-2025-18xx/CVE-2025-1889.json) (`2025-03-05T20:16:46.363`)
|
||||
- [CVE-2025-1891](CVE-2025/CVE-2025-18xx/CVE-2025-1891.json) (`2025-03-05T20:16:46.363`)
|
||||
- [CVE-2025-1892](CVE-2025/CVE-2025-18xx/CVE-2025-1892.json) (`2025-03-05T20:16:46.363`)
|
||||
- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-05T19:15:37.870`)
|
||||
- [CVE-2025-21355](CVE-2025/CVE-2025-213xx/CVE-2025-21355.json) (`2025-03-05T18:54:18.150`)
|
||||
- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-03-05T18:54:18.150`)
|
||||
- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-03-05T19:15:38.007`)
|
||||
- [CVE-2025-25349](CVE-2025/CVE-2025-253xx/CVE-2025-25349.json) (`2025-03-05T19:15:38.180`)
|
||||
- [CVE-2025-25741](CVE-2025/CVE-2025-257xx/CVE-2025-25741.json) (`2025-03-05T19:15:38.353`)
|
||||
- [CVE-2025-25742](CVE-2025/CVE-2025-257xx/CVE-2025-25742.json) (`2025-03-05T19:15:38.503`)
|
||||
- [CVE-2025-25743](CVE-2025/CVE-2025-257xx/CVE-2025-25743.json) (`2025-03-05T19:15:38.693`)
|
||||
- [CVE-2025-25744](CVE-2025/CVE-2025-257xx/CVE-2025-25744.json) (`2025-03-05T19:15:38.860`)
|
||||
- [CVE-2025-26182](CVE-2025/CVE-2025-261xx/CVE-2025-26182.json) (`2025-03-05T19:15:39.023`)
|
||||
- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-05T19:15:39.173`)
|
||||
- [CVE-2025-27500](CVE-2025/CVE-2025-275xx/CVE-2025-27500.json) (`2025-03-05T20:16:46.363`)
|
||||
- [CVE-2025-27501](CVE-2025/CVE-2025-275xx/CVE-2025-27501.json) (`2025-03-05T20:16:46.363`)
|
||||
- [CVE-2025-0690](CVE-2025/CVE-2025-06xx/CVE-2025-0690.json) (`2025-03-05T21:15:19.603`)
|
||||
- [CVE-2025-0918](CVE-2025/CVE-2025-09xx/CVE-2025-0918.json) (`2025-03-05T21:28:15.293`)
|
||||
- [CVE-2025-0953](CVE-2025/CVE-2025-09xx/CVE-2025-0953.json) (`2025-03-05T21:28:15.293`)
|
||||
- [CVE-2025-1125](CVE-2025/CVE-2025-11xx/CVE-2025-1125.json) (`2025-03-05T21:15:19.707`)
|
||||
- [CVE-2025-27643](CVE-2025/CVE-2025-276xx/CVE-2025-27643.json) (`2025-03-05T21:15:20.240`)
|
||||
- [CVE-2025-27644](CVE-2025/CVE-2025-276xx/CVE-2025-27644.json) (`2025-03-05T21:15:20.420`)
|
||||
- [CVE-2025-27645](CVE-2025/CVE-2025-276xx/CVE-2025-27645.json) (`2025-03-05T21:15:20.580`)
|
||||
- [CVE-2025-27646](CVE-2025/CVE-2025-276xx/CVE-2025-27646.json) (`2025-03-05T21:15:20.757`)
|
||||
- [CVE-2025-27647](CVE-2025/CVE-2025-276xx/CVE-2025-27647.json) (`2025-03-05T21:15:20.893`)
|
||||
- [CVE-2025-27648](CVE-2025/CVE-2025-276xx/CVE-2025-27648.json) (`2025-03-05T21:15:21.037`)
|
||||
- [CVE-2025-27649](CVE-2025/CVE-2025-276xx/CVE-2025-27649.json) (`2025-03-05T21:15:21.180`)
|
||||
- [CVE-2025-27650](CVE-2025/CVE-2025-276xx/CVE-2025-27650.json) (`2025-03-05T21:15:21.357`)
|
||||
- [CVE-2025-27651](CVE-2025/CVE-2025-276xx/CVE-2025-27651.json) (`2025-03-05T21:15:21.523`)
|
||||
- [CVE-2025-27652](CVE-2025/CVE-2025-276xx/CVE-2025-27652.json) (`2025-03-05T21:15:21.677`)
|
||||
- [CVE-2025-27665](CVE-2025/CVE-2025-276xx/CVE-2025-27665.json) (`2025-03-05T21:15:21.907`)
|
||||
- [CVE-2025-27666](CVE-2025/CVE-2025-276xx/CVE-2025-27666.json) (`2025-03-05T21:15:22.087`)
|
||||
- [CVE-2025-27667](CVE-2025/CVE-2025-276xx/CVE-2025-27667.json) (`2025-03-05T21:15:22.247`)
|
||||
- [CVE-2025-27668](CVE-2025/CVE-2025-276xx/CVE-2025-27668.json) (`2025-03-05T21:15:22.380`)
|
||||
- [CVE-2025-27669](CVE-2025/CVE-2025-276xx/CVE-2025-27669.json) (`2025-03-05T21:15:22.510`)
|
||||
- [CVE-2025-27670](CVE-2025/CVE-2025-276xx/CVE-2025-27670.json) (`2025-03-05T21:15:22.647`)
|
||||
- [CVE-2025-27671](CVE-2025/CVE-2025-276xx/CVE-2025-27671.json) (`2025-03-05T21:15:22.793`)
|
||||
- [CVE-2025-27672](CVE-2025/CVE-2025-276xx/CVE-2025-27672.json) (`2025-03-05T21:15:22.930`)
|
||||
- [CVE-2025-27683](CVE-2025/CVE-2025-276xx/CVE-2025-27683.json) (`2025-03-05T21:15:23.060`)
|
||||
- [CVE-2025-27684](CVE-2025/CVE-2025-276xx/CVE-2025-27684.json) (`2025-03-05T21:15:23.197`)
|
||||
- [CVE-2025-27685](CVE-2025/CVE-2025-276xx/CVE-2025-27685.json) (`2025-03-05T21:15:23.337`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
240
_state.csv
240
_state.csv
@ -173384,7 +173384,7 @@ CVE-2021-28247,0,0,8a48528df54b962ad86087a21c67398f7d0a2b31ec145a320eb1e2aafdfab
|
||||
CVE-2021-28248,0,0,0b8c67dff771f7883e0e0334dd310e67925fa190051a701b2e42d0de04ffdf28,2024-11-21T05:59:24.063000
|
||||
CVE-2021-28249,0,0,b38b4cdc8a8689f21f1e8dc83fd7f0e679e1810ac11f68a09979ae4176b22902,2024-11-21T05:59:24.283000
|
||||
CVE-2021-28250,0,0,2ee329a0b0b5971160b5f9632535f7aa84ed88d37d84d2503bf8089406fe2551,2024-11-21T05:59:24.430000
|
||||
CVE-2021-28254,0,1,7f9d7301ceea6ef75775b405e16bb52f663d67a27ae5fc74bded0fc20c0de32a,2025-03-05T19:15:24.927000
|
||||
CVE-2021-28254,0,0,7f9d7301ceea6ef75775b405e16bb52f663d67a27ae5fc74bded0fc20c0de32a,2025-03-05T19:15:24.927000
|
||||
CVE-2021-28269,0,0,807f2466e43a408dfcf578392d0b4be00cc186134c2fa653eb130027f5f96c40,2024-11-21T05:59:24.740000
|
||||
CVE-2021-28271,0,0,f9af5b693852efd28516810e6693fe68f3ded36ef1187ee7d84eb70d004b2b1c,2024-11-21T05:59:24.883000
|
||||
CVE-2021-28275,0,0,052ab66b3b935f4def9dd1de20a43a2d6d8aa2cc9d1db052ed84666dd0d727a5,2024-11-21T05:59:25.043000
|
||||
@ -177212,8 +177212,8 @@ CVE-2021-33339,0,0,029c104574d21eec902b320411bcd0408c6e8e6c3c693914f4e4b16e640ef
|
||||
CVE-2021-33346,0,0,a8daab26aaed2cce58e08e51dc9dd1e03edd586f6b06884e5a7fd61a32f9da87,2024-11-21T06:08:43.910000
|
||||
CVE-2021-33347,0,0,d57feb5106894bb611a650a977511367b0102014ebb93bb500c067f5b68d83b5,2024-11-21T06:08:44.067000
|
||||
CVE-2021-33348,0,0,8bdc260900608e8d82c45b0b21fecdd8e10188f492e8d2615bdc1dfb29eb15b0,2024-11-21T06:08:44.213000
|
||||
CVE-2021-33351,0,0,f370fe0d6a8289ccc56296db68d4e0bc5ce18771846d15f045f9b4c4b723e2d7,2024-11-21T06:08:44.347000
|
||||
CVE-2021-33352,0,0,e3342c76a0f6b98a2e94354e252afbca2b229d9c481d909a1d86aecfd13b5f7e,2024-11-21T06:08:44.500000
|
||||
CVE-2021-33351,0,1,7c9bfc60172aeee121cab9628065e6b6e3c2a84d34acdbba1d52a72612721163,2025-03-05T21:15:13.477000
|
||||
CVE-2021-33352,0,1,82dcdf89b179eb504ebd392c54183ed4e8e88b2e92c19d4fa8b05d82695fd81b,2025-03-05T21:15:14.600000
|
||||
CVE-2021-33353,0,0,7c2c4b7896620124533885d6bd3de4e33e6d14b0e7ac5f792a930ee530eb7192,2025-03-04T22:15:34.960000
|
||||
CVE-2021-33354,0,0,c809b0d19ab7f7969b4f1de78dc5b988bff2c1c93cea1c82f6d27d58f0f657ab,2024-11-21T06:08:44.790000
|
||||
CVE-2021-33356,0,0,2e117bb974dabca13136cd4702ccf7267b60e0545c77f5bd84e8d8cf5896c37c,2024-11-21T06:08:44.957000
|
||||
@ -183554,7 +183554,7 @@ CVE-2021-4161,0,0,330cce1d183695fbd38111b6ca9460022c51ce4f359aa65bd579fd4365c44b
|
||||
CVE-2021-41610,0,0,4383295040357b63b77992dd7785cc62b9b95f8d58dd93cdf697d7c53800b4d5,2023-11-07T03:38:59.180000
|
||||
CVE-2021-41611,0,0,20e788a9978d5b42bdfb0e861d8a64ecb13ed6a78d656dfa0583ed713b47f4c8,2024-11-21T06:26:31.043000
|
||||
CVE-2021-41612,0,0,ec4512d7e1eb070ebbb7c50ac4104db7c77bf599d5ee26d0cce1e928eee5bff5,2025-02-06T15:15:08.910000
|
||||
CVE-2021-41613,0,1,d034769a005bc9bc2a20a3d5a0f08b25a38215f9b91d908bfc334e2f87677780,2025-03-05T19:15:25.660000
|
||||
CVE-2021-41613,0,0,d034769a005bc9bc2a20a3d5a0f08b25a38215f9b91d908bfc334e2f87677780,2025-03-05T19:15:25.660000
|
||||
CVE-2021-41614,0,0,c10e24c6ecf57f28c0f86386ef18cf31fe6fa33cdc6e2d53899997cac45a7f83,2025-02-06T15:15:10.313000
|
||||
CVE-2021-41615,0,0,7c87671866aa995cddeac7c3e59b2984fedac1b9c57107390543115e22bed63f,2024-11-21T06:26:31.737000
|
||||
CVE-2021-41616,0,0,dd054e38761d9b6ac5dcb4c40cda981ba61676d60f3780bef226a2571a607a44,2024-11-21T06:26:31.947000
|
||||
@ -211992,10 +211992,10 @@ CVE-2022-47477,0,0,27c1709db353e72d8574008fc997b3c35461453cd114777eee1f13d9902b6
|
||||
CVE-2022-47478,0,0,aa28bc26cae78f6924e17ded517950cde9059d1b892de98854c670291561d6ba,2024-11-21T07:32:02.717000
|
||||
CVE-2022-47479,0,0,a426ed8be78132bfd5aa325fff4c075b2b22e3501cc75035b596563396c74056,2024-11-21T07:32:02.840000
|
||||
CVE-2022-4748,0,0,ef3280be296917f093d7b5252769d8875b626bc3bcad498f72668da48999a400,2024-11-21T07:35:51.937000
|
||||
CVE-2022-47480,0,0,66858131aa22cf0e3508af207968f9bb28fbae90ef55c2f553c42fe343c51b51,2024-11-21T07:32:02.970000
|
||||
CVE-2022-47481,0,0,072bed160efe1946057d40d4bdf9af2bed0116fb51202061337233938be48a3a,2024-11-21T07:32:03.103000
|
||||
CVE-2022-47482,0,0,bba60f47d2c4b14e5e60bc809caf93734e38c1bd1d297867ae40bb729f81dfbd,2024-11-21T07:32:03.223000
|
||||
CVE-2022-47483,0,0,db9be835628e60778bc7c7bdc9b6e53d3d9c0458990254351b7137c6b5b9e146,2024-11-21T07:32:03.347000
|
||||
CVE-2022-47480,0,1,76a40e4c0a09df9bf69b4b9ade9ab4eabfc98c306705734307952abd63fc7c1f,2025-03-05T21:15:14.917000
|
||||
CVE-2022-47481,0,1,1d68dd0cd9aacffdb0a0015ab0415ef87ad1def43a11f0aea071156b30b36afa,2025-03-05T21:15:15.067000
|
||||
CVE-2022-47482,0,1,79559e0adae66df2fdac95963c81030d7ed140ce52e148d4e90153e44da7fa51,2025-03-05T21:15:15.223000
|
||||
CVE-2022-47483,0,1,f10a7fd53e3cda42f85b206be3acbdf83fd7911074099195c61788785df412a6,2025-03-05T21:15:15.373000
|
||||
CVE-2022-47484,0,0,95cdc3653454b17f6b32a877606b56ec144381ab971b9c79d156105dbc65645e,2024-11-21T07:32:03.470000
|
||||
CVE-2022-47485,0,0,eecb5b3928cede1970d9d92d33ff0363db96bd500ebfeeb15737e71a65f95750,2025-01-28T17:15:09.557000
|
||||
CVE-2022-47486,0,0,16c88cf26b6dc32923811585704a2b8521c7471c6728a414e2a58ac5c4fde9ac,2025-01-28T21:15:10.753000
|
||||
@ -213566,7 +213566,7 @@ CVE-2022-49408,0,0,3f630e9961e9428352bd3400eb6b1c17b9026d6a4d39ffd25b029cded3415
|
||||
CVE-2022-49409,0,0,1403f9424e749837e3589b93ec7654cdec1cc3dbdd6e5cfd051eb019c27cbf77,2025-02-26T07:01:17.420000
|
||||
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
|
||||
CVE-2022-49410,0,0,c18473af2ca54d8ab7e7b0d50f0360cc1887ae6c728a97a1ceec088f1f818f13,2025-02-26T07:01:17.517000
|
||||
CVE-2022-49411,0,0,056b55e10971df741871db15e89623cc59d67bbbdb78daf01c8748dbbd1e22d9,2025-02-26T07:01:17.613000
|
||||
CVE-2022-49411,0,1,9a87687b3917e12a5da60325ede95267e6847db22ab27942e0104f4544b3485c,2025-03-05T22:15:34.580000
|
||||
CVE-2022-49412,0,0,6d4ca15780a7cd9a5f121f12a1882d0c233ea095afc5591db73caa6d48b41156,2025-02-27T19:15:43.770000
|
||||
CVE-2022-49413,0,0,7f92cdb76e3c2292c0568f99092868df0fb8a3ff3dd65826cb5e2523e437b0f0,2025-02-27T19:15:43.910000
|
||||
CVE-2022-49414,0,0,45e06079d8e9a9e537f215e34f1fed2304341cb0e6033235818624411329e401,2025-02-26T07:01:17.890000
|
||||
@ -213650,7 +213650,7 @@ CVE-2022-49485,0,0,55408f62d96c503da8d80d02e172ff89c29e334d29f84b592bf7605d1edca
|
||||
CVE-2022-49486,0,0,92823d7976f50da17cd777fbb9ac1f222f4fc7354d089bfff5d4d2b720d958f8,2025-02-26T07:01:24.803000
|
||||
CVE-2022-49487,0,0,670c8e7fd77f420124d9f33151d8db1a1561389191b7671359395e07d83e0a24,2025-02-26T07:01:24.897000
|
||||
CVE-2022-49488,0,0,bc4b1661dce83f2333ac1621e48c267bd4dada2757d49ef2469fd051a59d0c8b,2025-02-26T07:01:24.990000
|
||||
CVE-2022-49489,0,0,50fd24f75b64b227e272110436a3c2de7c1c1a7bf901f0dbfb0e542e9d979f07,2025-02-26T07:01:25.083000
|
||||
CVE-2022-49489,0,1,3ae95e28ed50c5f36ebc0501c87fbf6f5b23e2b31eaf5c24145b28a31ca89680,2025-03-05T22:15:34.743000
|
||||
CVE-2022-4949,0,0,20ecd66c665d4a7df211e25b3128a2f7367a36b316ae054ac00474cadd4e5062,2024-11-21T07:36:18.687000
|
||||
CVE-2022-49490,0,0,16cc7f0c1b99ea1efe29c128cae67f5242bed1be9df4b551bc23b2af0ce4d248,2025-02-26T07:01:25.183000
|
||||
CVE-2022-49491,0,0,2a9aa1e883e016a3d43e38e6172aada1c5506731d8d72b9fa1d461654a8a6b58,2025-02-26T07:01:25.280000
|
||||
@ -213875,7 +213875,7 @@ CVE-2022-49690,0,0,793e057a79f8adbe5af54106dfc25e8729a6e63e0dfc223f4e86a9a491eb7
|
||||
CVE-2022-49691,0,0,be83e6d1f5b196817aff5a660e5567a57e0a51ae02d2bbac201addee1b2e75da,2025-02-26T07:01:43.893000
|
||||
CVE-2022-49692,0,0,58eeeb8716066b4a8c51d2d5f51b81b9b58a9b96a5f09dc63d72e92c3005438d,2025-02-26T07:01:43.990000
|
||||
CVE-2022-49693,0,0,d3cea9b886c7577caa46a8fb6a08d9c5c0c03a59f43c0227f2e124c8df3dd9c2,2025-02-26T07:01:44.080000
|
||||
CVE-2022-49694,0,0,ecb497ea73e4d474d2d5f6965026c15a6a3da7c5a5a59d91911e1ee658295d1f,2025-02-26T07:01:44.170000
|
||||
CVE-2022-49694,0,1,de83bfbc380ba4c16c75660600cee6c65039e4359b92339ab9012e688ede9092,2025-03-05T22:15:34.923000
|
||||
CVE-2022-49695,0,0,6c59848c28b791220cd5f00f895a2651f6a09013e783dc4fb29f1844d6e6d99d,2025-02-27T19:15:46.573000
|
||||
CVE-2022-49696,0,0,b9644e5562f79cc2fc332aad6b0e6a056e9eef7fe74f2200c6847ba48e046c19,2025-02-27T19:15:46.720000
|
||||
CVE-2022-49697,0,0,9131c713e6cdf9d74b79f7ca68d3eca3ab0576898f710c48cb6fe2d287aec574,2025-02-26T07:01:44.450000
|
||||
@ -213949,7 +213949,7 @@ CVE-2023-0026,0,0,165616398c1e329eb5878a4a88862384fb9166fdb6d3f5e292a49f7fd62bb6
|
||||
CVE-2023-0027,0,0,bc53fb53bbb7beed0401095261d25d291c5d2f0b093ba79342629e17271bff21,2024-11-21T07:36:25.453000
|
||||
CVE-2023-0028,0,0,47d182e40157ebd1ecf5b4238fd19dca5e0f64a3001fe1a633dafe0960c2c751,2024-11-21T07:36:25.567000
|
||||
CVE-2023-0029,0,0,d38cd0e3f9819bc32b5462ca193486d2f74abcf8c764d856c0eefcb8d1141f0b,2024-11-21T07:36:25.690000
|
||||
CVE-2023-0030,0,0,5927d506b1e5c0c66f04eabed8ea9fb437bf1e30d7c12b2b5b96f0496d6c03e1,2024-11-21T07:36:25.820000
|
||||
CVE-2023-0030,0,1,3530a0a64d7682ad133789fd6de90a7d2034eab862291636b7a1033fd692878e,2025-03-05T21:15:15.520000
|
||||
CVE-2023-0033,0,0,3f31d98dc6a02a5fe0c12542ad722e671705102d4ef3a7618e635bce79d5ba3e,2024-11-21T07:36:25.933000
|
||||
CVE-2023-0034,0,0,d387fa9af6d7d785ee7ba793bbd11ca5e52b1fc1852afd6facf88d071296a814,2025-01-14T22:15:25.297000
|
||||
CVE-2023-0035,0,0,1c3fd6e2650d47058756c534ed838961e3bbdd97ca3a82ac0aa7e5fd57a7441c,2024-11-21T07:36:26.143000
|
||||
@ -213986,7 +213986,7 @@ CVE-2023-0065,0,0,1af42c9630237adefe532d5e7d6c03134844119157520f1dae4aad3d5003e3
|
||||
CVE-2023-0066,0,0,66abd1188955921a4f586244d11ac2aed7ba37215a66a107b40ed1984614d870,2025-02-27T21:15:16.620000
|
||||
CVE-2023-0067,0,0,d9b9c7e73ab578382d2a88b409033e01b0277359a48f063cf20738d009ed0036,2024-11-21T07:36:29.547000
|
||||
CVE-2023-0068,0,0,09b587937209aec78ff4e464b77cb9d1b780912e276b385bb5b75adb2cb8a003,2024-11-21T07:36:29.650000
|
||||
CVE-2023-0069,0,1,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000
|
||||
CVE-2023-0069,0,0,bb4a67e87a89a16e9214b1f062e8f6924eef987d6dc74878eb3573b76c99a092,2025-03-05T20:15:39.917000
|
||||
CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000
|
||||
CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000
|
||||
CVE-2023-0072,0,0,d333d59260663a0b5930bb992584a27415216729bc2149a3935b4f3b91fe9ce7,2024-11-21T07:36:30.050000
|
||||
@ -214657,7 +214657,7 @@ CVE-2023-0761,0,0,1c12e966a31ab5fa981f27f6779c348b172a92660c02ef6161d5e68d0643b7
|
||||
CVE-2023-0762,0,0,b352c77f507f218efecdfba3d0204deb48d60e35cf3d46c52cf2dd283cb2f84e,2025-01-24T21:15:09.020000
|
||||
CVE-2023-0763,0,0,66b09a9c98c73290507e7116bff86b7079976cc6357472573cf9f15e006e8dde,2025-01-24T21:15:09.187000
|
||||
CVE-2023-0764,0,0,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000
|
||||
CVE-2023-0765,0,1,6b52002814929eaa820d36a0b1f7124300b13ac41153e1f8eb2dc73ceb0ce3bc,2025-03-05T19:15:27.347000
|
||||
CVE-2023-0765,0,0,6b52002814929eaa820d36a0b1f7124300b13ac41153e1f8eb2dc73ceb0ce3bc,2025-03-05T19:15:27.347000
|
||||
CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000
|
||||
CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000
|
||||
CVE-2023-0768,0,0,854944641b4c5c80838898ca164f46cd13b5eb87a809afca93532e5fd701927a,2025-01-29T15:15:11.710000
|
||||
@ -215035,7 +215035,7 @@ CVE-2023-1157,0,0,0402ab37e7e5f6cbc939cc04841734e527335666105adf7e868a1727c804fd
|
||||
CVE-2023-1158,0,0,9bda3659fb2a24636d54cc854ecc564094fc9221be088ca217d92967214f10e3,2024-11-21T07:38:34.460000
|
||||
CVE-2023-1159,0,0,d8d4c558a2fd4d03b8edbe3de78a5a2e03ba4e24f50fdd0613853204c30f0dbc,2024-11-21T07:38:34.577000
|
||||
CVE-2023-1160,0,0,17ebdb5003486d1c4d90853a16e3b5b1acfbee4d84661bdc34ed15516bb36105,2024-11-21T07:38:34.707000
|
||||
CVE-2023-1161,0,0,caed5525e44804667a0e43c07767d142ae3927c4805771f07d800552af812071,2024-11-21T07:38:34.827000
|
||||
CVE-2023-1161,0,1,16af76231cbad01fe4bc5b46c577c7c8a23978fc46565653946bca044b85493c,2025-03-05T21:15:15.793000
|
||||
CVE-2023-1162,0,0,f87e6d602a26d561f5ac0f9865f63a6282fda0d5309d6afa2567e124cbbaa025,2024-11-21T07:38:34.957000
|
||||
CVE-2023-1163,0,0,bf08d3ee50431d81cd5c5eb1e4c9baa2cb5766d918b772d2670e302297d8a5ba,2024-11-21T07:38:35.093000
|
||||
CVE-2023-1164,0,0,cd95affe38dd1da2f7cad384d131dc6e2f344aeca6455a3e27db16e3090a52d7,2024-11-21T07:38:35.230000
|
||||
@ -215193,7 +215193,7 @@ CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3b
|
||||
CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000
|
||||
CVE-2023-1323,0,0,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000
|
||||
CVE-2023-1324,0,0,00d5f367721a8f873edf46f7e2845f04eda266f6dab94ac034683dc84d5e71f8,2025-02-04T19:15:27.863000
|
||||
CVE-2023-1325,0,1,3ff3723565214c557ecea7b3557f725999e31dde6f993620e8d608bc76eb6bc6,2025-03-05T19:15:27.500000
|
||||
CVE-2023-1325,0,0,3ff3723565214c557ecea7b3557f725999e31dde6f993620e8d608bc76eb6bc6,2025-03-05T19:15:27.500000
|
||||
CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000
|
||||
CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67dfb,2024-11-21T07:38:55.873000
|
||||
CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000
|
||||
@ -216245,13 +216245,13 @@ CVE-2023-20624,0,0,e47a264375b13e017fe5366d70086802e9ceccccc26e33fa7308b00b95aff
|
||||
CVE-2023-20625,0,0,e30f7cae43d7c99f52a9f3eaa98ebc9690730ea46f3f31fe7a005dbb756bf8c1,2024-11-21T07:41:14.870000
|
||||
CVE-2023-20626,0,0,d6ae1489f257693bb3520b235021ea213311498e9344453b0e2ab8e56fc20917,2024-11-21T07:41:14.990000
|
||||
CVE-2023-20627,0,0,1dfbf563926de15415545782801ae81f813aa7c6a71a5ad0d3f3bb578f705c51,2024-11-21T07:41:15.110000
|
||||
CVE-2023-20628,0,0,e5710a34158d53c9d684f1777f2d7c4104e14ea3fc90581212ec17a5ab3b0e04,2024-11-21T07:41:15.213000
|
||||
CVE-2023-20628,0,1,a43f94bc27655b93099f567fd284ae00b065686b39b9054c4862b72cea71753f,2025-03-05T22:15:35.140000
|
||||
CVE-2023-2063,0,0,0aaf862838d3fc48a28b566a8ceaf8291ae1040d19422d9eb9fde272cb92f0f5,2024-11-21T07:57:51.990000
|
||||
CVE-2023-20630,0,0,4e220cfad559ee04582d407cd8391bfd570f01397ba72260d786060edc88d2b0,2024-11-21T07:41:15.333000
|
||||
CVE-2023-20632,0,0,47be8e71f5a563ce91919f8442033d40dbb4522e3ef7af5135844efec3823f27,2024-11-21T07:41:15.453000
|
||||
CVE-2023-20630,0,1,373bf469509103d35ae343d6f2ea99e063d089c4b291ca1aedb51787a3d30c6a,2025-03-05T21:15:16.050000
|
||||
CVE-2023-20632,0,1,dbf315d861e3e5ca6a2602ca35016bde2eb440a8f2e0b22336c02aeb45f5da3d,2025-03-05T21:15:16.213000
|
||||
CVE-2023-20633,0,0,9197731104a2b6109350b0d564f4bb04b2c3792f8862636eb8cc18ce6e5d2d65,2024-11-21T07:41:15.570000
|
||||
CVE-2023-20634,0,0,b0b1c5908cb36423248ecc504db659e09cae32845206be6f448f99a3e9062f1f,2024-11-21T07:41:15.690000
|
||||
CVE-2023-20635,0,1,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000
|
||||
CVE-2023-20635,0,0,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000
|
||||
CVE-2023-20636,0,0,7969ffb97886082c6a56452f4bd27bb421515913b292c77bae030e782a2f8d07,2024-11-21T07:41:15.943000
|
||||
CVE-2023-20637,0,0,8f038e57aa78ece48451171f04153fb424960afef9c2b2d699b66084c7dcf21c,2024-11-21T07:41:16.050000
|
||||
CVE-2023-20638,0,0,682bb7f5f889f3c8e2845ecb7f3268c10614777581011e1531d7a44568da3706,2024-11-21T07:41:16.160000
|
||||
@ -216262,13 +216262,13 @@ CVE-2023-20641,0,0,66afd76ab5e3cab0364e8ba13a5eff296c3abe942f408ca92dfd55e801388
|
||||
CVE-2023-20642,0,0,ab42154c747b6570707a2a6e302e1d7356412038014a0a3e86e15a95727d6b82,2024-11-21T07:41:16.630000
|
||||
CVE-2023-20643,0,0,29baeeea0d83d636cbe7387d2e7a6ff6d1b6ca73019c6a0fa1aaca17b82ecd5e,2024-11-21T07:41:16.737000
|
||||
CVE-2023-20644,0,0,47e77d5e6c7673ac7afc319e6bd16df66831e94df9a4c5108b5e1f129213c770,2024-11-21T07:41:16.850000
|
||||
CVE-2023-20645,0,1,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000
|
||||
CVE-2023-20646,0,1,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000
|
||||
CVE-2023-20647,0,1,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000
|
||||
CVE-2023-20648,0,1,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6dbd,2025-03-05T19:15:28.157000
|
||||
CVE-2023-20649,0,1,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000
|
||||
CVE-2023-20645,0,0,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000
|
||||
CVE-2023-20646,0,0,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000
|
||||
CVE-2023-20647,0,0,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000
|
||||
CVE-2023-20648,0,0,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6dbd,2025-03-05T19:15:28.157000
|
||||
CVE-2023-20649,0,0,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000
|
||||
CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000
|
||||
CVE-2023-20650,0,1,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000
|
||||
CVE-2023-20650,0,0,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000
|
||||
CVE-2023-20651,0,0,c931350452b735a23e9229b569e270a5f54d60e0e2263fb39c061c2250efc655,2024-11-21T07:41:17.647000
|
||||
CVE-2023-20652,0,0,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000
|
||||
CVE-2023-20653,0,0,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000
|
||||
@ -216289,7 +216289,7 @@ CVE-2023-20666,0,0,c5d2c0fe4d9f9ffdbe1d4fa83d8991d3bf44101616c65a6e41eb579627dba
|
||||
CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000
|
||||
CVE-2023-20670,0,0,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000
|
||||
CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000
|
||||
CVE-2023-20674,0,1,1d7150870f73731e427b98bc692b8c9d2962bd27caafe479a90e35c1f0c08671,2025-03-05T20:15:43.900000
|
||||
CVE-2023-20674,0,0,1d7150870f73731e427b98bc692b8c9d2962bd27caafe479a90e35c1f0c08671,2025-03-05T20:15:43.900000
|
||||
CVE-2023-20675,0,0,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000
|
||||
CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35
|
||||
CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000
|
||||
@ -218415,10 +218415,10 @@ CVE-2023-22885,0,0,2f0912bee282864da45fe9a8cfc9d03fb4e1df60f2665b9327dad841ca415
|
||||
CVE-2023-22886,0,0,deca26cbd59ff4ad06ee92feefc7369951dfff2be007df24addbfc14d2089e99,2024-11-21T07:45:34.853000
|
||||
CVE-2023-22887,0,0,9500df946dba5534f211144e9851e9d48e0ee8ec0c089e042d11b59806b35ea6,2024-11-21T07:45:35.050000
|
||||
CVE-2023-22888,0,0,21f2ad7126398dfecc421c82eb979bf0052bbe2538451b515afd03d68cbb392e,2024-11-21T07:45:35.207000
|
||||
CVE-2023-22889,0,0,6716b509ed5c405bd04ae933068b80977723c43438fbe0730e49946a4c10f433,2024-11-21T07:45:35.347000
|
||||
CVE-2023-22889,0,1,241077d378418bf49cd96b0992e3ad40d3865f77d263511f96593e26b5fd40cc,2025-03-05T21:15:16.410000
|
||||
CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3f4,2024-11-21T07:58:19.060000
|
||||
CVE-2023-22890,0,0,f0d3730f64c477dba58781dd1df246a96dfbef568d6cada5ee7da87752d9dba8,2025-03-05T15:15:11.563000
|
||||
CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000
|
||||
CVE-2023-22891,0,1,3a92e12f4d2abab6cdcec3ce715e0f5388925cb7a23b8935a97c17cdd48e3dc5,2025-03-05T21:15:16.683000
|
||||
CVE-2023-22892,0,0,c963711bf8dff126d953038745e504027e8bd2d954a24cb7a184225e893f5abe,2025-03-04T21:15:11.610000
|
||||
CVE-2023-22893,0,0,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000
|
||||
CVE-2023-22894,0,0,83a9bc4d6f652a5da819c8e1af0fc9a362d82f490b3fc0d16b028bb916c464fe,2025-02-05T17:15:18.590000
|
||||
@ -219475,7 +219475,7 @@ CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd141854
|
||||
CVE-2023-24278,0,0,8b3a10f640b076cc06894b9a7323e5d52321fe3fe7263648e751cafc218009d8,2025-02-26T19:15:16.663000
|
||||
CVE-2023-24279,0,0,bcb401ecd54952a6b3fa7d3e1dff47a3cf63506b6a5303515865dd9711fad82d,2024-11-21T07:47:39.133000
|
||||
CVE-2023-2428,0,0,bdb844c56d8c8e00f4a260fc6fd9b038fd6ebce6e031ea2559d7741b54fc28eb,2025-01-30T17:15:15.810000
|
||||
CVE-2023-24282,0,1,e05ded1b01d4352cf39683a7553627f8b8f9510288b442e8eb44071210e3679b,2025-03-05T19:15:29.053000
|
||||
CVE-2023-24282,0,0,e05ded1b01d4352cf39683a7553627f8b8f9510288b442e8eb44071210e3679b,2025-03-05T19:15:29.053000
|
||||
CVE-2023-2429,0,0,58ff0d99261c61eba5cceeb08e9f29525f122d7e4d766ca6a31dc201179e1aae,2025-01-30T17:15:15.950000
|
||||
CVE-2023-24294,0,0,3e42f9b86751e812a6b22510e56d8d1be93e046cdaadd881a9a597ba3368c39c,2024-11-21T07:47:39.450000
|
||||
CVE-2023-24295,0,0,ef678c92680f783e4697256b62662f890905cb8a683c3e297ed97c828d80ca05,2024-11-21T07:47:39.600000
|
||||
@ -219792,7 +219792,7 @@ CVE-2023-24653,0,0,08283d9ae8aab4f26e31d58418abb36bbc8972bfa560b4473ca5aa391721a
|
||||
CVE-2023-24654,0,0,86a74b36ab0aa56ef60565de904d15cc8aaea147de483e6f86904c7816bdaf7e,2024-11-21T07:48:16.957000
|
||||
CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000
|
||||
CVE-2023-24656,0,0,7690104318d4516fbb5cb79df2d9f2678e1757e7786f00ff38000419ec12c2a1,2024-11-21T07:48:17.240000
|
||||
CVE-2023-24657,0,1,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
|
||||
CVE-2023-24657,0,0,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
|
||||
CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000
|
||||
CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000
|
||||
CVE-2023-24671,0,0,285987de08d208e85df027c33ab5d1dccd3ffbde353c9b8020b34641113c0956,2024-11-21T07:48:17.537000
|
||||
@ -219845,19 +219845,19 @@ CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2
|
||||
CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4bc2,2024-11-21T07:48:23.160000
|
||||
CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000
|
||||
CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000
|
||||
CVE-2023-24773,0,1,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000
|
||||
CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000
|
||||
CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000
|
||||
CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8192,2025-03-05T15:15:12.233000
|
||||
CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000
|
||||
CVE-2023-24777,0,1,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000
|
||||
CVE-2023-24777,0,0,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000
|
||||
CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000
|
||||
CVE-2023-24780,0,0,a70e6811128672d0ff689b485eeaa75ae829acf7b17513334d6f6cc6f8dadc0a,2024-11-21T07:48:24.097000
|
||||
CVE-2023-24781,0,0,7a997d3dc41a9eaad892ecad59650364a4b3147ccd6d11b4f9bafcd21fd34e03,2024-11-21T07:48:24.223000
|
||||
CVE-2023-24782,0,1,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000
|
||||
CVE-2023-24782,0,0,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000
|
||||
CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000
|
||||
CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000
|
||||
CVE-2023-24788,0,0,868ff4d8e88aff25ad543e70a65b697e1d178d63050b1ca143aa0decdb797d27,2024-11-21T07:48:24.640000
|
||||
CVE-2023-24789,0,0,478a774a25a83944ccf6fe2be0a5de598b6e51ea788134ed3d69cefa03b9080d,2024-11-21T07:48:24.780000
|
||||
CVE-2023-24789,0,1,367ace39fad6b1e514677c41a0ac737a131d93a7d1eb6bac3d0992b13a458a1d,2025-03-05T21:15:16.840000
|
||||
CVE-2023-2479,0,0,4801134ef77265136ffc1bb85eb06ca5e6918eec27800c07ac6e0c5e0435b44f,2024-11-21T07:58:41.860000
|
||||
CVE-2023-24795,0,0,50c263ab5cfb37ef26a3b5605f966902dfc5978a6d9b8282427d790bae59e9be,2025-02-26T17:15:18.970000
|
||||
CVE-2023-24796,0,0,0811d8124e097273749efb44bf056e7530d4475a682a12a8354f5594791213f6,2025-02-03T18:15:28.627000
|
||||
@ -220206,10 +220206,10 @@ CVE-2023-25140,0,0,74362372391b31264001eb955c5daf2c2b9c8c748cdabd288baea2cf0557b
|
||||
CVE-2023-25141,0,0,6dc3c22bac02c920d3d25c63074609179b1ea370d4da9ecff5b21b830c61359a,2024-11-21T07:49:11.340000
|
||||
CVE-2023-25143,0,0,f14793445037582372555d13411197b8aef60ff7d37d181eb93091b88030c258,2025-03-05T15:15:12.443000
|
||||
CVE-2023-25144,0,0,ab7d84d2f165ab21b0b1f9ed1abfd79fb52c70cb16fd0a8455b22ed951ca3fc4,2024-11-21T07:49:11.603000
|
||||
CVE-2023-25145,0,0,40e2cd226835d090403bef22f34c90db08cbb0e894597d8e9f9a4de5cd90b761,2024-11-21T07:49:11.720000
|
||||
CVE-2023-25146,0,0,add1fb2292e87ec0b9dfd9045fc9df0890a4f23ca5a928d3819c099dbd73b58c,2024-11-21T07:49:11.830000
|
||||
CVE-2023-25147,0,0,11a0e76dac7c834658f0865a244fe627170300ba5ec165ff394d1e39f5afe2d4,2024-11-21T07:49:11.940000
|
||||
CVE-2023-25148,0,0,1115f06638b5047a6227fcf805ef26d4fd61954d8d2a6fc089903a94608d757b,2024-11-21T07:49:12.047000
|
||||
CVE-2023-25145,0,1,71e62e20409077ec917ec9a494564df62e5a03e10fab96fa74817a2db3525c8c,2025-03-05T21:15:16.993000
|
||||
CVE-2023-25146,0,1,b2d7efa3a19c0ed8ead8336e6b5ebce9a7c3889978c9ca6185fc1f12a51279dc,2025-03-05T21:15:17.160000
|
||||
CVE-2023-25147,0,1,3f3be06805fca693d13306572db1e19af0d3aa94905d692b5b0da8ba725aecc4,2025-03-05T21:15:17.313000
|
||||
CVE-2023-25148,0,1,6e7ba91a2525e84786f37c0a4c7d95d5628bd9d51f76ca254dc62b8114c417e6,2025-03-05T21:15:17.473000
|
||||
CVE-2023-25149,0,0,e9bb6d9aa56c18e334787a808284695e66bdf7db05900703a5591057d72d8810,2024-11-21T07:49:12.163000
|
||||
CVE-2023-2515,0,0,4303abefd7834f0f6df01f17d0aac47a21a27a2e901943a7f1a02e11dc2b6a29,2024-11-21T07:58:45.357000
|
||||
CVE-2023-25150,0,0,ef547c3b3a66117cbe0f0d2e1a36b17bc6dfeacf2110fc847c78c4852f3a4bac,2024-11-21T07:49:12.283000
|
||||
@ -221010,13 +221010,13 @@ CVE-2023-26102,0,0,ad48db17daa5813c2c603727ba9c9458d6a541fdeff41ece33be20080052b
|
||||
CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4fc1,2024-11-21T07:50:46.877000
|
||||
CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47
|
||||
CVE-2023-26105,0,0,7cc2762bb92da835a09938bd30ea450932cc3a111ca4007596fe1bf509cfbdd5,2024-11-21T07:50:47.137000
|
||||
CVE-2023-26106,0,0,3b589f2ca9941f574c87aed5e414b2940d6d860604b41f19a3df7a66de8eec77,2024-11-21T07:50:47.253000
|
||||
CVE-2023-26107,0,1,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
|
||||
CVE-2023-26106,0,1,5aec010201382e2cd4ddda8f70104650c3355d4509e17262f2080cc54e5810ea,2025-03-05T21:15:17.863000
|
||||
CVE-2023-26107,0,0,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
|
||||
CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000
|
||||
CVE-2023-26109,0,0,1df13cce9e658344e9fee3b1a3ec2cce78326cb9ab178edcf615a984859539e2,2024-11-21T07:50:47.597000
|
||||
CVE-2023-2611,0,0,e40fc44e8c0f9f87f6cc648583f7f82c9d48ab56bdd345e0bf13e41c1ddb4a27,2024-11-21T07:58:55.813000
|
||||
CVE-2023-26110,0,0,52cbdd7c87defb2f21d4206b43844829ebddb989d6b77d2cc4a83440fa39975e,2024-11-21T07:50:47.710000
|
||||
CVE-2023-26111,0,0,181c90b7ba7969dc443ccde547bb4942d1d4abb2232346f393537cf4ee6ddbad,2024-11-21T07:50:47.830000
|
||||
CVE-2023-26111,0,1,980199ad3235df2bd802ec86d5d9b5531930a8a3cd2e4f65d9af1e1d82899799,2025-03-05T21:15:18.010000
|
||||
CVE-2023-26112,0,0,ca3318453a5a7976f1c04dfb59326cfc6cf9d7d5298decf39a9aec06a65b4cad,2025-02-13T17:16:11.327000
|
||||
CVE-2023-26113,0,0,06877511e2cc6bc44a83f319880c7a1f3a7440c37b239acc930562be29d6672b,2024-11-21T07:50:48.090000
|
||||
CVE-2023-26114,0,0,00b77af39a7e708e039ae4adcf8a1ec9cf3a0042ea9106767ebfa8ab25834dd6,2025-02-25T20:15:32.393000
|
||||
@ -221116,7 +221116,7 @@ CVE-2023-26257,0,0,651ae83f9b566794a14a3a87e0cadbdea81d8eb5e63fa2a4d16d316ec3fef
|
||||
CVE-2023-26258,0,0,ff9e8234c9784e7a294e94b80683256ffdc02c595f084313493ac6d35cf02eac,2024-11-21T07:50:59.670000
|
||||
CVE-2023-2626,0,0,ca17b69e5784d9a3dc3563acb8287618e374689f2a0fbc11c0a942570d2465a9,2024-11-21T07:58:57.490000
|
||||
CVE-2023-26260,0,0,682c3aa32ac3b1e2f0244b618bddb4144dc1da5d6c899d092a4c4361550bec51,2025-02-11T16:15:35.347000
|
||||
CVE-2023-26261,0,1,fb6d7637bc853116d89ddd08b2b147d96ef06217c33e5f4e8d240f7283abccd0,2025-03-05T19:15:30.133000
|
||||
CVE-2023-26261,0,0,fb6d7637bc853116d89ddd08b2b147d96ef06217c33e5f4e8d240f7283abccd0,2025-03-05T19:15:30.133000
|
||||
CVE-2023-26262,0,0,5393ce589cf1c921932aa694df325bb2f0c0a9cb4e3b8aeaa04b9961173c31f7,2025-02-27T21:15:18.663000
|
||||
CVE-2023-26263,0,0,ea8263e453191214d08a39c61ed1efe7b14d89219c29343eb5d7a37fbed09b47,2025-02-07T17:15:25.293000
|
||||
CVE-2023-26264,0,0,e65f8a2927b958d250904011d8e5d0e2d529de3c6397de687a045325585a616b,2025-02-07T16:15:34.490000
|
||||
@ -221605,14 +221605,14 @@ CVE-2023-26943,0,0,40224a5889d9a9d46f084ff88f91a23a22a2c393975db40c4df8c233b1253
|
||||
CVE-2023-26948,0,0,385254368d76362ed022a3338e9a32f9da4c64e597dcc2197c790fa2beaed98b,2025-02-28T17:15:14.537000
|
||||
CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e6a0,2024-11-21T07:52:05.803000
|
||||
CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000
|
||||
CVE-2023-26950,0,1,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a79b,2025-03-05T19:15:31.957000
|
||||
CVE-2023-26950,0,0,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a79b,2025-03-05T19:15:31.957000
|
||||
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
|
||||
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
|
||||
CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
|
||||
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
|
||||
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
|
||||
CVE-2023-26956,0,1,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000
|
||||
CVE-2023-26957,0,1,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000
|
||||
CVE-2023-26956,0,0,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000
|
||||
CVE-2023-26957,0,0,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000
|
||||
CVE-2023-26958,0,0,1b26350389205ca0e46cfdac6f76150e5a95bb023d56c1b5b2a4a4a1011448ab,2024-11-21T07:52:07.167000
|
||||
CVE-2023-26959,0,0,3256c10cc44d1ea908179ee6646c2f1d21949e7f041fefc54308e21873c039a8,2024-11-21T07:52:07.317000
|
||||
CVE-2023-2696,0,0,80c166f4bb66cbe0e082d20ccd7f4b1fe89761e6fcf75764df81daccdc3a9638,2024-11-21T07:59:06.300000
|
||||
@ -221696,7 +221696,7 @@ CVE-2023-27082,0,0,2c40f95e8d41178b94dd847ebecb5d6ca70900da105b9be54ff9bd9eda4c6
|
||||
CVE-2023-27083,0,0,f52240e94afb722f2a0c557f9dfb89c9e41d5209858d5fe1be554d2aa3a26983,2024-11-21T07:52:17.457000
|
||||
CVE-2023-27084,0,0,35ab801ad3bda4ff85fccaa78f55fd32dbc2a00babecfb93007934955146f638,2025-02-26T20:15:13.003000
|
||||
CVE-2023-27087,0,0,13db924c9808b9c4671f5e5a124311e49f06005723090df2ee6d54267087f848,2025-02-26T19:15:17.373000
|
||||
CVE-2023-27088,0,1,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000
|
||||
CVE-2023-27088,0,0,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000
|
||||
CVE-2023-27089,0,0,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000
|
||||
CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08
|
||||
CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000
|
||||
@ -223795,10 +223795,10 @@ CVE-2023-29414,0,0,995f6dfbce7b6373c94f8f4446e5c1ab9db1d57586ede22a39a9b94d2ae5e
|
||||
CVE-2023-29415,0,0,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000
|
||||
CVE-2023-29416,0,0,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000
|
||||
CVE-2023-29417,0,0,af1671cdf04819caefb52843b9d73da01d07e147abbd4c3ea9e6ae4d1237e052,2024-11-21T07:57:01.327000
|
||||
CVE-2023-29418,0,1,7d389d5fb1dc5aa1639d68772bcff9c03b108fc27db7e98f305442d0b248e227,2025-03-05T20:16:04.403000
|
||||
CVE-2023-29419,0,1,6abe52bacd06d4b2f2be7bc0e77c7ca4cf8eba041f711b8392428cf819cbd45c,2025-03-05T20:16:05.020000
|
||||
CVE-2023-29418,0,0,7d389d5fb1dc5aa1639d68772bcff9c03b108fc27db7e98f305442d0b248e227,2025-03-05T20:16:04.403000
|
||||
CVE-2023-29419,0,0,6abe52bacd06d4b2f2be7bc0e77c7ca4cf8eba041f711b8392428cf819cbd45c,2025-03-05T20:16:05.020000
|
||||
CVE-2023-2942,0,0,3095d00f007f08736781ffefa009546288f761e162006b66520cb0c1c690f4ed,2024-11-21T07:59:36.943000
|
||||
CVE-2023-29420,0,1,12b4664e50d577149765f1c033b0e1aca31b1c1cfce0c6b7d8d47cc96b99ce1a,2025-03-05T19:15:34.933000
|
||||
CVE-2023-29420,0,0,12b4664e50d577149765f1c033b0e1aca31b1c1cfce0c6b7d8d47cc96b99ce1a,2025-03-05T19:15:34.933000
|
||||
CVE-2023-29421,0,0,236c15b9df269a365b5f51c706496c8acb4d0d8259ecec17ee326a2d13e3e41e,2025-02-12T17:15:18.467000
|
||||
CVE-2023-29422,0,0,11d0b8b362c579a59640a4a88f42bc430b3c71c051a72869a1511f4e9f51cbf1,2024-12-09T13:15:27.020000
|
||||
CVE-2023-29423,0,0,a22c9b9b0fb58e0c90c58921099d165cb9cd3c801aa1e31e81cc43f769d64193,2024-11-21T07:57:02.053000
|
||||
@ -224085,7 +224085,7 @@ CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda
|
||||
CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000
|
||||
CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000
|
||||
CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000
|
||||
CVE-2023-29854,0,1,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
|
||||
CVE-2023-29854,0,0,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
|
||||
CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000
|
||||
CVE-2023-29856,0,0,b07bbd6f3df18d3f0c08e71dffe9eeaab7b72b9f25dad866594c7cca7b9f8a6d,2024-11-21T07:57:35.347000
|
||||
CVE-2023-29857,0,0,0760939b20d3d88a77d487b55a7da2f82fabbe0bc7d6bfc81ea34e8a82edb139,2025-01-22T17:15:10.550000
|
||||
@ -229165,7 +229165,7 @@ CVE-2023-36675,0,0,cd44e51a9a6eb9c4e63b6fc73dfefe41e5846b7e217f12e6824cfd331ebc1
|
||||
CVE-2023-36676,0,0,6dff4ed2de3be120c14b2d1cd7e8d5f80ea91e6988a53bad20c9c6d2d9c42bd4,2024-11-21T08:10:20.200000
|
||||
CVE-2023-36677,0,0,87352cc7cc9fa1d06edebf5b59591f05cddf73fd4ad4323770390a266b8a240e,2024-11-21T08:10:20.430000
|
||||
CVE-2023-36678,0,0,8e2ca3757ab8e217491173421c97f12fc5198222fd34c6f6238eae9d9ed45354,2024-11-21T08:10:20.730000
|
||||
CVE-2023-36679,0,1,ba7857da83546fa4db5bb8b1bd93a8a67fe327e5ba5ccf47b4ac55c3dd546b53,2025-03-05T20:50:02.120000
|
||||
CVE-2023-36679,0,0,ba7857da83546fa4db5bb8b1bd93a8a67fe327e5ba5ccf47b4ac55c3dd546b53,2025-03-05T20:50:02.120000
|
||||
CVE-2023-3668,0,0,ee0fc8a117dff3c229840274c7d57f54273ddbff69a341d8dbdb2bd6060e7e7f,2024-11-21T08:17:47.787000
|
||||
CVE-2023-36680,0,0,b9be5117546aa41ea1b0775680cd0c31aaaddfcf395655d1742c642ab34f3467,2024-12-13T15:15:17.740000
|
||||
CVE-2023-36681,0,0,b11a813f807650ef99ed1aeb70071d7ef02b7a8c18f90e2475ff7637b316f608,2024-12-13T15:15:17.880000
|
||||
@ -238560,7 +238560,7 @@ CVE-2023-49028,0,0,1fe6cffd82021764ce68fd3a53c4875910ce33e674fe2677a56e372e5a7b2
|
||||
CVE-2023-49029,0,0,c614567def59347336438740b811220368c65599cc4c871c14425dc96c92f919,2024-11-21T08:32:42.833000
|
||||
CVE-2023-4903,0,0,4e15f764aaa4b079f24341cacdb9f278af35d9bba3f5d8eb18a330cc8e32e94b,2024-11-21T08:36:13.627000
|
||||
CVE-2023-49030,0,0,05a1c83003c2661094ba87a267d63d6f1ebc1176bdaa7cc3b41d9bda2fa7cad0,2024-11-21T08:32:42.990000
|
||||
CVE-2023-49031,0,1,3a1898c6166f0e4f546c41396b3dfdfdcaeadd674967e2c103e6c1f470c937cb,2025-03-05T19:15:37.110000
|
||||
CVE-2023-49031,0,0,3a1898c6166f0e4f546c41396b3dfdfdcaeadd674967e2c103e6c1f470c937cb,2025-03-05T19:15:37.110000
|
||||
CVE-2023-49032,0,0,bf0051df9f823bcff03622a71e492c2e2c8f0b2e1823ce4c4a928e1018ed932e,2024-11-21T08:32:43.220000
|
||||
CVE-2023-49034,0,0,1d1efe3d808290b90ce8e37a8c591816f90907f686b935dadde78588546b498b,2024-11-21T08:32:43.363000
|
||||
CVE-2023-49038,0,0,c9ba25652a66916f2762c9c471fc85f429fa7f7f0cea2238a2047f0c789b591f,2024-11-21T08:32:43.590000
|
||||
@ -239875,7 +239875,7 @@ CVE-2023-50956,0,0,10dbe6455689250a2de365cb32b1211e944628def03c2a4b0bf422999c285
|
||||
CVE-2023-50957,0,0,ab69caad2028c44273e1d8a1b6e510f9cab85ce3e69786cd2afdcb47074d77d4,2024-11-21T08:37:36.500000
|
||||
CVE-2023-50959,0,0,a65991072a7be5e9bfc6dd105f3e29b24f202d07a14ac774359e6246211d7ee4,2024-11-21T08:37:36.643000
|
||||
CVE-2023-5096,0,0,b339725eb66ec0962e11912446b66cd850e228ed170101209b480782ef995e44,2024-11-21T08:41:03.100000
|
||||
CVE-2023-50961,0,0,4ed2cb92e3d2defaa8e3e74714c3c25274c2e4c159cdbda7bf03b0e172916bd0,2024-11-21T08:37:36.783000
|
||||
CVE-2023-50961,0,1,7545038ec9d0d49b9d0cc2e06874bdb2fa73382c326ecfb24343cf4e12c3ca12,2025-03-05T20:50:02.120000
|
||||
CVE-2023-50962,0,0,bfd9f5a4ad1424d7a1cf5b3db0b702b9736d0e0eb70ef84e63b401d6f05355e4,2024-11-21T08:37:36.913000
|
||||
CVE-2023-50963,0,0,048c774e65664cc2dd04bbd2bb0bf5e5a8b33087c54a2292c3e70ba4f76d1eaf,2024-11-21T08:37:37.070000
|
||||
CVE-2023-50964,0,0,549af7f5da0e21621df175ef0896772987500a2810b5c1dbe76aa4da3e042b22,2024-11-21T08:37:37.223000
|
||||
@ -247755,7 +247755,7 @@ CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1
|
||||
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
|
||||
CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-13869,0,0,0918273a7ae15011be1debf6016e48d8cf14f846fa38b8a2ca6e7c9fb94375dd,2025-02-23T04:15:23.797000
|
||||
CVE-2024-13869,0,1,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
|
||||
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
|
||||
CVE-2024-13873,0,0,ef7d81633c3243b5a662796d38d39a610ff44d855cd436a1a77aa5716496d20c,2025-02-22T04:15:09.567000
|
||||
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
|
||||
@ -254155,7 +254155,7 @@ CVE-2024-27267,0,0,a5d8693bf68d611ea6b320a17ddd770102a308dc1e0715bd0f998cd807a76
|
||||
CVE-2024-27268,0,0,2dcbf6964ce8e8841ebc29f79e8d8a5330f19a8a65f2e49de73dbb87cd15e97e,2025-02-27T17:58:20.883000
|
||||
CVE-2024-27269,0,0,52ebdbf805213627c28de793c9dc09dbda04abee28bda6abc5aa430114512ce8,2024-11-21T09:04:12.937000
|
||||
CVE-2024-2727,0,0,2dee61faac028e2733757e135f6a6c2d9e9cd5dd69c05078e33394419bac0651,2024-11-21T09:10:23.127000
|
||||
CVE-2024-27270,0,0,ee5297b5c486baef68caedbf92c34d8bca8e622c9288c2e6680ad4daefb32f3d,2024-11-21T09:04:13.080000
|
||||
CVE-2024-27270,0,1,2f2b3c81c6031ac3faa2d4527642a4829f4370c56c5937f1b30ad912da7769f8,2025-03-05T20:50:02.120000
|
||||
CVE-2024-27273,0,0,1e870f69a6eba4fe402f69b8b2086b21dbadf40baccbcf7a5482142f0a1f5afc,2024-11-21T09:04:13.197000
|
||||
CVE-2024-27275,0,0,fe661a9e941d5dafabb7909ae7d62cd1b965cde9d21e932e51d238ab5bff32e2,2024-11-21T09:04:13.333000
|
||||
CVE-2024-27277,0,0,904a77a3c7015f2f6c511c853241ff243f6c05fe3641e8abd7aa5faad6cd9814,2025-02-14T15:54:30.470000
|
||||
@ -255205,7 +255205,7 @@ CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae8235
|
||||
CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000
|
||||
CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000
|
||||
CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000
|
||||
CVE-2024-28784,0,1,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3411,2025-03-05T20:50:02.120000
|
||||
CVE-2024-28784,0,0,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3411,2025-03-05T20:50:02.120000
|
||||
CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000
|
||||
CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000
|
||||
CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000
|
||||
@ -256247,7 +256247,7 @@ CVE-2024-30170,0,0,ed60f0d302cd151d50df6d1bb62de9bb721767f8db7fef2c2cb93566e3243
|
||||
CVE-2024-30171,0,0,6ebe5e9eae1a7ad2da52de3f79b45587d88b57791a58fe5821737eae0455762c,2024-11-21T09:11:21.590000
|
||||
CVE-2024-30172,0,0,690673599610e6fc17fcb2b0d34b3d19b36c3a3e806e4a07a5cc646c8560a2e6,2024-11-21T09:11:21.817000
|
||||
CVE-2024-30176,0,0,aa066c55eeeca0fd6bb4beb9ec423ba6486b66e97848e6e3c1974ce9983157d0,2024-11-21T09:11:22.050000
|
||||
CVE-2024-30177,0,0,44c797d5a3808fe7f3d09ed56fa89cae0d3f4a517c94d374e7585b27408ea653,2024-11-21T09:11:22.287000
|
||||
CVE-2024-30177,0,1,0cc5342193d0c0a684de8d9bfc121f1b2cd449b1b90ad80867fdb7108a37f8c2,2025-03-05T20:50:02.120000
|
||||
CVE-2024-30178,0,0,a5c303cfe3274dddc07583df103192092e5bee518dfa7fb8388fe33b5060991d,2024-11-21T09:11:22.410000
|
||||
CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000
|
||||
CVE-2024-3018,0,0,04adb6daf55ce952c118b13379d47e77b2b270495205816344abb7282ca20f00,2025-01-08T19:35:58.073000
|
||||
@ -256308,7 +256308,7 @@ CVE-2024-30229,0,0,618b341ddde842ab963dd32e5b58768f172ceaac30eeec0dbf9d1f8b20aa5
|
||||
CVE-2024-3023,0,0,263153a293163fa286e9c101f6bafff3237bb13b48d4d071321a37d0a1fdd8bd,2024-11-21T09:28:42.340000
|
||||
CVE-2024-30230,0,0,9ae9ce9e1df99b9edb0b3840d298f6742d8d81c2fa9cbc5be63ce42438c755d5,2024-11-21T09:11:29.843000
|
||||
CVE-2024-30231,0,0,68fd351a4c37be841f842b0166a1b15234ac7b80a2d9bb89976da51bdd09f04f,2024-11-21T09:11:29.970000
|
||||
CVE-2024-30232,0,0,911985794127ded209b846eded6891442778eccc3fe3f3b88307778577dc1dba,2024-11-21T09:11:30.090000
|
||||
CVE-2024-30232,0,1,cb4ba1f0c953f5530e82efb5a6283e946b5575664e80c37efadf1d45825da04a,2025-03-05T20:50:02.120000
|
||||
CVE-2024-30233,0,0,f1d9cba1fef6a20f771e2e1821d5ed146e740ade1e79062f0b361b5e672abd33,2024-11-21T09:11:30.203000
|
||||
CVE-2024-30234,0,0,fc7aa33bf67a605070883714eea380c59e25f899a3a6c90caaacb9b95ffca289,2024-11-21T09:11:30.333000
|
||||
CVE-2024-30235,0,0,5611b3121f2d724007ecaf4abbe7979de2204e273ca82520d2e3f5a4d917850f,2025-02-07T16:54:26.067000
|
||||
@ -257367,7 +257367,7 @@ CVE-2024-31507,0,0,7fbfd817660ab84cf5450aec1201bdeb4a240d71bce8efbbc3c0e4ce8dd7b
|
||||
CVE-2024-3151,0,0,3abd09f3cd2dde51fd5d70c85f62b41db0f3d9e525370488dec5a9bb4eabe907,2024-11-21T09:29:00.680000
|
||||
CVE-2024-31510,0,0,81886f3ba02f8fa5d2b3f9541ab3b63f18369a591e7028ab4059f6604bc1ef58,2024-11-21T09:13:40.523000
|
||||
CVE-2024-3152,0,0,232a7ab8a6c5151aba1982b503cbcc7bcb30e91652e2552e7d49e1b5852760ca,2024-11-21T09:29:00.820000
|
||||
CVE-2024-31525,1,1,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000
|
||||
CVE-2024-31525,0,0,6627e95037243d06d26b556f0d33b80df89ff9c79a57afbb72a049b67b7aa8a1,2025-03-05T19:15:37.340000
|
||||
CVE-2024-3153,0,0,9a2bcb2f051678e95973008adc0d482a6778734c6609a6f1cd9e743db5bc63a2,2024-11-21T09:29:00.963000
|
||||
CVE-2024-3154,0,0,d0e11e707bf549d7b831b8b7a6558cfd09c514bb54bbe90790f96ca21395d852,2024-11-21T09:29:01.100000
|
||||
CVE-2024-31544,0,0,b0bccc451dcee5903b366441bb39b229e4ec0f92cdbfeddcea663568e3c62a9a,2024-11-21T09:13:40.747000
|
||||
@ -268239,14 +268239,14 @@ CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf
|
||||
CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000
|
||||
CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000
|
||||
CVE-2024-45773,0,0,fa133c6be41b30498db96f8cc8924c7e28e5e1652411403fbf684ea7526e1df8,2024-09-30T12:45:57.823000
|
||||
CVE-2024-45774,0,0,4d2c75ba8338553ee4a278a85581b6e2db4424169927a3758eac6b06d727bf07,2025-02-18T19:15:16.387000
|
||||
CVE-2024-45774,0,1,0f073f588f71078dc679e01261e0d33f3593000f90e73943a466ec500a25e59b,2025-03-05T21:15:18.897000
|
||||
CVE-2024-45775,0,0,5e285262d1706cab5ca05a7725649dadf6185a7492d72f859f11f2cece394355,2025-02-18T20:15:19.177000
|
||||
CVE-2024-45776,0,0,6ff331300b63b0445c4a33993b39c621dc4140ea58408c74e411ebee541079c0,2025-02-18T20:15:19.313000
|
||||
CVE-2024-45777,0,0,381f048bca6c71d068d001bd4e22e7b202a5aa1ffd4c67366bc2225f24d010f7,2025-02-19T18:15:23.210000
|
||||
CVE-2024-45778,0,0,4a788605efb9b4cb4a9d6b761519c855051768041e43218264b80f4c5b038d32,2025-03-03T17:15:12.700000
|
||||
CVE-2024-45779,0,0,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
|
||||
CVE-2024-45779,0,1,ef9c7579abe7cc86ad6d3bbf7c0d85a638308ff189f521d9ba5bde61fb1d8868,2025-03-05T21:15:19.043000
|
||||
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
|
||||
CVE-2024-45780,0,0,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
|
||||
CVE-2024-45780,0,1,cf48978da48bec73dddc393fa912333a5f584e7103712d9a48b5fcac961a7f62,2025-03-05T21:15:19.167000
|
||||
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
|
||||
CVE-2024-45782,0,0,9a6d58c808594661629c2038d537df1d03a760fc3efa15bba0bd203537e988b6,2025-03-03T17:15:12.900000
|
||||
CVE-2024-45783,0,0,26ae80ac76949a820b287a710d857e419cd80f84fb3ed37275ecee208bfb63de,2025-02-18T20:15:19.560000
|
||||
@ -270003,7 +270003,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd
|
||||
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
|
||||
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000
|
||||
CVE-2024-48246,1,1,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000
|
||||
CVE-2024-48246,0,0,d8aa8bbee68eda7776a3808bf3d9b15998cb2b79ac3a38a6ecaa4e7ac7ab27f7,2025-03-05T19:15:37.453000
|
||||
CVE-2024-48248,0,0,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000
|
||||
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
|
||||
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
|
||||
@ -272077,7 +272077,7 @@ CVE-2024-51139,0,0,3b86e869f5ecb53ca24ff4fbeb657240c1119cc435967f16a049b12c38655
|
||||
CVE-2024-5114,0,0,a53116e5e8fe86fcce70c98ac21ade21bff509be03067f69ee971c3f0fde0f62,2025-02-21T21:10:08.983000
|
||||
CVE-2024-51141,0,0,5382dd00ba9b2f385fa6fd2013258c1bdfe06c898acc0f9612f7d27a92e2f8b2,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51142,0,0,0966095e36208a7f8cbe7da74b14de21dba15e2b1fd23a5e1fde16bca38e370e,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51144,1,1,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000
|
||||
CVE-2024-51144,0,0,f2e1949f146dc411e1404659a7d6dca2cc1e604e82f47916b3953b73dc6e41a9,2025-03-05T20:16:05.603000
|
||||
CVE-2024-5115,0,0,63ee4189b26772fc1ce56914807ff994899a5055d7b3d38de495f2ee77931e2d,2025-02-21T20:51:40.910000
|
||||
CVE-2024-51151,0,0,6043d48b8e54694a9f5dd0791c6e07ebb911ecfc7547aac1163aaf1a70efd3d4,2024-11-22T17:15:09.190000
|
||||
CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f9037d5,2024-11-13T20:03:06.083000
|
||||
@ -273697,7 +273697,7 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065
|
||||
CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000
|
||||
CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000
|
||||
CVE-2024-53382,0,0,2488076516d1ebcfd2ad12e680a94caed7283ef6a09ea27a43a166505c7166e8,2025-03-03T22:15:35.637000
|
||||
CVE-2024-53384,0,1,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000
|
||||
CVE-2024-53384,0,0,b6866f3b6ed7c8eaef607e4d3e7fc2f2f1a05b909484b75d95782c7b2122e8b1,2025-03-05T19:15:37.560000
|
||||
CVE-2024-53386,0,0,7f05252fb8b0d166f1c2ba66ecc4b7344953d98b8f75dafbb0948fe4c267094e,2025-03-03T22:15:36.583000
|
||||
CVE-2024-53387,0,0,264b7c4136ae86fc011e3b043feb659c0b9ddd37f668a4f6020393264ee8d896,2025-03-04T17:15:13.043000
|
||||
CVE-2024-53388,0,0,8b8dacfab9439ff4969bd847d9389950511a224c15ee4c724e3aaa2186354ee1,2025-03-04T17:15:13.217000
|
||||
@ -273720,7 +273720,7 @@ CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db166141872
|
||||
CVE-2024-5345,0,0,c0e9154b8cf6eccc0abbcabbb8ee4621432a41cc6dca94348a2468e667caa563,2024-11-21T09:47:27.883000
|
||||
CVE-2024-53450,0,0,35c5f2872561bc157223093101834ca44cd8e03e4dad5a58a6584da3319abc23,2024-12-11T16:15:13.910000
|
||||
CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25cf5,2024-12-10T18:15:41.873000
|
||||
CVE-2024-53458,0,0,97d39f76361f25c42034c95d8b9ccf092d5a81242cf9c168f96b864a3e5ef49e,2025-03-05T18:15:37.053000
|
||||
CVE-2024-53458,0,1,641859a5600bbf3f0e54a9968e7e6b822daf3d47438a24462013c8b12042fd66,2025-03-05T21:15:19.270000
|
||||
CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000
|
||||
CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28
|
||||
CVE-2024-5347,0,0,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000
|
||||
@ -274876,7 +274876,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349
|
||||
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
|
||||
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
|
||||
CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000
|
||||
CVE-2024-55570,0,1,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000
|
||||
CVE-2024-55570,0,0,54aaa2288cd697cbf8a8070a769b88a355e9aac7091f42350f78741de15ddd1f,2025-03-05T19:15:37.710000
|
||||
CVE-2024-55573,0,0,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000
|
||||
CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000
|
||||
CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000
|
||||
@ -275855,6 +275855,7 @@ CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8
|
||||
CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
|
||||
CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000
|
||||
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
|
||||
CVE-2024-57174,1,1,ea5f915b58d7c215b8fa5efcc7c90eee7ccc1e3a45af4848031dc2d74daa2bea,2025-03-05T21:15:19.410000
|
||||
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
|
||||
CVE-2024-57176,0,0,6d9c6c6cbdd40045d42d7eb3b163498a343556fdd692d1bfd43f815afbfe5382,2025-02-21T18:15:18.877000
|
||||
CVE-2024-57177,0,0,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f217a2,2025-02-10T22:15:36.257000
|
||||
@ -276333,7 +276334,7 @@ CVE-2024-5801,0,0,88cefa27997e2bcbe21b5c883c0afde76d26ad02906fc919eaea4622c76add
|
||||
CVE-2024-58010,0,0,7890f0fc518a397a6f3394be59f08277a93d5e6d2c7bea10037599ec5ef4e93d,2025-02-27T03:15:11.980000
|
||||
CVE-2024-58011,0,0,1e5ed1e9dbbfdfc9c4e1f83ef735602eb4423be5efad22020690bcd20febf463,2025-02-27T03:15:12.087000
|
||||
CVE-2024-58012,0,0,a87781614600ca02d98d4520ab570199bd055ca58f903501e236e127b34cd233,2025-02-27T03:15:12.187000
|
||||
CVE-2024-58013,0,0,1ced2f9163c7fb110b65337e31022048526b187402b205b937ea44447b006cbe,2025-02-27T03:15:12.287000
|
||||
CVE-2024-58013,0,1,db720d7ccdda587cf86c812bf9a23ff3242ad2c6818001578519aa3e1096cd28,2025-03-05T22:15:35.690000
|
||||
CVE-2024-58014,0,0,c7b2aa63e8b7bec392f61441db5b82d30877f13fd011c4249345a8e6613810f5,2025-02-27T03:15:12.390000
|
||||
CVE-2024-58015,0,0,408dce73f62364b52ba252950975a281e1135fb7b4b23b2ccae7c773ad3c39ca,2025-02-27T03:15:12.493000
|
||||
CVE-2024-58016,0,0,4b26c1146b2a0dfbe10569fbb6f1cac4750ac1fe03a88c36d84acf78d6c876e6,2025-02-27T03:15:12.590000
|
||||
@ -280414,8 +280415,8 @@ CVE-2025-0683,0,0,656748caff6fec701396e9f78e84e971ce5f7b02979f679e43ad5dbf6778d8
|
||||
CVE-2025-0684,0,0,08cf09aadd4265d9f17fc91e7ffa365e4af4b017983ec1ff0167ffac235b59e4,2025-03-03T18:15:30.537000
|
||||
CVE-2025-0685,0,0,36f03222d9846bb79813c677d1ef99c125061b51820965038a411e4d83039174,2025-03-03T18:15:30.733000
|
||||
CVE-2025-0686,0,0,c1cd4659b63910dd911bbe910efe568d44b2d78dc5d45dcca3ca5f7d1cf3b4cc,2025-03-03T18:15:30.930000
|
||||
CVE-2025-0689,0,0,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
|
||||
CVE-2025-0690,0,0,09027ea6c3bed8670e162224b0d482e5f3ab1012b1f296c54e49592e0794bc03,2025-02-24T08:15:09.503000
|
||||
CVE-2025-0689,0,1,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c4316,2025-03-05T21:15:19.503000
|
||||
CVE-2025-0690,0,1,bbbcb650d9130b5dd35bdfc4d8287eb5fdbb2a723c8cda9af36e91d7165433a0,2025-03-05T21:15:19.603000
|
||||
CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000
|
||||
CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000
|
||||
CVE-2025-0695,0,0,5a6f397a6b64075e37b58670bef347904c3201da024fb297d91e9e2cec2630c8,2025-01-27T11:15:11.087000
|
||||
@ -280559,7 +280560,7 @@ CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8f
|
||||
CVE-2025-0912,0,0,7d91fe8bdf75dc10fc3a6ee045af78f6d8511b1dffa7e9ab755c8337b5808dd8,2025-03-04T04:15:11.390000
|
||||
CVE-2025-0914,0,0,9e1fc990beb9632007c48895ab7342f6dbef3aadc843d2d68815604598633e4c,2025-02-27T16:15:38.237000
|
||||
CVE-2025-0916,0,0,b3e2dfc1a782ae4e58fd745e6dc8ce9f3019ca5ca64e71e978c066cc4fb2d49f,2025-02-25T20:19:48.457000
|
||||
CVE-2025-0918,0,0,bf7ea5d39eee8251bb807510dd4b154e6c47cd25d1f1b7d645bbb739c9503983,2025-02-22T13:15:11.687000
|
||||
CVE-2025-0918,0,1,3b7ea2206360604d42b031bd9cb0adecc5bc1a42f350443e778efc86f1a584a6,2025-03-05T21:28:15.293000
|
||||
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
|
||||
CVE-2025-0924,0,0,f098c8869b022dbda442e50477571fe8e89ac3ff2ff9ea7bd16e8bb1ca9eb537,2025-02-17T05:15:09.410000
|
||||
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
|
||||
@ -280579,7 +280580,7 @@ CVE-2025-0947,0,0,54992aef26727e095f19651dace58e0751a58da1d32b3005bb44e21372f29d
|
||||
CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c849,2025-02-03T18:15:41.580000
|
||||
CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000
|
||||
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
|
||||
CVE-2025-0953,0,0,921a82da6ab0ef8d3d98803db3946d447f0517778af0c3f71c90d1c8292a158b,2025-02-22T13:15:11.850000
|
||||
CVE-2025-0953,0,1,13d291258e4c30c78d80b709e158097d095b4eb5e4d1fb760e2f7e371f933aaf,2025-03-05T21:28:15.293000
|
||||
CVE-2025-0954,0,0,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000
|
||||
CVE-2025-0956,0,0,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000
|
||||
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
|
||||
@ -280682,7 +280683,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4
|
||||
CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000
|
||||
CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000
|
||||
CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000
|
||||
CVE-2025-1125,0,0,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
|
||||
CVE-2025-1125,0,1,2f04992a8811506ffd86df04ce8fd4c4eaf818b2350c9b37d99c1e9008bb7d98,2025-03-05T21:15:19.707000
|
||||
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
|
||||
CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000
|
||||
CVE-2025-1128,0,0,3e3abcd3f96edb2abceed71a856737fc42627c92bf399c3000e0a443d77fce4c,2025-02-25T07:15:18.480000
|
||||
@ -280864,8 +280865,8 @@ CVE-2025-1463,0,0,d248ef273a3b5e888e172d8fd07cc9fd97f2fb7f97e8edd42c6b6898096b1d
|
||||
CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000
|
||||
CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000
|
||||
CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000
|
||||
CVE-2025-1470,0,1,3848028ffff60fd580115e36417f30f6dc535781a178d2b984e388a8c98d4795,2025-03-05T18:54:18.150000
|
||||
CVE-2025-1471,0,1,ce8174d2ec3ea90fee94fa4dcc9877166339de4d02332b4e10279e4dda90d352,2025-03-05T18:54:18.150000
|
||||
CVE-2025-1470,0,0,3848028ffff60fd580115e36417f30f6dc535781a178d2b984e388a8c98d4795,2025-03-05T18:54:18.150000
|
||||
CVE-2025-1471,0,0,ce8174d2ec3ea90fee94fa4dcc9877166339de4d02332b4e10279e4dda90d352,2025-03-05T18:54:18.150000
|
||||
CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000
|
||||
CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e53733175,2025-02-24T11:15:10.193000
|
||||
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
@ -281062,10 +281063,10 @@ CVE-2025-1879,0,0,8dfd2646c676c3ece0a7cdb47902f86b3104dd08987a88251e5f89a02963e9
|
||||
CVE-2025-1880,0,0,c72d611e03bec1601138d23f870cd9f7c0e1da9ae20c7fdea23df40cce84c0ac,2025-03-05T14:05:15.387000
|
||||
CVE-2025-1881,0,0,30af475aa1857a9549937ceaba0a5a810af94b0854718b918bcc65af8247966d,2025-03-05T14:05:15.387000
|
||||
CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000
|
||||
CVE-2025-1889,0,1,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1889,0,0,5072bd95a86d25feae5791cf255f77defba5f3e20f781603009ba8bbf0cc989d,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1890,0,0,c1d47d4a4aeac7a335593000ae0438d3423e1a99470e82a526c70a2e79722b6e,2025-03-05T14:05:15.387000
|
||||
CVE-2025-1891,0,1,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1892,0,1,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1891,0,0,9b2d5672e830320e85f4ce1b1237cb247e1b08f382010ca70ebe9ce25ecd4518,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1892,0,0,23e8bd45c61a59b4dc633c22bbb6b47bcebfa584a27c4f28fe02f9776032c8ce,2025-03-05T20:16:46.363000
|
||||
CVE-2025-1893,0,0,9be412d2514b9be0790e5a4193b6955597746daf900e90c81d514cf9ccc312d7,2025-03-04T17:15:15.890000
|
||||
CVE-2025-1894,0,0,1e18049f5b87411c04f983f9b00db61cf73fb4d9a08324c4d43d383b4f67f4a4,2025-03-05T15:18:38.660000
|
||||
CVE-2025-1895,0,0,b57852434c30ca53442c5acf041813dfb48893d7697f9a81c13c127c1f342ef7,2025-03-05T15:18:38.660000
|
||||
@ -281099,7 +281100,7 @@ CVE-2025-1935,0,0,fb86c9f6eef9a8703fc816d168d1def680a59a027e40e369c2943d2fcdf997
|
||||
CVE-2025-1936,0,0,51fc94e6e2a1280fcbb69e822739d7bb32e7846d1325b95219b96459d930c164,2025-03-05T00:15:36.913000
|
||||
CVE-2025-1937,0,0,0817cf3af5da44d15b822f9c1b2172d68ca6ebd43919872b944d4488851b0901,2025-03-05T00:15:37.010000
|
||||
CVE-2025-1938,0,0,7704ed14aab0b091939626ff0ff752796e4de69d5616ed3955e897aad92c1f35,2025-03-05T00:15:37.097000
|
||||
CVE-2025-1939,0,1,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000
|
||||
CVE-2025-1939,0,0,c0c3d1c5456d9ff1ed9873f9baef0daaa42a015c687bcb9aef1c88b468ec4239,2025-03-05T19:15:37.870000
|
||||
CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
|
||||
CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
|
||||
CVE-2025-1942,0,0,753070f9011342be1a2e87e1c54f2be8ff4b2a8bc333a4cd46301bd2f87bd395,2025-03-05T00:15:37.247000
|
||||
@ -281130,7 +281131,7 @@ CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543
|
||||
CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
|
||||
CVE-2025-2003,1,1,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000
|
||||
CVE-2025-2003,0,0,5784d61463f3728339fd5e2ed1b89d832252e44dc112d8c940bf256e269c9f7f,2025-03-05T20:16:06.380000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
|
||||
CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
|
||||
@ -281454,7 +281455,7 @@ CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced
|
||||
CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000
|
||||
CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000
|
||||
CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000
|
||||
CVE-2025-21355,0,1,7a3bd7c08e7fa8cfe7141fb458e4393082fe5fb614b47716a343605b5ca5af95,2025-03-05T18:54:18.150000
|
||||
CVE-2025-21355,0,0,7a3bd7c08e7fa8cfe7141fb458e4393082fe5fb614b47716a343605b5ca5af95,2025-03-05T18:54:18.150000
|
||||
CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0b95,2025-01-21T19:37:28.987000
|
||||
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
|
||||
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
|
||||
@ -281497,7 +281498,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417
|
||||
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
|
||||
CVE-2025-21399,0,0,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000
|
||||
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
|
||||
CVE-2025-21401,0,1,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000
|
||||
CVE-2025-21401,0,0,e3a166a872f2fb35cfaf86dfc109c08e69efc3c353f5b6565d05d9f427b6d540,2025-03-05T18:54:18.150000
|
||||
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
|
||||
CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000
|
||||
CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000
|
||||
@ -283633,14 +283634,15 @@ CVE-2025-25330,0,0,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070
|
||||
CVE-2025-25331,0,0,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000
|
||||
CVE-2025-25333,0,0,48db7a0795e1d6c60f3c9b54235bb299f37a35fd06d70db1a48b26f45e2b3776,2025-02-27T20:16:05.073000
|
||||
CVE-2025-25334,0,0,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000
|
||||
CVE-2025-25343,0,1,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000
|
||||
CVE-2025-25349,0,1,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000
|
||||
CVE-2025-25343,0,0,8e99f7b75137c5a1c7f93dabde29d66e18305db52866904da5a2417c11dc4de4,2025-03-05T19:15:38.007000
|
||||
CVE-2025-25349,0,0,0b8f440074c495a1a0b53dff3163981b46d5592e40593ff15f585b947ad22bfa,2025-03-05T19:15:38.180000
|
||||
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
|
||||
CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000
|
||||
CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6d06,2025-02-14T19:39:33.147000
|
||||
CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000
|
||||
CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000
|
||||
CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000
|
||||
CVE-2025-25362,1,1,5c20b711ac79c6c4af2730be6aa1167252eca84ac8131f5fab860a3a20cb8bc1,2025-03-05T21:15:19.803000
|
||||
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
|
||||
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
|
||||
@ -283689,6 +283691,8 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
|
||||
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
||||
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
||||
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
|
||||
CVE-2025-25632,1,1,2837e6eed05a75825d3a0a65aeefc087cd911ab22aba5f61b34c77158f2cb8fb,2025-03-05T21:15:19.890000
|
||||
CVE-2025-25634,1,1,ba7c6e4c7202e5cc51c3a3e35603315845cc8c4c900719372b556ce21832c21b,2025-03-05T21:15:19.980000
|
||||
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
|
||||
CVE-2025-25662,0,0,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000
|
||||
CVE-2025-25663,0,0,2c66463e17f0da9d9b59da03f32234807a5e0504a922f80726e5f203d3e2d884,2025-02-21T18:15:41.693000
|
||||
@ -283709,10 +283713,10 @@ CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314b
|
||||
CVE-2025-25729,0,0,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000
|
||||
CVE-2025-25730,0,0,5698d9d4b3d086c1c265c033d8b8d6ebf52c1e553b08fab79bfe6eec41adf00a,2025-02-28T20:15:46.803000
|
||||
CVE-2025-25740,0,0,773eb69d9fa04e004e72a74faf22d133a852d69f49836b1bbebb7a8b7833c66c,2025-02-14T15:15:13.190000
|
||||
CVE-2025-25741,0,1,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000
|
||||
CVE-2025-25742,0,1,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000
|
||||
CVE-2025-25743,0,1,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000
|
||||
CVE-2025-25744,0,1,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
|
||||
CVE-2025-25741,0,0,1404a9908338c4c3c8ab2b43bd4acbaa79381acee099156008ee033cd0a719e8,2025-03-05T19:15:38.353000
|
||||
CVE-2025-25742,0,0,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778df8,2025-03-05T19:15:38.503000
|
||||
CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000
|
||||
CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
|
||||
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
|
||||
CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
|
||||
@ -283795,7 +283799,7 @@ CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec
|
||||
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26182,0,1,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
|
||||
CVE-2025-26182,0,0,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26202,0,0,faf1da73f05d445d952dd532cee33fae2a2ae5a854a8d484ad2405b4354fa0d8,2025-03-05T16:15:40.130000
|
||||
@ -283812,7 +283816,7 @@ CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9
|
||||
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26318,0,0,954b8e579069ffbba2c1644cd56a790bd60e4a5ad19eb604706c56f01984d999,2025-03-05T17:15:16.180000
|
||||
CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a721,2025-03-05T17:15:16.340000
|
||||
CVE-2025-26320,0,1,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
@ -284190,13 +284194,15 @@ CVE-2025-27426,0,0,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a
|
||||
CVE-2025-27497,0,0,2fc0d7db27c0271849809e7a3569c315d4d896035f23974cb31f5ee306ac5122,2025-03-05T16:15:40.587000
|
||||
CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
|
||||
CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369f59,2025-03-04T17:15:20.250000
|
||||
CVE-2025-27500,0,1,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27501,0,1,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
|
||||
CVE-2025-27508,1,1,021b134ab746fdb21c1b6afba20d8b4449f142dd50a7aeaf2a0e333d5dbea12b,2025-03-05T22:15:35.867000
|
||||
CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000
|
||||
CVE-2025-27513,1,1,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
|
||||
CVE-2025-27515,1,1,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
|
||||
CVE-2025-27517,1,1,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
|
||||
CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
|
||||
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
|
||||
CVE-2025-27516,1,1,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000
|
||||
CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
|
||||
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
|
||||
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
|
||||
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
|
||||
@ -284210,16 +284216,16 @@ CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3
|
||||
CVE-2025-27640,0,0,b630dc974545d9f67fba85dfa1922285fca382bf7c8ef944014c9ef5e7da0dae,2025-03-05T17:15:17.250000
|
||||
CVE-2025-27641,0,0,e00fcfcdda4ca65f506722aa33e3fc2808ef53a5c2f863874f47768f8a9a6a18,2025-03-05T17:15:17.427000
|
||||
CVE-2025-27642,0,0,5b8e208a9248521650816b22a37509c58dc012b954572086c7bae255201add83,2025-03-05T17:15:17.603000
|
||||
CVE-2025-27643,0,0,1e7e42e492f06ba614ed9e1c5091ad093090fe50a4868cf449f85baaf4ea0949,2025-03-05T06:15:35.847000
|
||||
CVE-2025-27644,0,0,aceda647f9fba77bd6fd5bdb575ee6502574725ea989be8bcb7964e672dbac85,2025-03-05T06:15:35.990000
|
||||
CVE-2025-27645,0,0,79335b2d00fc3b81c5d00789938fc04e8f3525330ebb50ceab6a6dc7cdef01d0,2025-03-05T06:15:36.117000
|
||||
CVE-2025-27646,0,0,cdbc489563ce86b498e897be1ad51d8f773102accaef7988d995503f91f710c6,2025-03-05T06:15:36.257000
|
||||
CVE-2025-27647,0,0,0697fc74d80d6535a37a6807865700aa57cfe2feb17485b9ee527253df01bc51,2025-03-05T06:15:36.387000
|
||||
CVE-2025-27648,0,0,af84b41c48767982114cc636935a3c68f1a33a8301cb722c298fce892e4f4b86,2025-03-05T06:15:36.523000
|
||||
CVE-2025-27649,0,0,1269208457b870adba1c11dbd8f7cfa18f4eb40e81bc0b649bbc903a5d7441f3,2025-03-05T06:15:36.667000
|
||||
CVE-2025-27650,0,0,442b478fb9f5a720296498b0972185371516b40aad684692d6f2704c9c1b08fc,2025-03-05T06:15:36.817000
|
||||
CVE-2025-27651,0,0,2268f00520bf4992136d976faa8dc8169a6a419db2460587b8c479b3e1d43453,2025-03-05T06:15:36.950000
|
||||
CVE-2025-27652,0,0,5148740c543bf87d5b1166b079693a23ac8922c32846a4339e8b98d0bbf9af12,2025-03-05T06:15:37.077000
|
||||
CVE-2025-27643,0,1,6568a9113f59086f66524c9c6940973d1f9db034fafd5740d4369aec86fd613c,2025-03-05T21:15:20.240000
|
||||
CVE-2025-27644,0,1,96c7cea48b973516fb70109b8895aa3c7ce75815b7016d2db8d462dd77e9ebec,2025-03-05T21:15:20.420000
|
||||
CVE-2025-27645,0,1,14f10c13826d858dcbb28aa9ef92def3863950dd3112094015db8461f9f5006c,2025-03-05T21:15:20.580000
|
||||
CVE-2025-27646,0,1,1d326e7ecc76695cd522b222a45ea15a8222f613aa17e992bceba21ecdfad65d,2025-03-05T21:15:20.757000
|
||||
CVE-2025-27647,0,1,e66f96bc9bdcd5def7c528621ccb2b03fe386092bb44ba6f69a7ec673203e87d,2025-03-05T21:15:20.893000
|
||||
CVE-2025-27648,0,1,e07ff029f0ef36e16bd3a27e9294be54a2cb6a621c1df4fccdf40fd031b01a31,2025-03-05T21:15:21.037000
|
||||
CVE-2025-27649,0,1,c48716efc0678bf11a4b059addfe2d52d2bd5f208d0f6a29e8858d440fe5aa44,2025-03-05T21:15:21.180000
|
||||
CVE-2025-27650,0,1,1c8aa1a505a09a50e69bcbd6ecbf77b51726aeb80f762e609cef966aee0a0de1,2025-03-05T21:15:21.357000
|
||||
CVE-2025-27651,0,1,e70d96159ccbed6f468ff4a4f45faef8d504372c15f4f0f19a52f47d3a7341e3,2025-03-05T21:15:21.523000
|
||||
CVE-2025-27652,0,1,be80a2a079c4591e17b7a91e759b9872ff409121fedd5975433265957c8ec4ac,2025-03-05T21:15:21.677000
|
||||
CVE-2025-27653,0,0,c5dbd899dc4e9b32ebd02b603edfdedde4876912e079c638e2ef2e2a12af53bd,2025-03-05T16:15:40.880000
|
||||
CVE-2025-27654,0,0,71bd2de24a90bbf3394e7753a34a6c0e91a286c50c9892093c8520514154b9bb,2025-03-05T16:15:41.043000
|
||||
CVE-2025-27655,0,0,09df5001fb7d473c43f0502d38dbd2679fe2955d2231dcc9c0a973db780aec1c,2025-03-05T17:15:17.763000
|
||||
@ -284232,14 +284238,14 @@ CVE-2025-27661,0,0,077e0a7c9f0328c4a8804f90f903f07a90ac4b28f56f68d85b06a8b026cf7
|
||||
CVE-2025-27662,0,0,26de84e5d6d05c1ade03ac48d67a789bfae45aae7ac630e401e4cff30f3687c2,2025-03-05T17:15:18.933000
|
||||
CVE-2025-27663,0,0,b7f0aadd4cd6e28b1095cd15329f2e0e2629014cd6ac45c04843ac7b6fb8012c,2025-03-05T17:15:19.090000
|
||||
CVE-2025-27664,0,0,2783c537a522312ab4b34337c2271a824caf7a36c61210c1e66b329e00e34a74,2025-03-05T16:15:41.217000
|
||||
CVE-2025-27665,0,0,a1c30f1d141bf5a0c772b56c1d2031c79a2728572211947b83e103825d5cf842,2025-03-05T06:15:38.840000
|
||||
CVE-2025-27666,0,0,6c9cc4a29e2417a709d6ef0cd4cd75ec3ebb86d235a3f6c61ace5d7f64120945,2025-03-05T06:15:38.970000
|
||||
CVE-2025-27667,0,0,77a0a85ba07a0c48e31e3155f9f361de02ec86231b7979adc7d07b91c2cccc66,2025-03-05T06:15:39.100000
|
||||
CVE-2025-27668,0,0,59c279a2fe34cdc2f916e91c4e7eb0dae68531fb2d49d7b3c9f6c0654efacfbc,2025-03-05T06:15:39.237000
|
||||
CVE-2025-27669,0,0,3a89060ddc9c398015cd128a3fb63131337f980375ffac91a014eccfd91017ec,2025-03-05T06:15:39.373000
|
||||
CVE-2025-27670,0,0,76aa85bad4babd0ebfa11c0c6a087e8e6070c146dca39075cb0bf06776882c4c,2025-03-05T06:15:39.537000
|
||||
CVE-2025-27671,0,0,decd4150960a8b3c792cacd9073ee5659cc99638afb3ecb2f8efb6bccc24f08f,2025-03-05T06:15:39.903000
|
||||
CVE-2025-27672,0,0,acd49e0df9fc0da4d4bd584e363cd2373f8b266a039327189d8219454a1ce995,2025-03-05T06:15:40.043000
|
||||
CVE-2025-27665,0,1,6d5cab7710e0b441aed71c54a776a429f1f97d68878cdc37707e5e2f3b7b038e,2025-03-05T21:15:21.907000
|
||||
CVE-2025-27666,0,1,15139f49696811d323c30fef33e944c03b2dd7d43d20f81036983c71666b570d,2025-03-05T21:15:22.087000
|
||||
CVE-2025-27667,0,1,4fa810680e30aaf742ef965f2caac3b7cf8e8a0984efc472005cbc46ca97d6b3,2025-03-05T21:15:22.247000
|
||||
CVE-2025-27668,0,1,5bc78bed271786da3744cbd6a3db0a18beaaa1aa1052a91ec6737bcb18f643c0,2025-03-05T21:15:22.380000
|
||||
CVE-2025-27669,0,1,411965c096608e3a4e451d59b7ff665c281cb912074bc6a48b65a57871577c1f,2025-03-05T21:15:22.510000
|
||||
CVE-2025-27670,0,1,57cadf73849d3103372d7d3becb73c43d1997d51f0692c7bd5820b816d343e82,2025-03-05T21:15:22.647000
|
||||
CVE-2025-27671,0,1,cdbc3c3ae7fa70c66bcc84a7e95060a0bee561e5fcbed5fdeeb25ef7fedba72d,2025-03-05T21:15:22.793000
|
||||
CVE-2025-27672,0,1,f8aef0303d5f34effa4664d6a8f105db11bb49b7cb780f8892bc07e946b4cc03,2025-03-05T21:15:22.930000
|
||||
CVE-2025-27673,0,0,4c1f358b78269c41e8c493cec0c297a47520f604604b8e2d04a064180d029c74,2025-03-05T16:15:41.377000
|
||||
CVE-2025-27674,0,0,d8fc23610bcb24a915473f82731daddbc0f8128bbc64155dc28c05f76f1629d1,2025-03-05T16:15:41.537000
|
||||
CVE-2025-27675,0,0,88fe38f78b5c227dd0fb838c2bc395c16043de26bdf8d95f709edf11fe023d17,2025-03-05T16:15:41.700000
|
||||
@ -284250,6 +284256,6 @@ CVE-2025-27679,0,0,c3477c4348b04a45d06ce63488e43254eae962776a041ca86955406c1debe
|
||||
CVE-2025-27680,0,0,062f918e0746cc120a47d40b4cb35ee63e42fcaf6533382d4ae3a88ae16c2385,2025-03-05T15:15:18.790000
|
||||
CVE-2025-27681,0,0,1e12361dcfb3de67956cc3fb5eef999d9e22cb46ceaa1217bcc9c81dd2bc3d92,2025-03-05T15:15:18.970000
|
||||
CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dcd4c,2025-03-05T15:15:19.130000
|
||||
CVE-2025-27683,0,0,7c3d9658bc9f46e359a510e69c5232639532e74fbe2a541d01814d0e35fcd5a8,2025-03-05T06:15:41.427000
|
||||
CVE-2025-27684,0,0,16ea9daa2771b0c33d2babe4c0a47130eb590a6bc45f6fcd1c3c34c301925ec3,2025-03-05T06:15:41.540000
|
||||
CVE-2025-27685,0,0,5438163b1e96d31de8dab5cde2ed9c114f6c34fffe05c690c30fa9e87c5161d3,2025-03-05T06:15:41.663000
|
||||
CVE-2025-27683,0,1,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
|
||||
CVE-2025-27684,0,1,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
|
||||
CVE-2025-27685,0,1,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user