mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-05T20:00:20.540905+00:00
This commit is contained in:
parent
92007cbadd
commit
0e4b2602d7
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20388",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-09-13T20:15:09.217",
|
||||
"lastModified": "2024-11-21T06:42:43.420",
|
||||
"lastModified": "2025-06-05T19:15:21.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20389",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-09-13T20:15:09.257",
|
||||
"lastModified": "2024-11-21T06:42:43.527",
|
||||
"lastModified": "2025-06-05T19:15:22.960",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20392",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-09-13T20:15:09.390",
|
||||
"lastModified": "2024-11-21T06:42:43.887",
|
||||
"lastModified": "2025-06-05T19:15:23.130",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2654",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-09-16T09:15:10.727",
|
||||
"lastModified": "2024-11-21T07:01:27.060",
|
||||
"lastModified": "2025-06-05T19:15:23.347",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2669",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-09-16T09:15:10.847",
|
||||
"lastModified": "2024-11-21T07:01:28.930",
|
||||
"lastModified": "2025-06-05T19:15:23.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2989",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-09-13T14:15:08.687",
|
||||
"lastModified": "2024-11-21T07:02:02.567",
|
||||
"lastModified": "2025-06-05T19:15:23.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32555",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-09-13T20:15:09.750",
|
||||
"lastModified": "2024-11-21T07:06:37.393",
|
||||
"lastModified": "2025-06-05T19:15:24.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-33631",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.977",
|
||||
"lastModified": "2024-11-21T07:08:12.750",
|
||||
"lastModified": "2025-06-05T19:15:24.277",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-33640",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.097",
|
||||
"lastModified": "2024-11-21T07:08:13.927",
|
||||
"lastModified": "2025-06-05T19:15:24.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-33646",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.157",
|
||||
"lastModified": "2024-11-21T07:08:14.673",
|
||||
"lastModified": "2025-06-05T19:15:24.637",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34691",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.617",
|
||||
"lastModified": "2024-11-21T07:09:59.673",
|
||||
"lastModified": "2025-06-05T19:15:24.820",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34692",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.673",
|
||||
"lastModified": "2024-11-21T07:09:59.810",
|
||||
"lastModified": "2025-06-05T19:15:25.033",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34696",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.730",
|
||||
"lastModified": "2024-11-21T07:09:59.943",
|
||||
"lastModified": "2025-06-05T19:15:25.203",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34699",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.787",
|
||||
"lastModified": "2024-11-21T07:10:00.077",
|
||||
"lastModified": "2025-06-05T19:15:25.383",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39151",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-09-13T10:15:11.770",
|
||||
"lastModified": "2024-11-21T07:17:40.647",
|
||||
"lastModified": "2025-06-05T19:15:25.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12842",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-20T20:15:21.880",
|
||||
"lastModified": "2024-12-24T17:15:08.800",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:43:22.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,69 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
|
||||
"versionEndExcluding": "2.4.1",
|
||||
"matchCriteriaId": "B449A14E-7C7E-4541-95AB-C2E55846E4D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/emlog/emlog/issues/305",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.289078",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289078",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/emlog/emlog/issues/305",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13192",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-08T23:15:09.017",
|
||||
"lastModified": "2025-01-09T17:15:11.420",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:44:22.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,83 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zerowdd:myblog:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61F46EB8-93D0-4634-A9D1-5823309AA2F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.290784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.290784",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.469232",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZeroWdd/myblog/issues/4",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13194",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-09T00:15:25.357",
|
||||
"lastModified": "2025-01-09T17:15:11.690",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:45:03.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sucms_project:sucms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54E4EEF5-A773-4381-AAC6-ECA5936AB714"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.290786",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.290786",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.469566",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22027",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-01-12T07:15:12.243",
|
||||
"lastModified": "2024-11-21T08:55:25.607",
|
||||
"lastModified": "2025-06-05T19:15:25.847",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24014",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T02:15:07.840",
|
||||
"lastModified": "2024-11-21T08:58:49.353",
|
||||
"lastModified": "2025-06-05T19:15:26.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24019",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-07T01:15:08.653",
|
||||
"lastModified": "2024-11-21T08:58:50.063",
|
||||
"lastModified": "2025-06-05T19:15:26.293",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24131",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-07T14:15:52.770",
|
||||
"lastModified": "2024-11-21T08:58:57.127",
|
||||
"lastModified": "2025-06-05T19:15:26.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24135",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-29T19:15:08.990",
|
||||
"lastModified": "2024-11-21T08:58:57.643",
|
||||
"lastModified": "2025-06-05T19:15:26.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24254",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T22:16:15.010",
|
||||
"lastModified": "2024-11-21T08:59:03.540",
|
||||
"lastModified": "2025-06-05T19:15:27.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24258",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-05T18:15:52.083",
|
||||
"lastModified": "2024-11-21T08:59:04.247",
|
||||
"lastModified": "2025-06-05T19:15:27.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24266",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-05T18:15:52.380",
|
||||
"lastModified": "2024-11-21T08:59:05.313",
|
||||
"lastModified": "2025-06-05T19:15:27.480",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24311",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-07T09:15:16.053",
|
||||
"lastModified": "2024-11-21T08:59:09.177",
|
||||
"lastModified": "2025-06-05T19:15:27.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.870",
|
||||
"lastModified": "2024-11-21T08:59:13.680",
|
||||
"lastModified": "2025-06-05T19:15:27.903",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24399",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-25T21:15:09.563",
|
||||
"lastModified": "2024-11-21T08:59:14.690",
|
||||
"lastModified": "2025-06-05T19:15:28.127",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-07T20:15:49.467",
|
||||
"lastModified": "2024-11-21T08:59:20.560",
|
||||
"lastModified": "2025-06-05T19:15:28.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1216",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-12T19:15:10.427",
|
||||
"lastModified": "2025-02-12T20:15:39.907",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:46:48.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,70 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295175",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295175",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1224",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-12T20:15:40.030",
|
||||
"lastModified": "2025-02-13T15:15:20.500",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:47:07.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,70 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI731",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295210",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295210",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI731",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1225",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-12T20:15:40.203",
|
||||
"lastModified": "2025-02-12T20:15:40.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:47:35.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,20 +122,61 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI81R",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295211",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295211",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1226",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-12T21:15:20.470",
|
||||
"lastModified": "2025-02-12T21:15:20.470",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:50:14.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,20 +142,61 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295216",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295216",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1227",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-12T21:15:20.657",
|
||||
"lastModified": "2025-02-12T22:15:41.383",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:50:47.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,70 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.07.04",
|
||||
"matchCriteriaId": "5A824C24-F668-47E1-8E22-22A4071E244F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295217",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295217",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1812",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-02T09:15:10.903",
|
||||
"lastModified": "2025-03-03T21:15:17.640",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:52:43.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,77 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024-8",
|
||||
"matchCriteriaId": "A5C7A823-BB3D-4566-8921-70E33154D2FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/A7cc/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298080",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298080",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504273",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/A7cc/cve/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1840",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T00:15:42.857",
|
||||
"lastModified": "2025-03-03T20:15:45.073",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:55:58.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esafenet:cdg:5.6.3.154.205:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53AB2E5C-D018-44CE-B686-718995388DCF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298106",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298106",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504384",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-20286",
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2025-06-04T17:15:28.427",
|
||||
"lastModified": "2025-06-04T21:15:37.940",
|
||||
"lastModified": "2025-06-05T19:15:28.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected."
|
||||
"value": "A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\n\r\nThis vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.\r\nNote: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en las implementaciones en la nube de Cisco Identity Services Engine (ISE) de Amazon Web Services (AWS), Microsoft Azure y Oracle Cloud Infrastructure (OCI) podr\u00eda permitir que un atacante remoto no autenticado acceda a datos confidenciales, ejecute operaciones administrativas limitadas, modifique la configuraci\u00f3n del sistema o interrumpa los servicios de los sistemas afectados. Esta vulnerabilidad se debe a que las credenciales se generan incorrectamente al implementar Cisco ISE en plataformas en la nube, lo que provoca que diferentes implementaciones de Cisco ISE compartan las mismas credenciales. Estas credenciales se comparten entre m\u00faltiples implementaciones de Cisco ISE siempre que la versi\u00f3n de software y la plataforma en la nube sean las mismas. Un atacante podr\u00eda explotar esta vulnerabilidad extrayendo las credenciales de usuario de Cisco ISE implementado en la nube y us\u00e1ndolas para acceder a Cisco ISE implementado en otros entornos de nube a trav\u00e9s de puertos no seguros. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a datos confidenciales, ejecutar operaciones administrativas limitadas, modificar la configuraci\u00f3n del sistema o interrumpir los servicios de los sistemas afectados. Nota: Si el nodo de administraci\u00f3n principal est\u00e1 implementado en la nube, Cisco ISE se ve afectado por esta vulnerabilidad. Si el nodo de administraci\u00f3n principal est\u00e1 local, no se ver\u00e1 afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-2914",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-28T17:15:30.510",
|
||||
"lastModified": "2025-03-28T18:11:40.180",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:21:11.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
@ -122,24 +122,69 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.14.6",
|
||||
"matchCriteriaId": "F9158517-069A-4BE6-98F2-EBFDE3437236"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HDFGroup/hdf5/issues/5379",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301887",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301887",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520880",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-2923",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-28T19:15:24.003",
|
||||
"lastModified": "2025-04-01T20:26:39.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:21:58.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
@ -122,24 +122,69 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.14.6",
|
||||
"matchCriteriaId": "182E217E-3979-463D-91D3-1028EB9F9725"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HDFGroup/hdf5/issues/5381",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301898",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301898",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521151",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3536",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-13T12:15:15.533",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:26:38.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,24 +122,64 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tutorials-website:employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61BBBA88-B561-4438-8255-A2D6D768C48E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.304574",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.304574",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.545810",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.websecurityinsights.my.id/2025/03/tutorials-website-employee-management.html",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3537",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-13T12:15:15.713",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:27:31.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,24 +122,67 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tutorials-website:employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61BBBA88-B561-4438-8255-A2D6D768C48E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.304575",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.304575",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.545859",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.websecurityinsights.my.id/2025/03/tutorials-website-employee-management_28.html",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3587",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-14T20:15:19.800",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:28:11.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zerowdd:studentmanager:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2375E47D-661D-4707-AC3E-A71C23BEF7FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/ZeroWdd-studentmanager-authority.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.304642",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.304642",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.550129",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/ZeroWdd-studentmanager-authority.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-462xx/CVE-2025-46257.json
Normal file
56
CVE-2025/CVE-2025-462xx/CVE-2025-46257.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-46257",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-05T18:15:21.753",
|
||||
"lastModified": "2025-06-05T18:15:21.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in BdThemes Element Pack Pro allows Cross Site Request Forgery.This issue affects Element Pack Pro: from n/a before 8.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/bdthemes-element-pack/vulnerability/wordpress-element-pack-pro-plugin-7-18-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-462xx/CVE-2025-46258.json
Normal file
56
CVE-2025/CVE-2025-462xx/CVE-2025-46258.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-46258",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-05T18:15:22.163",
|
||||
"lastModified": "2025-06-05T18:15:22.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in BdThemes Element Pack Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Element Pack Pro: from n/a before 8.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/bdthemes-element-pack/vulnerability/wordpress-element-pack-pro-plugin-7-18-12-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-47616",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-05-07T15:16:14.773",
|
||||
"lastModified": "2025-05-08T14:39:09.683",
|
||||
"lastModified": "2025-06-05T19:15:28.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Imran aBlocks allows Stored XSS. This issue affects aBlocks: from n/a through 1.9.1."
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Imran aBlocks allows Stored XSS.This issue affects aBlocks: from n/a through 1.9.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4770",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-16T11:15:46.150",
|
||||
"lastModified": "2025-05-16T14:42:18.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:35:54.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:park_ticketing_management_system:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "033F3C02-8BD6-4644-8A6B-D3351806F60C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309071",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309071",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.572134",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4780",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-16T14:15:34.887",
|
||||
"lastModified": "2025-05-16T14:42:18.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:36:06.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,73 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:park_ticketing_management_system:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "033F3C02-8BD6-4644-8A6B-D3351806F60C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309077",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309077",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.572163",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4894",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-18T20:15:18.803",
|
||||
"lastModified": "2025-05-19T13:35:20.460",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:39:01.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,20 +142,60 @@
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:calmkart:django-sso-server:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81391B2C-C30E-41D4-838B-60B868BB7EBB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309448",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309448",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.578019",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4936",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T15:15:36.650",
|
||||
"lastModified": "2025-05-21T20:25:33.823",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:39:27.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,68 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC5341DF-BF6E-450B-B216-A427E5FE8F98"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sknadklasdls/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309498",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309498",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.579823",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-4937",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T15:15:36.827",
|
||||
"lastModified": "2025-05-21T20:25:33.823",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-05T19:42:48.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:apartment_visitor_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "301F4327-9B9E-4624-BDFD-B0482CD517D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Angel12345623/CVE/blob/main/CVE_3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.309499",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.309499",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.579830",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5668",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T17:15:29.730",
|
||||
"lastModified": "2025-06-05T17:15:29.730",
|
||||
"lastModified": "2025-06-05T18:15:22.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590064",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/50",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5669",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T17:15:29.917",
|
||||
"lastModified": "2025-06-05T17:15:29.917",
|
||||
"lastModified": "2025-06-05T18:15:22.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590065",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/51",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5670",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T17:15:30.117",
|
||||
"lastModified": "2025-06-05T17:15:30.117",
|
||||
"lastModified": "2025-06-05T18:15:22.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590066",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/f1rstb100d/myCVE/issues/52",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5671.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5671.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5671",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T18:15:22.947",
|
||||
"lastModified": "2025-06-05T18:15:22.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK N302R Plus up to 3.4.0-B20201028. Affected is an unknown function of the file /boafrm/formPortFw of the component HTTP POST Request Handler. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/byxs0x0/cve2/blob/main/530/1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311160",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311160",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590093",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5672.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5672.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5672",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T18:15:23.220",
|
||||
"lastModified": "2025-06-05T18:15:23.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in TOTOLINK N302R Plus up to 3.4.0-B20201028 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation of the argument url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/byxs0x0/cve2/blob/main/530/2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311161",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311161",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590094",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5674.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5674.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5674",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T19:15:29.627",
|
||||
"lastModified": "2025-06-05T19:15:29.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file urinalysis_form.php. The manipulation of the argument urinalysis_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yuyuchenchen/vuln-pdf/blob/main/0603CVE.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311162",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311162",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590120",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5675.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5675.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5675",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T19:15:29.993",
|
||||
"lastModified": "2025-06-05T19:15:29.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Teacher Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /trms/admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/modestHonK/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311163",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311163",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590124",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5676.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5676.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5676",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T19:15:30.247",
|
||||
"lastModified": "2025-06-05T19:15:30.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hyx123123/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311164",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311164",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590134",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-56xx/CVE-2025-5677.json
Normal file
145
CVE-2025/CVE-2025-56xx/CVE-2025-5677.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5677",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T19:15:30.487",
|
||||
"lastModified": "2025-06-05T19:15:30.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/ajax.php?action=save_application. The manipulation of the argument position_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hyx123123/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311165",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311165",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.590135",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.campcodes.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-56xx/CVE-2025-5679.json
Normal file
141
CVE-2025/CVE-2025-56xx/CVE-2025-5679.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-5679",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-05T19:15:30.697",
|
||||
"lastModified": "2025-06-05T19:15:30.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 2.5.0. Affected is the function parseStrByFreeMarker of the file /src/main/java/com/dstz/sys/rest/controller/SysToolsController.java. The manipulation of the argument str leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/agile-bpm/agile-bpm-basic/issues/ICAQWG",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311166",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311166",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.585127",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5683",
|
||||
"sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
|
||||
"published": "2025-06-05T06:15:27.517",
|
||||
"lastModified": "2025-06-05T06:15:27.517",
|
||||
"lastModified": "2025-06-05T19:15:30.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When loading a specifically crafted ICNS format image file in QImage then it will trigger a crash.\u00a0This issue affects Qt from versions 6.3.0 through 6.5.9, from 6.6.0 through 6.8.4, 6.9.0. This is fixed in 6.5.10, 6.8.5 and 6.9.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al cargar un archivo de imagen con formato ICNS especialmente manipulado en QImage, se produce un bloqueo. Este problema afecta a Qt desde la versi\u00f3n 6.3.0 hasta la 6.5.9, desde la 6.6.0 hasta la 6.8.4 y la 6.9.0. Se ha corregido en las versiones 6.5.10, 6.8.5 y 6.9.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codereview.qt-project.org/c/qt/qtimageformats/+/644548",
|
||||
|
21
CVE-2025/CVE-2025-57xx/CVE-2025-5702.json
Normal file
21
CVE-2025/CVE-2025-57xx/CVE-2025-5702.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-5702",
|
||||
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
|
||||
"published": "2025-06-05T19:15:31.073",
|
||||
"lastModified": "2025-06-05T19:15:31.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33056",
|
||||
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18"
|
||||
}
|
||||
]
|
||||
}
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-05T18:00:19.082029+00:00
|
||||
2025-06-05T20:00:20.540905+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-05T17:15:30.117000+00:00
|
||||
2025-06-05T19:55:58.760000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296591
|
||||
296601
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2025-48493](CVE-2025/CVE-2025-484xx/CVE-2025-48493.json) (`2025-06-05T17:15:29.377`)
|
||||
- [CVE-2025-49009](CVE-2025/CVE-2025-490xx/CVE-2025-49009.json) (`2025-06-05T17:15:29.570`)
|
||||
- [CVE-2025-5666](CVE-2025/CVE-2025-56xx/CVE-2025-5666.json) (`2025-06-05T16:15:27.470`)
|
||||
- [CVE-2025-5667](CVE-2025/CVE-2025-56xx/CVE-2025-5667.json) (`2025-06-05T16:15:27.683`)
|
||||
- [CVE-2025-5668](CVE-2025/CVE-2025-56xx/CVE-2025-5668.json) (`2025-06-05T17:15:29.730`)
|
||||
- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-05T17:15:29.917`)
|
||||
- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-05T17:15:30.117`)
|
||||
- [CVE-2025-46257](CVE-2025/CVE-2025-462xx/CVE-2025-46257.json) (`2025-06-05T18:15:21.753`)
|
||||
- [CVE-2025-46258](CVE-2025/CVE-2025-462xx/CVE-2025-46258.json) (`2025-06-05T18:15:22.163`)
|
||||
- [CVE-2025-5671](CVE-2025/CVE-2025-56xx/CVE-2025-5671.json) (`2025-06-05T18:15:22.947`)
|
||||
- [CVE-2025-5672](CVE-2025/CVE-2025-56xx/CVE-2025-5672.json) (`2025-06-05T18:15:23.220`)
|
||||
- [CVE-2025-5674](CVE-2025/CVE-2025-56xx/CVE-2025-5674.json) (`2025-06-05T19:15:29.627`)
|
||||
- [CVE-2025-5675](CVE-2025/CVE-2025-56xx/CVE-2025-5675.json) (`2025-06-05T19:15:29.993`)
|
||||
- [CVE-2025-5676](CVE-2025/CVE-2025-56xx/CVE-2025-5676.json) (`2025-06-05T19:15:30.247`)
|
||||
- [CVE-2025-5677](CVE-2025/CVE-2025-56xx/CVE-2025-5677.json) (`2025-06-05T19:15:30.487`)
|
||||
- [CVE-2025-5679](CVE-2025/CVE-2025-56xx/CVE-2025-5679.json) (`2025-06-05T19:15:30.697`)
|
||||
- [CVE-2025-5702](CVE-2025/CVE-2025-57xx/CVE-2025-5702.json) (`2025-06-05T19:15:31.073`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `32`
|
||||
Recently modified CVEs: `53`
|
||||
|
||||
- [CVE-2024-12329](CVE-2024/CVE-2024-123xx/CVE-2024-12329.json) (`2025-06-05T16:05:14.507`)
|
||||
- [CVE-2024-22021](CVE-2024/CVE-2024-220xx/CVE-2024-22021.json) (`2025-06-05T17:15:26.977`)
|
||||
- [CVE-2024-22075](CVE-2024/CVE-2024-220xx/CVE-2024-22075.json) (`2025-06-05T17:15:27.147`)
|
||||
- [CVE-2024-22108](CVE-2024/CVE-2024-221xx/CVE-2024-22108.json) (`2025-06-05T17:15:27.387`)
|
||||
- [CVE-2024-22365](CVE-2024/CVE-2024-223xx/CVE-2024-22365.json) (`2025-06-05T17:15:27.617`)
|
||||
- [CVE-2024-22380](CVE-2024/CVE-2024-223xx/CVE-2024-22380.json) (`2025-06-05T16:15:24.747`)
|
||||
- [CVE-2024-22491](CVE-2024/CVE-2024-224xx/CVE-2024-22491.json) (`2025-06-05T17:15:27.837`)
|
||||
- [CVE-2024-22496](CVE-2024/CVE-2024-224xx/CVE-2024-22496.json) (`2025-06-05T17:15:28.053`)
|
||||
- [CVE-2024-22519](CVE-2024/CVE-2024-225xx/CVE-2024-22519.json) (`2025-06-05T16:15:25.883`)
|
||||
- [CVE-2024-22548](CVE-2024/CVE-2024-225xx/CVE-2024-22548.json) (`2025-06-05T17:15:28.270`)
|
||||
- [CVE-2024-22699](CVE-2024/CVE-2024-226xx/CVE-2024-22699.json) (`2025-06-05T16:15:26.100`)
|
||||
- [CVE-2024-22720](CVE-2024/CVE-2024-227xx/CVE-2024-22720.json) (`2025-06-05T16:15:26.310`)
|
||||
- [CVE-2024-22773](CVE-2024/CVE-2024-227xx/CVE-2024-22773.json) (`2025-06-05T17:15:28.480`)
|
||||
- [CVE-2024-22795](CVE-2024/CVE-2024-227xx/CVE-2024-22795.json) (`2025-06-05T16:15:26.540`)
|
||||
- [CVE-2024-22817](CVE-2024/CVE-2024-228xx/CVE-2024-22817.json) (`2025-06-05T17:15:28.713`)
|
||||
- [CVE-2024-22851](CVE-2024/CVE-2024-228xx/CVE-2024-22851.json) (`2025-06-05T17:15:28.920`)
|
||||
- [CVE-2024-22895](CVE-2024/CVE-2024-228xx/CVE-2024-22895.json) (`2025-06-05T16:15:26.750`)
|
||||
- [CVE-2024-22911](CVE-2024/CVE-2024-229xx/CVE-2024-22911.json) (`2025-06-05T16:15:26.963`)
|
||||
- [CVE-2024-22919](CVE-2024/CVE-2024-229xx/CVE-2024-22919.json) (`2025-06-05T17:15:29.160`)
|
||||
- [CVE-2024-4892](CVE-2024/CVE-2024-48xx/CVE-2024-4892.json) (`2025-06-05T16:23:47.540`)
|
||||
- [CVE-2024-6704](CVE-2024/CVE-2024-67xx/CVE-2024-6704.json) (`2025-06-05T16:38:43.267`)
|
||||
- [CVE-2024-9531](CVE-2024/CVE-2024-95xx/CVE-2024-9531.json) (`2025-06-05T16:56:56.240`)
|
||||
- [CVE-2024-9940](CVE-2024/CVE-2024-99xx/CVE-2024-9940.json) (`2025-06-05T16:40:26.147`)
|
||||
- [CVE-2024-9943](CVE-2024/CVE-2024-99xx/CVE-2024-9943.json) (`2025-06-05T16:57:08.370`)
|
||||
- [CVE-2025-5214](CVE-2025/CVE-2025-52xx/CVE-2025-5214.json) (`2025-06-05T16:00:18.113`)
|
||||
- [CVE-2024-24399](CVE-2024/CVE-2024-243xx/CVE-2024-24399.json) (`2025-06-05T19:15:28.127`)
|
||||
- [CVE-2024-24488](CVE-2024/CVE-2024-244xx/CVE-2024-24488.json) (`2025-06-05T19:15:28.363`)
|
||||
- [CVE-2025-1216](CVE-2025/CVE-2025-12xx/CVE-2025-1216.json) (`2025-06-05T19:46:48.060`)
|
||||
- [CVE-2025-1224](CVE-2025/CVE-2025-12xx/CVE-2025-1224.json) (`2025-06-05T19:47:07.900`)
|
||||
- [CVE-2025-1225](CVE-2025/CVE-2025-12xx/CVE-2025-1225.json) (`2025-06-05T19:47:35.927`)
|
||||
- [CVE-2025-1226](CVE-2025/CVE-2025-12xx/CVE-2025-1226.json) (`2025-06-05T19:50:14.263`)
|
||||
- [CVE-2025-1227](CVE-2025/CVE-2025-12xx/CVE-2025-1227.json) (`2025-06-05T19:50:47.190`)
|
||||
- [CVE-2025-1812](CVE-2025/CVE-2025-18xx/CVE-2025-1812.json) (`2025-06-05T19:52:43.550`)
|
||||
- [CVE-2025-1840](CVE-2025/CVE-2025-18xx/CVE-2025-1840.json) (`2025-06-05T19:55:58.760`)
|
||||
- [CVE-2025-20286](CVE-2025/CVE-2025-202xx/CVE-2025-20286.json) (`2025-06-05T19:15:28.590`)
|
||||
- [CVE-2025-2914](CVE-2025/CVE-2025-29xx/CVE-2025-2914.json) (`2025-06-05T19:21:11.357`)
|
||||
- [CVE-2025-2923](CVE-2025/CVE-2025-29xx/CVE-2025-2923.json) (`2025-06-05T19:21:58.263`)
|
||||
- [CVE-2025-3536](CVE-2025/CVE-2025-35xx/CVE-2025-3536.json) (`2025-06-05T19:26:38.817`)
|
||||
- [CVE-2025-3537](CVE-2025/CVE-2025-35xx/CVE-2025-3537.json) (`2025-06-05T19:27:31.170`)
|
||||
- [CVE-2025-3587](CVE-2025/CVE-2025-35xx/CVE-2025-3587.json) (`2025-06-05T19:28:11.513`)
|
||||
- [CVE-2025-47616](CVE-2025/CVE-2025-476xx/CVE-2025-47616.json) (`2025-06-05T19:15:28.853`)
|
||||
- [CVE-2025-4770](CVE-2025/CVE-2025-47xx/CVE-2025-4770.json) (`2025-06-05T19:35:54.267`)
|
||||
- [CVE-2025-4780](CVE-2025/CVE-2025-47xx/CVE-2025-4780.json) (`2025-06-05T19:36:06.897`)
|
||||
- [CVE-2025-4894](CVE-2025/CVE-2025-48xx/CVE-2025-4894.json) (`2025-06-05T19:39:01.520`)
|
||||
- [CVE-2025-4936](CVE-2025/CVE-2025-49xx/CVE-2025-4936.json) (`2025-06-05T19:39:27.940`)
|
||||
- [CVE-2025-4937](CVE-2025/CVE-2025-49xx/CVE-2025-4937.json) (`2025-06-05T19:42:48.337`)
|
||||
- [CVE-2025-5668](CVE-2025/CVE-2025-56xx/CVE-2025-5668.json) (`2025-06-05T18:15:22.447`)
|
||||
- [CVE-2025-5669](CVE-2025/CVE-2025-56xx/CVE-2025-5669.json) (`2025-06-05T18:15:22.627`)
|
||||
- [CVE-2025-5670](CVE-2025/CVE-2025-56xx/CVE-2025-5670.json) (`2025-06-05T18:15:22.790`)
|
||||
- [CVE-2025-5683](CVE-2025/CVE-2025-56xx/CVE-2025-5683.json) (`2025-06-05T19:15:30.890`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
188
_state.csv
188
_state.csv
@ -47847,7 +47847,7 @@ CVE-2011-10003,0,0,6412423cbcc1d2918013fc1df3cebbbcb3b7584426cce9ea1b9953240234b
|
||||
CVE-2011-10004,0,0,ec3da51d090457791c200e7f71e78a08f52c2aec5e3aab2bdb5915aa68bee988,2024-11-21T01:25:17.503000
|
||||
CVE-2011-10005,0,0,627c8d48b59c9d04a5be3ca9721abb26f33a91af30259ed758e346cc8b2645eb,2024-11-21T01:25:17.667000
|
||||
CVE-2011-10006,0,0,dd734ea71adfdfffdfb5628f909ca34f56f35c648e0de9eca7d4ff5e5f1df3de,2025-04-11T12:51:20.457000
|
||||
CVE-2011-10007,0,1,a8ee12775bd2eaa61214d6007438a33c4167b09e627f15d0449696ab2f3e0f4d,2025-06-05T17:15:25.990000
|
||||
CVE-2011-10007,0,0,a8ee12775bd2eaa61214d6007438a33c4167b09e627f15d0449696ab2f3e0f4d,2025-06-05T17:15:25.990000
|
||||
CVE-2011-1001,0,0,11839c7b8e84067f9cb7b0fb6341ae801683b41bcddc1fb61a0d4d9d0b6749f0,2025-04-11T00:51:21.963000
|
||||
CVE-2011-1002,0,0,d33347c721e3b89d36f002b1fe6013c7e41d667ea328068299497443349dd1dd,2025-04-11T00:51:21.963000
|
||||
CVE-2011-1003,0,0,d7e1f3fe9a186593ca7a3a72b1b932ddf10706cfcc913dbcaa45bff48d214fa4,2025-04-11T00:51:21.963000
|
||||
@ -190279,12 +190279,12 @@ CVE-2022-20384,0,0,35e06eb303fc627c1ef149a4f431897f7d77ba5ba4cd40fc6a13edba6f884
|
||||
CVE-2022-20385,0,0,e2c1186dbfc643cbfaa62c0ead535ae0517873c6966e54937d73e4dd2813aa90,2024-11-21T06:42:43.090000
|
||||
CVE-2022-20386,0,0,d1cf92873c6b418dae0c0d78fef0bc939ae3204b5ac1230a3a5250d5480bec2a,2024-11-21T06:42:43.203000
|
||||
CVE-2022-20387,0,0,746566ed640803bbef46b4f6b64e03e760cd336cdee8e59a5f13400e28018239,2024-11-21T06:42:43.310000
|
||||
CVE-2022-20388,0,0,9b1f7aaa00f206c0a5e3e726250cee6b973c2f349bfeeeb38b0b073b4da7c4e8,2024-11-21T06:42:43.420000
|
||||
CVE-2022-20389,0,0,b2b9bd27cdab51670f59fec52983d5fc3d85ee2d8c6e9453a8725dc6da27476a,2024-11-21T06:42:43.527000
|
||||
CVE-2022-20388,0,1,9a1d5e7a0199964698e598673ade93a15d0b2f2c2a860522974a5b649c7922b2,2025-06-05T19:15:21.330000
|
||||
CVE-2022-20389,0,1,9267787ceeabf089c8354abb5353a85c462d6ca63c05af274d8db1a05dfa6f7b,2025-06-05T19:15:22.960000
|
||||
CVE-2022-2039,0,0,590d5cb3e44b098d4219f1e3142ba97efb6dcb5aa9d225f1fa577906af3e42d7,2024-11-21T07:00:13
|
||||
CVE-2022-20390,0,0,f9d64becfca90c1403dfc61670c18934d90ee221eb29c58d9cccf0bc619d6f2b,2024-11-21T06:42:43.633000
|
||||
CVE-2022-20391,0,0,1b5cd3d9aff0cfe6b0eaff4280a1a334454e30d6be0a3dc00c5a660eaa712e5d,2024-11-21T06:42:43.757000
|
||||
CVE-2022-20392,0,0,de17eb60e6b885ea2307b24fffdf9995c3e42b0e7a28cedea5459907b3e42f17,2024-11-21T06:42:43.887000
|
||||
CVE-2022-20392,0,1,7abadec4c92cc99c35f17c55abe9dcd352b700bb9b58170d1c07fcf0a8deef9d,2025-06-05T19:15:23.130000
|
||||
CVE-2022-20393,0,0,91dbd99333d0d3ccf5d948e8c924b85b799ff907f9d75263fbae6e7929f793bb,2024-11-21T06:42:43.990000
|
||||
CVE-2022-20394,0,0,38af25026800ba902fcdfc0b528cf7770a01f4470c2b93ff8a98494ff347e05e,2024-11-21T06:42:44.103000
|
||||
CVE-2022-20395,0,0,a171f2c9b9c8ab678cbce86f5a28450748be4e5ef955c9c7de9ce87b81e3a00c,2024-11-21T06:42:44.210000
|
||||
@ -195859,7 +195859,7 @@ CVE-2022-26532,0,0,b82eef4958d012871dfa1b24313771a9936cc8638d2af5c7c3f5bd6b4ae42
|
||||
CVE-2022-26533,0,0,7d258b41083ca4a5b0b77fef26b74e9b51497b34afbb69708ba2bcdedca89a4a,2024-11-21T06:54:07.843000
|
||||
CVE-2022-26534,0,0,1c2cdb4096107940473434c769b2a3e3bfe863498df1dcf61802684e1b028205,2024-11-21T06:54:07.977000
|
||||
CVE-2022-26536,0,0,7d779a7f81fe406633d0f08e70c0381fcfa49c47a673fa8eae8718dd640e52fb,2024-11-21T06:54:08.113000
|
||||
CVE-2022-2654,0,0,c6cfcbde1b2e92bf1db4a35cb6975eed171117088342a0f9cf747a44052877db,2024-11-21T07:01:27.060000
|
||||
CVE-2022-2654,0,1,0af21277fc069e25f0a575bed9b5e31f01d5cb2b6a90ce69ecb4b7ef253ccd18,2025-06-05T19:15:23.347000
|
||||
CVE-2022-26546,0,0,2a537dc9806e5964ebba34e8bb06a252e742921653ca4c065d55000238b5e881,2024-11-21T06:54:08.250000
|
||||
CVE-2022-2655,0,0,43f9a1e291b3cc06fd8ec5cec141e0db9dd39cab6a82b2b24b88b19a7737d37b,2024-11-21T07:01:27.193000
|
||||
CVE-2022-26555,0,0,5859763716f4c180deca0a19d94e0b6cfe83bfc6164f8960a0ac43f394062a5f,2024-11-21T06:54:08.387000
|
||||
@ -195950,7 +195950,7 @@ CVE-2022-26676,0,0,8adf1f8af1a73a2e1276c75952f750619976c82b50b14d54c291b5482543c
|
||||
CVE-2022-2668,0,0,5c8f0b42c1406fec80806416138736fc85faf5a17771a24d88997af54db37dc7,2024-11-21T07:01:28.817000
|
||||
CVE-2022-26688,0,0,3ffed6077291f18ab9399ab0a5259ee6974767f12950f8fa65d6733b50f81d0a,2024-11-21T06:54:19.403000
|
||||
CVE-2022-26689,0,0,deaedd8a58eca4d07c9fbdbfd0c0915fa63ea5b5f78512802e0c62bbea4cd74e,2023-11-07T03:45:07.027000
|
||||
CVE-2022-2669,0,0,4cca57f47494fbc98147aa500cd42881b91e09a65095c717a52dda296d04c003,2024-11-21T07:01:28.930000
|
||||
CVE-2022-2669,0,1,41d2566596417d8f8fb5f54d4b4828883eeee3a89ae8622ef9340b9694467317,2025-06-05T19:15:23.580000
|
||||
CVE-2022-26690,0,0,54c9e43cec1a117539f5af1508bf5669528bbd342948f37b46bc188475cf84b9,2024-11-21T06:54:19.550000
|
||||
CVE-2022-26691,0,0,dfa7835fabbbf582a36b3516338ce1c7914a142419b6d7ef28adaeaa3f24e53f,2024-11-21T06:54:19.673000
|
||||
CVE-2022-26692,0,0,9c1b476f3a9dc681b185c0b87bedd4e9f2e9762298630db043d5f30c95a01d50,2023-11-07T03:45:08.050000
|
||||
@ -198581,7 +198581,7 @@ CVE-2022-29886,0,0,e6d3840c9f2f86a3d4478eeaabf57edd24cadf53d2d8be7da83416f20122c
|
||||
CVE-2022-29887,0,0,ac22ec06d9ff1c9ea2219424fd2069a01b39744835c1e0d9099e4bce047d4ff7,2024-11-21T06:59:54.570000
|
||||
CVE-2022-29888,0,0,ea4dfa2b79981cfa2c77f5db69c45837ea2030b32bca774e3c72b90e449f9b5c,2024-11-21T06:59:54.693000
|
||||
CVE-2022-29889,0,0,8ba99339c82b532d12e51563ff04dd341e38118cab53bcaf85cf0c792da5cd15,2024-11-21T06:59:54.807000
|
||||
CVE-2022-2989,0,0,d506cba189f970f15df41782d4da48e53239d6d86b76fc54f4f4abfc543bd203,2024-11-21T07:02:02.567000
|
||||
CVE-2022-2989,0,1,a5667d8d1305342f9fbeeb9f4be1ba55bb854655200e9da28bbdd1628df9861b,2025-06-05T19:15:23.780000
|
||||
CVE-2022-29890,0,0,5030b13e6373d80760df0fb588cc34171bafa21cefc78e4c7d52c26fd1568912,2024-11-21T06:59:54.920000
|
||||
CVE-2022-29891,0,0,cae907f253ec1469f7f3670a9c8e3612cfce6c905f5b2731069a7dc5551e921f,2024-11-21T06:59:55.037000
|
||||
CVE-2022-29892,0,0,ac1ecb06f499e7cc7623dc9504513c104504ede66501eb38ca32d59f49196e9c,2024-11-21T06:59:55.153000
|
||||
@ -200802,7 +200802,7 @@ CVE-2022-32551,0,0,e8b56596192cf90bbe70fbecc4e3f485e65ede24b24845dc336e667a1b97a
|
||||
CVE-2022-32552,0,0,08dd4697bc7a3037a6e557c98468b9164bf9d02a5f04699cca3cdb0b6ed369dd,2024-11-21T07:06:36.953000
|
||||
CVE-2022-32553,0,0,6991cff87d6ed3e51805e4c7e97c1aac961f7940f09120db3d2218ebb1dc3204,2024-11-21T07:06:37.100000
|
||||
CVE-2022-32554,0,0,3352f33235fcdc9a9e23b099973c69a739cee9872f9c56e53f44f314e48b1137,2024-11-21T07:06:37.240000
|
||||
CVE-2022-32555,0,0,e4de7c0bafddc927204e949de9b87840bd56a9a0680410275abe5cf4dc76dc35,2024-11-21T07:06:37.393000
|
||||
CVE-2022-32555,0,1,eaad4773ef1da86f81f9ed83b3fc7c50e9e1e1c6dfe55846b5db1a12a1f1c831,2025-06-05T19:15:24.040000
|
||||
CVE-2022-32556,0,0,e6e301ba9d00a1199864aee1f9eaf891ebe5c5de0465d2f00aa39646f9350bca,2024-11-21T07:06:37.533000
|
||||
CVE-2022-32557,0,0,d8a0747b458e47c9ffc5902bb28dd4699e7bbf41b429deeb0b6b91a71fb3e321,2024-11-21T07:06:37.683000
|
||||
CVE-2022-32558,0,0,1d5101db393eb69816434bdecef41fc2ba4d4589d5ddf267fce2323b9f155446,2024-11-21T07:06:37.830000
|
||||
@ -201573,7 +201573,7 @@ CVE-2022-3360,0,0,9d75e252df51b2c5b1e5e885b585075338d05e688eff32fcab2b846f80a8b4
|
||||
CVE-2022-3361,0,0,673440507d463bac799b27de862a1e0ad14d5cdec3dbef09bb9458f1a54b72b9,2024-11-21T07:19:22.360000
|
||||
CVE-2022-3362,0,0,fa3c85c78075a5b23404fdf0b4d624d34b6a473a82a2cdd4464495179acf966c,2024-11-21T07:19:22.487000
|
||||
CVE-2022-3363,0,0,29743f39bcb5bc694e582fb02454906ee8bccb0df4b6981c2f0105a9193c9133,2025-05-07T19:16:05.753000
|
||||
CVE-2022-33631,0,0,a9607c981c0a9fb46801735337549412bd131562cbab74957081eee7844141b8,2024-11-21T07:08:12.750000
|
||||
CVE-2022-33631,0,1,b98c483b538a002d11da59ecfa8c14346432be286e4a4f32e3049e71fa539fb1,2025-06-05T19:15:24.277000
|
||||
CVE-2022-33632,0,0,2d5701cdc42f201c2433fb655509c4d2a1defcda100427b44020705bbb936adb,2024-11-21T07:08:12.893000
|
||||
CVE-2022-33633,0,0,fef725eb13c393831b5dbb62dd8fec4a0e534d3260f0274ca793099b1e337544,2024-11-21T07:08:13.023000
|
||||
CVE-2022-33634,0,0,1dfe9695b9e550c027b75e0a390dfa54c6a2109b703d65bf90d5819e30e3598f,2025-01-02T22:15:08.940000
|
||||
@ -201583,13 +201583,13 @@ CVE-2022-33637,0,0,779febcbab98162c76b6ec463230e5fc34868ff3a3dcc5a9fab77810e7d58
|
||||
CVE-2022-33638,0,0,0eecdfb7405c847be7e8eda462ff1a2a6b3623c97651ac886a152f749e4ce916,2025-01-02T19:16:22.737000
|
||||
CVE-2022-33639,0,0,98b84b2f3cdaee0a8e1bd846d2c3f7c04234364254ddd88312755ea62747ebf8,2025-01-02T19:16:22.877000
|
||||
CVE-2022-3364,0,0,dd4c407f031cb9b9c49d3371609695761320debb49469eb58b1198a34ae105ad,2024-11-21T07:19:22.757000
|
||||
CVE-2022-33640,0,0,89a0d961ea376c9d193140978fd96f8908caf1f8aa80a9e0d9956f469674621f,2024-11-21T07:08:13.927000
|
||||
CVE-2022-33640,0,1,bb35988757ef2646954c7507c8dc5d2b6c971bc1696738798757d431b0c6b28c,2025-06-05T19:15:24.473000
|
||||
CVE-2022-33641,0,0,318881ea1b50d7310c93c9ffdac2eaf18504877678fd8e052b56a3a1dceaa97e,2024-11-21T07:08:14.047000
|
||||
CVE-2022-33642,0,0,a7a480dbe6276f162cbaf4a7b95a7ef51b29c38f8cbf4ca18680818654776f35,2024-11-21T07:08:14.193000
|
||||
CVE-2022-33643,0,0,47b44c8f88d31e82c74f7cec9dcd27957458dda6b9400efcbfe6894a68134f4f,2024-11-21T07:08:14.310000
|
||||
CVE-2022-33644,0,0,9142403ea74bf872e3b0ee89f6b304d39dd3d9d6e3d19bd9969a9fe6293aa847,2024-11-21T07:08:14.417000
|
||||
CVE-2022-33645,0,0,d9eb7feb61490f8806217bc8e13f400a1ee5841901ede1bb733f493f7be8ebb4,2025-01-02T22:15:09.210000
|
||||
CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881fe5,2024-11-21T07:08:14.673000
|
||||
CVE-2022-33646,0,1,56aad0d93134844ca7a5e39c30d1e3842954776bb0d53ebf07325162faa5bc32,2025-06-05T19:15:24.637000
|
||||
CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000
|
||||
CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000
|
||||
CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000
|
||||
@ -202446,10 +202446,10 @@ CVE-2022-34687,0,0,2b66e6e48713f193838e1e3175617e3f479951db6200d541b21a1cdeea604
|
||||
CVE-2022-34689,0,0,db21f78b3afaedd2575289f6fd8bf0f1c10969a8069015eb080e1d5a826cc32d,2025-01-02T22:15:09.340000
|
||||
CVE-2022-3469,0,0,98ecc65b35685ab3e96ea3b6c45fea08392f7a3d1ded3d3183cc5c97b1064a13,2025-05-05T16:15:19.680000
|
||||
CVE-2022-34690,0,0,5e3f87530474c6f7c234aae46cb9569a96dd48c7023f237d61ff86b0bfc52811,2024-11-21T07:09:59.527000
|
||||
CVE-2022-34691,0,0,60948b269e191dd67b146e3518cd5627992b9459b66b24be6aa452dafcdb1f5b,2024-11-21T07:09:59.673000
|
||||
CVE-2022-34692,0,0,22c94034553643d46e5ee07aefb318c4d36521097d6b41ede5334de708c90465,2024-11-21T07:09:59.810000
|
||||
CVE-2022-34696,0,0,f9e0d3afad546ac99a392470f5ff015af812bc4749f94c9e5116ee6f3f4b2ab0,2024-11-21T07:09:59.943000
|
||||
CVE-2022-34699,0,0,6a5a8c69a8b7c6c8ed3b8248efce85f059ae11bea74b030f22c0f7d94de5b8a0,2024-11-21T07:10:00.077000
|
||||
CVE-2022-34691,0,1,aa651a39fee435c033abd2783d103fe0ea70c69329eced09f01a5c0c1998f073,2025-06-05T19:15:24.820000
|
||||
CVE-2022-34692,0,1,50f1b0cdb006ca3e5296207948719da21c5f9b0c51291fce662afef0e38f2666,2025-06-05T19:15:25.033000
|
||||
CVE-2022-34696,0,1,3fcda9495f540896a64848d6e1168620d654a645b266a43b94c4c03792ee3246,2025-06-05T19:15:25.203000
|
||||
CVE-2022-34699,0,1,79ccaf5b12cb869f601cf1a59701e5c23397ad882fe85d16622c15e3e55dbaf7,2025-06-05T19:15:25.383000
|
||||
CVE-2022-3470,0,0,6b70323dd8a65a812f10a8f5c605b87f2826655f9d33b767c741c021e15ce04d,2024-11-21T07:19:36.163000
|
||||
CVE-2022-34700,0,0,41a45300ea949c0a1460904beed7f685410746696b8c090e89295661c979c0e8,2024-11-21T07:10:00.193000
|
||||
CVE-2022-34701,0,0,129c27111e2334ee94a0bcf698c38ffb3b4c8d6770974480be50f8380465cadf,2025-06-04T16:15:27.477000
|
||||
@ -206078,7 +206078,7 @@ CVE-2022-39148,0,0,047f1bac7687b1b6009187320e2581fb3f3f6e99c9c5d9eb2dd5bace15e67
|
||||
CVE-2022-39149,0,0,81d2e2b6f92fbefa64ab8c9c263a6a1d9eee3400f3fdbd9aacaea134a0af76d7,2024-11-21T07:17:40.430000
|
||||
CVE-2022-3915,0,0,ba7e5818c5d78d197bc5ddf71f6d363fc94da960d56643a76404cf3a0fca44ae,2025-04-22T15:16:00.967000
|
||||
CVE-2022-39150,0,0,1357c673c1b0f0d7e5cd7c45e9b0dd29b2298adaa06cb8854cb0054d3101aeda,2024-11-21T07:17:40.533000
|
||||
CVE-2022-39151,0,0,d3b665cc7d95929a7e1978d4ce1d24284d85aa7f6e54d230ee26385bdf3a68c3,2024-11-21T07:17:40.647000
|
||||
CVE-2022-39151,0,1,a1f99900231a0ddc12f25eaffbf7509ffe616144bd1e4f4ef72fcd2779352240,2025-06-05T19:15:25.560000
|
||||
CVE-2022-39152,0,0,3983f862863c3bc81b35ae8184c705cce5e74e1f9ad2bbe72bc6ebc92ddf7387,2024-11-21T07:17:40.760000
|
||||
CVE-2022-39153,0,0,b04b61943a57e21aa1bc668b41defc93bd288829f40d8430e8ac3a980c0382a9,2024-11-21T07:17:40.873000
|
||||
CVE-2022-39154,0,0,8fa675cabe41a4d9298e179767fa201eadf198f3643d00b86779347bc7f73a6c,2024-11-21T07:17:40.987000
|
||||
@ -245689,7 +245689,7 @@ CVE-2024-10623,0,0,6e237096fbd094bbf3471247b87238053c5a778164061b5929cdb16711f26
|
||||
CVE-2024-10624,0,0,927595352e64f31ce5c368d0a868cde7fa7c5ad330de0d5c34e1b2683ffa0390,2025-03-20T10:15:17.880000
|
||||
CVE-2024-10625,0,0,8994abd06eb088d4d6bebe5c7df8566fe6e9598c9dcb6ae5c9f2822ed990b189,2025-05-28T20:49:53.980000
|
||||
CVE-2024-10626,0,0,969aa11116039a64d08ea1a4fa2459bb97ed16e2a96d85494d04576d212b4fc1,2025-05-28T20:48:34.957000
|
||||
CVE-2024-10627,0,1,506b6d42bd6452e47d271f9a383b48ed8fe18aef4ca82197319cbce9e44a4842,2025-06-05T16:59:15.687000
|
||||
CVE-2024-10627,0,0,506b6d42bd6452e47d271f9a383b48ed8fe18aef4ca82197319cbce9e44a4842,2025-06-05T16:59:15.687000
|
||||
CVE-2024-10628,0,0,fe3648bb198d97e4edbe93780d5b1a58e72b60d604c379b076d62a96f2c50036,2025-06-05T14:23:17.177000
|
||||
CVE-2024-10629,0,0,1f9c9c5683a42ffc8dadeffeff3f612e74f207dcf5dcd96d8c7fa679d62c2730,2024-11-13T17:01:16.850000
|
||||
CVE-2024-1063,0,0,33b4f1a2d0cd96333caf63788d2cf890d1ebab138b3c91da9285726ecbf447d1,2024-11-21T08:49:42.713000
|
||||
@ -245876,7 +245876,7 @@ CVE-2024-10799,0,0,a3e741d61d491954c7b8ad3a6ef2fd3de6ba712693b6fa3c5266865be162b
|
||||
CVE-2024-1080,0,0,d419649d3c046728f86e0db4ac875d93585cb28b1dc1d2ccb108b64b9ccaec06,2025-01-02T16:41:30.747000
|
||||
CVE-2024-10800,0,0,7c09a66fe19ec81d72fb3dd0d5d6c10275f9b97966090fbd36ca1fbb77eb71bd,2024-11-19T17:08:44.767000
|
||||
CVE-2024-10801,0,0,2fc64baaadc32ead3d741647c105d1e5f90766977df6a21cbb5fc7403bd4ac96,2024-11-12T13:56:24.513000
|
||||
CVE-2024-10802,0,1,195545a172957b3b6b9d55fbd9a8c6e9d10ea86c0aa8163e5f8f7494e0feb138,2025-06-05T17:00:18.303000
|
||||
CVE-2024-10802,0,0,195545a172957b3b6b9d55fbd9a8c6e9d10ea86c0aa8163e5f8f7494e0feb138,2025-06-05T17:00:18.303000
|
||||
CVE-2024-10803,0,0,9af0bc02a023809c570b91b39f544b58f190424cc5b458e31af90eaf403aa364,2024-11-23T08:15:03.413000
|
||||
CVE-2024-10804,0,0,c829b70e6175adde946dfc695f0ee88db10c55c3f5a8a5193864bce1581dec85,2025-03-07T09:15:13.340000
|
||||
CVE-2024-10805,0,0,2dc6a50e2e5435811e45bd9587f57ddf8b9be0610ab96cbbf1bcea689c9000fa,2024-11-07T17:09:07.057000
|
||||
@ -246097,7 +246097,7 @@ CVE-2024-11020,0,0,970da6d298c307a33bad19d27786a9e0b5c15413245f8a9316a9d57c88d1c
|
||||
CVE-2024-11021,0,0,dfa8e0362d5308751463d7a3b7f074db5d7cb50c3c83fb93cc46c0a12f922a00,2024-11-18T19:00:03.487000
|
||||
CVE-2024-11022,0,0,121bdebd234c31567a9334100118b4552206a5be58d7f013a9a38c342f5911be,2024-12-06T13:15:06.267000
|
||||
CVE-2024-11023,0,0,f7b174881a277fb4c81e0fe54307aea57f0362604857fb8a6b45aafb8e505821,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11024,0,1,b99b49f0eb3a94e210f240403721f258b7d7e91239e622c2e9b5883aa35ab7cc,2025-06-05T17:01:36.433000
|
||||
CVE-2024-11024,0,0,b99b49f0eb3a94e210f240403721f258b7d7e91239e622c2e9b5883aa35ab7cc,2025-06-05T17:01:36.433000
|
||||
CVE-2024-11025,0,0,3f6e108019cd6982fd5b3c54f07c198819fe40cc0972828c5e5b6725a3c4dc5a,2024-11-27T11:17:41.740000
|
||||
CVE-2024-11026,0,0,319f686d9e1816aec56a50d3ae71f2580939b84056c0eacccd7bc237a6bd6112,2024-11-23T01:44:05.947000
|
||||
CVE-2024-11028,0,0,be5701b1791efbf2de8ae4ea20b2a6d8d846ef340e5e6b5f9a4b779b0ccd543b,2024-11-19T15:38:19.023000
|
||||
@ -246158,7 +246158,7 @@ CVE-2024-11079,0,0,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b713
|
||||
CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000
|
||||
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
|
||||
CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000
|
||||
CVE-2024-11083,0,1,bba15626c68cc6432c9d7ae1a027a809dab21000480c2570d3d389b89fd5f047,2025-06-05T17:02:09.960000
|
||||
CVE-2024-11083,0,0,bba15626c68cc6432c9d7ae1a027a809dab21000480c2570d3d389b89fd5f047,2025-06-05T17:02:09.960000
|
||||
CVE-2024-11084,0,0,60bb4e40862a0490035e7537a06200966a71d749ca9df62534a699dfe8e8033f,2025-04-15T18:39:27.967000
|
||||
CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
@ -246277,7 +246277,7 @@ CVE-2024-11195,0,0,38f89ced51d5d7ebaa9e00a92f402dea0edb5ff89308af26875e5645b6fcf
|
||||
CVE-2024-11196,0,0,86073d672062faceb084c20cbe17a461a555aa7cdb4bc7856e7e10151f683d68,2024-12-21T07:15:04.723000
|
||||
CVE-2024-11197,0,0,3740e434f528bbbd61234dede2b4a36fd46292349d79d4749d70c21ad64992c9,2024-11-21T13:57:24.187000
|
||||
CVE-2024-11198,0,0,fc0b00a2733ca1e8fff2fe360f2e4cb1494fa8044fb680aa8d0f8cfd928aecc9,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11199,0,1,448e4028ba6741700a2565bf5ba2267263ffa0b3b642651bba683f57af020348,2025-06-05T17:00:39.570000
|
||||
CVE-2024-11199,0,0,448e4028ba6741700a2565bf5ba2267263ffa0b3b642651bba683f57af020348,2025-06-05T17:00:39.570000
|
||||
CVE-2024-1120,0,0,2ccfcd2155bf9a9467148924a471395325bce483982858dc5d93d716f1be8160,2025-03-11T16:46:21.947000
|
||||
CVE-2024-11200,0,0,7a5014fc24dac51453395d7130a599729868592263e54cecb121b499d8896404,2024-12-03T14:15:19.923000
|
||||
CVE-2024-11201,0,0,95ced2cef5a51b7fa14517c64bac4bc07296789d71763b16f225669a1035af34,2024-12-06T06:15:22.533000
|
||||
@ -246822,7 +246822,7 @@ CVE-2024-11717,0,0,5cf1e8d1659d0c0acb342b4666ea0ce46f2794e2d3168fb945db1a1190a19
|
||||
CVE-2024-11718,0,0,0bed3b3038ae5a1fdd1ea46800c93191f624f222f828f42d9de60c5c5dd790aa,2025-05-20T20:15:30.280000
|
||||
CVE-2024-11719,0,0,e4cfdc6ea6b72d016d4a7c18750188bc8c7d1be79bc69faa46c316653109b34d,2025-05-20T20:15:30.420000
|
||||
CVE-2024-1172,0,0,8a47d65ba883be6f9330fb72413995c12492cc02775718de218760ba1f704a52,2025-01-08T19:08:16.787000
|
||||
CVE-2024-11720,0,1,4cff87eaa9b0bc632fe14ca9e7875a08281d9bd63641e0bdf5f7effc5ab49311,2025-06-05T16:13:39.850000
|
||||
CVE-2024-11720,0,0,4cff87eaa9b0bc632fe14ca9e7875a08281d9bd63641e0bdf5f7effc5ab49311,2025-06-05T16:13:39.850000
|
||||
CVE-2024-11721,0,0,a74d08a5a2d9f12fdf43567e71a5d2a87ca46e38fcbaf50f78778ec35e274d4d,2025-06-05T15:29:36.250000
|
||||
CVE-2024-11722,0,0,36060c4a1b06d9d2dc11dd80a8bcf5758e5cc38a595154dd7a12fcdd19b1b092,2025-06-05T15:31:37.450000
|
||||
CVE-2024-11723,0,0,d555056e56adae6d2817421636f03f202df11e8bc291dc8225ccc2e718d1c709,2024-12-12T05:15:09.247000
|
||||
@ -247452,7 +247452,7 @@ CVE-2024-12325,0,0,46c6dbf8ab48a9529900a473106f832e082cd9f7d718e64a5c9e5edd2c3d1
|
||||
CVE-2024-12326,0,0,6214bd8c3b6441929fb143e430a818a70c0eda117c1da1c1d4092fdb062e916b,2024-12-06T21:15:05.957000
|
||||
CVE-2024-12327,0,0,e8e81366bd93f2cbafbb479a06376db44215f2cd9c6251c0ebac4883f30daea1,2025-01-07T05:15:18.470000
|
||||
CVE-2024-12328,0,0,34661052bfc4345d9d8ebac2e6c28c5ef38cb920ac58fb144c97623104a72269,2025-01-08T09:15:06.780000
|
||||
CVE-2024-12329,0,1,71e750a9973a9c0c890f57927fe84490b7903cbe24882faf71ad402678f38f5f,2025-06-05T16:05:14.507000
|
||||
CVE-2024-12329,0,0,71e750a9973a9c0c890f57927fe84490b7903cbe24882faf71ad402678f38f5f,2025-06-05T16:05:14.507000
|
||||
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
|
||||
CVE-2024-12330,0,0,dd38f32a8fe1201123bcdc5b82b5d883712c2acc7974b9580df0e29bb65620cf,2025-01-09T11:15:13.090000
|
||||
CVE-2024-12331,0,0,6c6e9b90da53ab4f2635b2c568c68cfa4d017be1088f155d7e21d426ea9a2f4e,2025-03-05T19:16:29.907000
|
||||
@ -247969,7 +247969,7 @@ CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f6750
|
||||
CVE-2024-1284,0,0,262cb3f49eb877f50074ffb33c93e32706988eb751467b62ee180e101a9782f9,2025-05-15T20:15:40.967000
|
||||
CVE-2024-12840,0,0,743b0423cfafac2e38430453992cc260d6ea4d0de81fab1bf75267290a9d61ab,2025-05-12T21:15:46.300000
|
||||
CVE-2024-12841,0,0,24a6b65a1931d3226bcce2fe27cbcf10bbee4e0d0965b3b5540746ecc7731100,2025-01-07T18:58:10.143000
|
||||
CVE-2024-12842,0,0,072ad5f2675314dbca068a3088dab3c4af042c7765e7a7f0aa73f7f3e14db586,2024-12-24T17:15:08.800000
|
||||
CVE-2024-12842,0,1,e7b1aaa191afaa7eb1766e8fc89b34ebb0ce73ea17e3511e7b8d2b3e3e62b2d1,2025-06-05T19:43:22.453000
|
||||
CVE-2024-12843,0,0,fd7557e365f1279a203962fe47a2da20ef4b036009d10dbcf81fd8fbe148f4a5,2025-01-07T18:56:52.100000
|
||||
CVE-2024-12844,0,0,0405c35f7d084de26bb371db3ce6ee0878eb608e20c08cb62e569f5aa033d6a8,2025-01-07T18:45:15.590000
|
||||
CVE-2024-12845,0,0,8a55ef16d01ed853090508f11e865486ac3e4a19f3e5f3d24da04712be187e9c,2025-01-07T18:35:19.607000
|
||||
@ -248321,9 +248321,9 @@ CVE-2024-13189,0,0,a7b43dff7e015afd26a09926b1e44360bd832a7fdbe0d4eb55af9dbcecfbf
|
||||
CVE-2024-1319,0,0,a592496a2c658b679a2101b8015055457bb434afa8045e33335d297f46860265,2025-04-24T15:15:11.847000
|
||||
CVE-2024-13190,0,0,ee48fcb8370dfe5bdd3e0e59033d930db3dd1bfee1b55444a21f3aea6a2911a6,2025-01-08T21:15:12.303000
|
||||
CVE-2024-13191,0,0,b509e9f2c0471d080d679f2912738e83088d83086893fe11d0d48e4d305e4844,2025-05-28T20:11:52.477000
|
||||
CVE-2024-13192,0,0,1dad289064220f575001a055f516c6b2389962fea90cd9967564052320e1e52c,2025-01-09T17:15:11.420000
|
||||
CVE-2024-13192,0,1,264383d98aefd587e1cd26f1656ec904bc31ac3d9433dac89359b38fca080118,2025-06-05T19:44:22.500000
|
||||
CVE-2024-13193,0,0,d32b08d959174c43b1fe3441ba026097abfa1bfe9b57e9f9418723438179a2c7,2025-04-04T16:59:31.217000
|
||||
CVE-2024-13194,0,0,c93c17407059ada39600fa29bdf31930d60eb87dfa4cb1db797b96f62695000b,2025-01-09T17:15:11.690000
|
||||
CVE-2024-13194,0,1,d2919d69d524a29eb7b4e1a1d7b39153c52d844da23f50a58006ade98e279ca2,2025-06-05T19:45:03.537000
|
||||
CVE-2024-13195,0,0,d99bb77228f5b8439ced2df5cb9ba3e79a4e4c6d15cc632d4d5f2a7481ac8986,2025-01-09T17:15:11.827000
|
||||
CVE-2024-13196,0,0,d1f1d5b45343ce572f2e5d279b42d1fb45fc7100a597fee19e22248ff242186d,2025-01-09T17:15:11.957000
|
||||
CVE-2024-13197,0,0,08b42fc0b1794dab55034bc81c9f23a2ecbb64e6e27956fbbe10ebbf9cefaea9,2025-01-09T00:15:25.973000
|
||||
@ -251517,13 +251517,13 @@ CVE-2024-22018,0,0,8700bac6e1b1883a1148f7705e0358edaff43b84a71887101c6658d35b8d8
|
||||
CVE-2024-22019,0,0,e56f1ec5d063edfaaf953a7037172cce296bac566ceb03a66408d7b9e3f53320,2025-04-02T20:10:16.543000
|
||||
CVE-2024-2202,0,0,b32d19529765bbc51553683d248204aefff37fb40b548ddd6c8de1e89f9356ac,2025-02-13T16:48:25.923000
|
||||
CVE-2024-22020,0,0,ac0c791ce864da82d8a7b218093278c5feeb845d8151ecc0ab58447fff809aa8,2025-03-14T19:15:44.700000
|
||||
CVE-2024-22021,0,1,797501f9a56f9a1f3c95b82f99fd131e5ceb61cb5d5a8261420d8a99b895504e,2025-06-05T17:15:26.977000
|
||||
CVE-2024-22021,0,0,797501f9a56f9a1f3c95b82f99fd131e5ceb61cb5d5a8261420d8a99b895504e,2025-06-05T17:15:26.977000
|
||||
CVE-2024-22022,0,0,c85c000f996b3d387fc7f2e37a70268bb210c2a22944bce58e8587dfa6213aa2,2025-06-03T19:15:37.243000
|
||||
CVE-2024-22023,0,0,7a1e38aa2ab90e08d875d3e998baadbe14cbd71bbb76ea784df0509f7639d5ac,2024-11-21T08:55:25
|
||||
CVE-2024-22024,0,0,93165f8fe2064fd12244d65b0ff1d38fd1b104a54c3868e2f94817da6f11e108,2025-05-09T19:15:59.813000
|
||||
CVE-2024-22025,0,0,87aa7a5c474a1100d38041a0ee3808e7b8e61bab104dc2e3bd348952332c62d3,2024-11-21T08:55:25.347000
|
||||
CVE-2024-22026,0,0,fc1af49b9ec4afa79ee72a8c6a6d4423ef8d1a7b1b37296b5d1f6a1651e2a40a,2025-03-13T17:15:28.180000
|
||||
CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000
|
||||
CVE-2024-22027,0,1,56a3d2ed4fb304fcb785aa0c059c26c63ef3aee3f2dea885394c680aa039bc4f,2025-06-05T19:15:25.847000
|
||||
CVE-2024-22028,0,0,ea8978580ea9bd87813ebb4ed4d29fd2f16b6337dfe99bd528d2c80dfd0ad8c6,2025-06-03T14:15:45.720000
|
||||
CVE-2024-22029,0,0,c36e7c91b129030370bcc538c88e9a98c9f8acc0097f342d0f3d7ad0afd31d0c,2025-01-27T18:15:37.237000
|
||||
CVE-2024-2203,0,0,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000
|
||||
@ -251565,7 +251565,7 @@ CVE-2024-22068,0,0,dbfd312dea7863e58e293401668e2c1ceda6a7351589ac7472fe4d3d38f02
|
||||
CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676c84,2024-08-20T17:22:39.500000
|
||||
CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000
|
||||
CVE-2024-22074,0,0,8ce1416a2a2c2062f8a4515755c7506139d9261992e4df0985ed7bb84eb5f26f,2025-03-18T21:15:23.753000
|
||||
CVE-2024-22075,0,1,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000
|
||||
CVE-2024-22075,0,0,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000
|
||||
CVE-2024-22076,0,0,21a4530da33e3bbfe45eac97ca96bfa62b7e645e33a45111dc73f1c2deead9cb,2024-11-21T08:55:30.577000
|
||||
CVE-2024-22077,0,0,8d56db529de03b85ebd97acb9333cc2ed26899ac306cf0acec7262d040dc588a,2025-04-16T18:20:36.067000
|
||||
CVE-2024-22078,0,0,46ee7f1461ed88577c888e3c7fb500abb803e96986ad6800d0492878c6e910de,2025-04-16T18:20:45.887000
|
||||
@ -251597,7 +251597,7 @@ CVE-2024-22104,0,0,f7ff32e7e1e96b051122bb26df5e27628d7f5d0c5085d81ea1aacc226d401
|
||||
CVE-2024-22105,0,0,c3e49e4e5daf52387190128b0def861d8bea08f1b064bab66990fc03aabb7dbd,2025-03-13T20:15:17.547000
|
||||
CVE-2024-22106,0,0,35e91e3f474b85bd80a83fe3d1d970e8a813175b4f4bba58f2d1c60cd55ddd04,2024-11-21T08:55:36.177000
|
||||
CVE-2024-22107,0,0,c5f1d3d56a2712f9022c6c7f6f81f48552befef0464157bd417bd538c5a7b4d9,2025-05-15T20:15:42.553000
|
||||
CVE-2024-22108,0,1,6c969e338189862d71382fb13557d75ac4c0632e92071ed31c2357df62f7e96a,2025-06-05T17:15:27.387000
|
||||
CVE-2024-22108,0,0,6c969e338189862d71382fb13557d75ac4c0632e92071ed31c2357df62f7e96a,2025-06-05T17:15:27.387000
|
||||
CVE-2024-2211,0,0,7a4e2ccb6324d42c91170e5aebd455b3ff37d70cfb36eab558184fc284d9330d,2025-02-26T16:48:03.047000
|
||||
CVE-2024-22113,0,0,df8bb42f4d1350ee6a0f038ff918a43ce08f3173766cfa9c78783e1f0ff2f63a,2024-11-21T08:55:36.803000
|
||||
CVE-2024-22114,0,0,b98aec6151fc366c3b669a552c78744585fb46223fe45a4b12b56beb46fb5169,2024-12-04T15:28:53.450000
|
||||
@ -251848,7 +251848,7 @@ CVE-2024-22360,0,0,fab17ad358e8bf5b5b25c934476ec1adecf6f1558c6c4a249f4a2b62d2154
|
||||
CVE-2024-22361,0,0,7da1b3ff78b187fc29c0a22d2c7d69af79b706d9e5175ed62fe731040a8e466b,2024-11-21T08:56:07.240000
|
||||
CVE-2024-22362,0,0,705f53d7ba8da6e617c593b50e91059ca5aaea304adfd35e91b92257da6c438d,2024-11-21T08:56:07.387000
|
||||
CVE-2024-22363,0,0,5d981d34e499a40dd74e46e831c996b8cc8dc776c7d18bde043e34f03135f439,2024-11-21T08:56:07.530000
|
||||
CVE-2024-22365,0,1,f5a723b53985968c810213209da18ac7606048cb15d37ff0dfd338df14e5b2d0,2025-06-05T17:15:27.617000
|
||||
CVE-2024-22365,0,0,f5a723b53985968c810213209da18ac7606048cb15d37ff0dfd338df14e5b2d0,2025-06-05T17:15:27.617000
|
||||
CVE-2024-22366,0,0,c9d4eac273888b8ed913f9e915823a299a656b6afa80a9997d2f8e6593e55a53,2024-11-21T08:56:07.920000
|
||||
CVE-2024-22368,0,0,4962d052924d2b2dcaf8fef7c405c31bd171b02dbbc7f1ab1a6d924c3ef5d04a,2025-06-03T15:15:57.437000
|
||||
CVE-2024-22369,0,0,25a54f5eeb18cbdc2e924f131f0d3183c031ad520a18106efbe880eefbb69d70,2025-04-02T20:17:04.160000
|
||||
@ -251863,7 +251863,7 @@ CVE-2024-22377,0,0,2bff56888b73307167108c33c72a8c0fb3a6df49d0f611e0fbd542aa18073
|
||||
CVE-2024-22378,0,0,de1a2adc6461512be74e50b99576e64845ae7a360e6295a55c1c3e2ca3aeb667,2024-08-14T17:49:14.177000
|
||||
CVE-2024-22379,0,0,3d7dbb444a66aef27ebc7c2d53ef8a8c7cbed341f2d516396d40c20e87ea4ac3,2024-11-21T08:56:09.467000
|
||||
CVE-2024-2238,0,0,01f88d2ba769d26a929ee59e06ebef9224ab201e0aa64603f42fae3141b43eb2,2025-01-23T16:34:00.867000
|
||||
CVE-2024-22380,0,1,7632404bf785a9de83546df08ac5c6676a30c9e9f102aaa94e4a457a058c69b4,2025-06-05T16:15:24.747000
|
||||
CVE-2024-22380,0,0,7632404bf785a9de83546df08ac5c6676a30c9e9f102aaa94e4a457a058c69b4,2025-06-05T16:15:24.747000
|
||||
CVE-2024-22382,0,0,33e56b9a14e5953744774c56c2afbe73291445f87f7c93152f6213f3a5cbbc20,2024-11-21T08:56:09.747000
|
||||
CVE-2024-22383,0,0,8514514a74b7723238bc430917d3b0b6df07ceba43c72d1f9b0105b8648fd273,2024-11-21T08:56:09.863000
|
||||
CVE-2024-22384,0,0,cdd23fe585be32ab9b7bc6de19a1b122467f640d810280bc3087f09419df3079,2024-11-21T08:56:09.987000
|
||||
@ -251954,17 +251954,17 @@ CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70
|
||||
CVE-2024-2248,0,0,128b03ee143838230434475acf9988ac8d0fdb2e64239ea0133c82e2fa239752,2024-11-21T09:09:20.790000
|
||||
CVE-2024-2249,0,0,b7479f791c44ab2d743eb04162d89712e9af7b6acd224caaf8514c7a95cb2cf5,2024-11-21T09:09:20.920000
|
||||
CVE-2024-22490,0,0,66a82b0e51a88056ee4e8dc9f25a0a6cdc86338bb5341bd044469b861097582d,2024-11-21T08:56:21.247000
|
||||
CVE-2024-22491,0,1,ac7a14fe4c650b7e0be11f951792835ce9c63cbb77752479a49bd5fd2d244461,2025-06-05T17:15:27.837000
|
||||
CVE-2024-22491,0,0,ac7a14fe4c650b7e0be11f951792835ce9c63cbb77752479a49bd5fd2d244461,2025-06-05T17:15:27.837000
|
||||
CVE-2024-22492,0,0,ed6de9697d3c906be7c158fd443e2bb6e676d19d1e729007bba5d9124eec42ed,2025-06-03T14:15:45.907000
|
||||
CVE-2024-22493,0,0,d1de2606acc42e9246a369eac46d44910ba2e76842dbf24e36a84134fb92547b,2024-11-21T08:56:21.833000
|
||||
CVE-2024-22494,0,0,7fbb8a11ee1bbf88d2756d28c0b8ac308ed852b26511ea038c2d543b1972b9be,2025-06-03T14:15:46.107000
|
||||
CVE-2024-22496,0,1,e96ae6dca1b358c80ac98f4e12ec87b759894d90b531f316a09fa18cb1f323ae,2025-06-05T17:15:28.053000
|
||||
CVE-2024-22496,0,0,e96ae6dca1b358c80ac98f4e12ec87b759894d90b531f316a09fa18cb1f323ae,2025-06-05T17:15:28.053000
|
||||
CVE-2024-22497,0,0,ff572cda88166cf6585a584534a7d1d7bbdcd92ab60805918e3f5eff37ca88e5,2025-05-30T15:15:32.113000
|
||||
CVE-2024-2250,0,0,a87c6f56d5dd84af04d11000c391d5a607a245dd07e99e9b67f0a55566cf4dab,2024-11-21T09:09:21.053000
|
||||
CVE-2024-22513,0,0,27b062d137410e427ab265348c8e99fb253512a92989aef4887a62782af3cac7,2024-11-21T08:56:22.537000
|
||||
CVE-2024-22514,0,0,5ac69cdf27e4525f386bde824c99462208faf9b3eba91ccaec76ec5924b62901,2024-11-21T08:56:22.763000
|
||||
CVE-2024-22515,0,0,c71e932883c0aa2e05451deab0c5ae34f2722f39d9dab1a84b0331ae3bee84fe,2025-05-08T19:15:58.107000
|
||||
CVE-2024-22519,0,1,86bb5dae2af7c478cabf767639d87f23bc3b00c54444817ab4fcd7c08c362d84,2025-06-05T16:15:25.883000
|
||||
CVE-2024-22519,0,0,86bb5dae2af7c478cabf767639d87f23bc3b00c54444817ab4fcd7c08c362d84,2025-06-05T16:15:25.883000
|
||||
CVE-2024-2252,0,0,f8b57c312f6f19268d4bca869e740a5fbb6730c139364507b27b9b965c25ea87,2024-11-21T09:09:21.180000
|
||||
CVE-2024-22520,0,0,bebbed9775bd568a59797690df0299901ade86b1ad601d19bc0e54c45e451d87,2025-05-15T20:15:43.150000
|
||||
CVE-2024-22523,0,0,6e5964ba2742903a94d6ed6e7d813b2cb962e78d9d72ebf5a21537964e4c33d8,2024-11-21T08:56:24.053000
|
||||
@ -251981,7 +251981,7 @@ CVE-2024-22544,0,0,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd544
|
||||
CVE-2024-22545,0,0,b250d13aa437c0c2d56ea5e40ae33890c863f33ebcb2b35acecf2f2371521253,2025-05-29T16:15:34.440000
|
||||
CVE-2024-22546,0,0,be29c28c6404f6f71a65e07123518d4aecb0cb37d40fde4951cc800e0a944e3e,2025-04-01T15:11:17.547000
|
||||
CVE-2024-22547,0,0,50185b74401353c45761c13ff093e3fabf9462fb2d8944ab8c9616c3856a71e0,2025-04-03T13:18:29.913000
|
||||
CVE-2024-22548,0,1,67700d89d07a30c4fa62f5736d9e796640b255ab7ad56ca7fda0bfac195bd8d2,2025-06-05T17:15:28.270000
|
||||
CVE-2024-22548,0,0,67700d89d07a30c4fa62f5736d9e796640b255ab7ad56ca7fda0bfac195bd8d2,2025-06-05T17:15:28.270000
|
||||
CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000
|
||||
CVE-2024-2255,0,0,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000
|
||||
CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000
|
||||
@ -252040,7 +252040,7 @@ CVE-2024-2267,0,0,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d238
|
||||
CVE-2024-2268,0,0,023bcb8b8b824fc0e9c60564b6897c913d15834021647964c37337c7683fcfdc,2025-03-12T13:27:16.610000
|
||||
CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
|
||||
CVE-2024-2269,0,0,7fb9af7c9d2979a4ac8a39c6eeeb6bac7497c02cb4838657872aa315f3d84ae1,2025-03-12T13:27:08.787000
|
||||
CVE-2024-22699,0,1,5fb284b56ff235d4ea8dfa65db8f4dcc4014e7a41878b559a94f3ec6aec0c03f,2025-06-05T16:15:26.100000
|
||||
CVE-2024-22699,0,0,5fb284b56ff235d4ea8dfa65db8f4dcc4014e7a41878b559a94f3ec6aec0c03f,2025-06-05T16:15:26.100000
|
||||
CVE-2024-2270,0,0,63f47cce2a740edf0c481afdd5ce6e5ecc0c75e4aa3fa14036247d4b5d8bf0c4,2025-03-12T13:26:53.800000
|
||||
CVE-2024-22705,0,0,b5730313ce283f0037a29d05fbf12407fd5741147a3640022b0e10c6bc4e4651,2024-11-21T08:56:33.720000
|
||||
CVE-2024-2271,0,0,4db8a47b8173de9214eb8ceec91175982a50723c590a10b220067bbb8385cb67,2025-03-12T13:26:56.810000
|
||||
@ -252050,7 +252050,7 @@ CVE-2024-22717,0,0,a7b151c6e31c95a4df5fc44b6dbdcf1029b8439937cd6cbe8d9f63db9fc26
|
||||
CVE-2024-22718,0,0,5cd08764483bc730ff3f8f4ddec0daf7c4e39ed239b45833708f6c21b588af25,2025-04-08T15:20:32.500000
|
||||
CVE-2024-22719,0,0,1db638ed526c73068c95686bec7db79a61b88aebc0e4e0ff15fdb90f445a6f66,2025-04-08T15:20:41.183000
|
||||
CVE-2024-2272,0,0,43367df530a487894a93e5f6136a364a8d65aa80ad2cb2b0c7a182466dd67f52,2025-03-12T13:26:32.857000
|
||||
CVE-2024-22720,0,1,ced8e9498dda9d0b6520dcb54b6d4601d9935c2ff070d85c84ff5e17fb9aee93,2025-06-05T16:15:26.310000
|
||||
CVE-2024-22720,0,0,ced8e9498dda9d0b6520dcb54b6d4601d9935c2ff070d85c84ff5e17fb9aee93,2025-06-05T16:15:26.310000
|
||||
CVE-2024-22721,0,0,d65e8b48a2b38e89fb21cd524e004ad80ee473c585bc71d76ab768f65ebe62a2,2025-04-08T15:20:50.123000
|
||||
CVE-2024-22722,0,0,b52b3ea4f13cfa5524c524b96d16ace3a07bc5602ec4988ddb0bfba4fde7c250,2025-04-08T15:20:57.363000
|
||||
CVE-2024-22723,0,0,590504d6ddbcfe59132e37aee995b9e0b4e9718bb7fbd1999a65e80b0cef714a,2025-01-21T18:31:46.820000
|
||||
@ -252073,7 +252073,7 @@ CVE-2024-2277,0,0,fb26e5203af69769b09593f650804e1cb7b1ca2d753f5f73c9a8e66efb21f2
|
||||
CVE-2024-22770,0,0,56e8e397e43e9a8bf026122817588e842440f0bef4a69e553c14f3b76e272cf5,2024-11-21T08:56:37.617000
|
||||
CVE-2024-22771,0,0,7617e8b0c6fda881a2255f1c01157125766b59da1dde7549613282f406c1f363,2024-11-21T08:56:37.750000
|
||||
CVE-2024-22772,0,0,6e8dcc0f3ba13d7faed0c0b32e429861dfb883dcd31116729c58831e9e06cf69,2024-11-21T08:56:37.907000
|
||||
CVE-2024-22773,0,1,4119b14fce8207ef6ece7323023d859d3c4a6e427e21dd80d103b44560506cf3,2025-06-05T17:15:28.480000
|
||||
CVE-2024-22773,0,0,4119b14fce8207ef6ece7323023d859d3c4a6e427e21dd80d103b44560506cf3,2025-06-05T17:15:28.480000
|
||||
CVE-2024-22774,0,0,bf99e95ba77966932ead4482e007477f567af9449f7b58c442b7bc149d68a0d2,2024-11-21T08:56:38.250000
|
||||
CVE-2024-22776,0,0,ac97c16d22417af4ad2e5b6a94863a309580579998c043682a4e721adb21bb91,2025-06-03T15:02:52.760000
|
||||
CVE-2024-22778,0,0,a19e88b93f3a20f6985aafecb50988a912c284a2e54ec0c0867139360136dc20,2025-05-06T12:26:00.203000
|
||||
@ -252081,7 +252081,7 @@ CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e4462096
|
||||
CVE-2024-2278,0,0,f074ce15da8dc9e3375db8894f9d7d715eb941b2a9deb7fc4da96933fdcaa115,2025-05-07T01:07:01.500000
|
||||
CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000
|
||||
CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000
|
||||
CVE-2024-22795,0,1,f19725fa2e7a5074049c1a2a2a5368c4c5366b3f445ffaaebea6ce3552c02e56,2025-06-05T16:15:26.540000
|
||||
CVE-2024-22795,0,0,f19725fa2e7a5074049c1a2a2a5368c4c5366b3f445ffaaebea6ce3552c02e56,2025-06-05T16:15:26.540000
|
||||
CVE-2024-2280,0,0,0418f1241bdb21ee444f3adcb24933ad219004bf634a535637b79ccf56c262f6,2025-03-06T15:02:35.070000
|
||||
CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000
|
||||
CVE-2024-22808,0,0,b7e1e2d1bde9d89678abdad137c019036d81abaecf559d82e47aac2d5b04907e,2024-11-21T08:56:39.650000
|
||||
@ -252090,7 +252090,7 @@ CVE-2024-2281,0,0,c6a45030377391385f4e5a7e01504d1db578e67b118787b633fe12ddbf1897
|
||||
CVE-2024-22811,0,0,95b770bca91a81d3413433c3550c707a1eaa1f3371b1cdc1ada7b1a0ac3fb4c4,2025-03-13T16:15:17.533000
|
||||
CVE-2024-22813,0,0,fde04cad36ea7ed6da5592badd051abcc370fc34b9e00641beabb2629ce4cd9c,2024-11-21T08:56:40.320000
|
||||
CVE-2024-22815,0,0,bf7286714cb17cb76e21dc0bc91848ea894410859ccb42c29106c27e54a4b4d1,2024-11-21T08:56:40.553000
|
||||
CVE-2024-22817,0,1,43c32f1370cdffa5bd88e4ddaefa0558a582e3feebfece45d85f3af984753216,2025-06-05T17:15:28.713000
|
||||
CVE-2024-22817,0,0,43c32f1370cdffa5bd88e4ddaefa0558a582e3feebfece45d85f3af984753216,2025-06-05T17:15:28.713000
|
||||
CVE-2024-22818,0,0,ae07f7c9f23d3ccaa5209ac1c54f9755e1e9817fbfc817996581e36100b284f5,2024-11-21T08:56:40.953000
|
||||
CVE-2024-22819,0,0,7e298a92c78d234d5ab0ca56f880a0108a23b6be265e0dee3a64531ce6e0dcf7,2025-06-02T15:15:31.413000
|
||||
CVE-2024-2282,0,0,f65d975fa959d79e35fd81da556b5cbe68cb3b1111b3d61a39d139eaf08fcba0,2025-03-12T13:24:34.817000
|
||||
@ -252100,7 +252100,7 @@ CVE-2024-22830,0,0,0c3577472d24092a4784e16866215f66774a8a19fc4b93b032edbc9653f52
|
||||
CVE-2024-22836,0,0,1ab6e71ed2f8cdeeb0f518448ec347189f34be9aed8cd7e63f7283d5e1e33c4c,2024-11-21T08:56:41.727000
|
||||
CVE-2024-2284,0,0,8048874eec22892088a6456d8c15c99e09f431b8184d775407ca7541bd967bf6,2025-03-12T13:23:53.410000
|
||||
CVE-2024-2285,0,0,ff2b16cef3376f19cc39f889117164d7888b698f7db120875eb7c677dae46767,2025-03-12T13:23:39.810000
|
||||
CVE-2024-22851,0,1,76d4bcdf5e13ef4b4c40954a9b67722c902952f941ba46c61c1d3b9f5cce3d17,2025-06-05T17:15:28.920000
|
||||
CVE-2024-22851,0,0,76d4bcdf5e13ef4b4c40954a9b67722c902952f941ba46c61c1d3b9f5cce3d17,2025-06-05T17:15:28.920000
|
||||
CVE-2024-22852,0,0,0b6cd58217784a5ec25e9d6382d35459d9eb6bca19a9e1816db76b42f63bcded,2025-05-15T20:15:43.533000
|
||||
CVE-2024-22853,0,0,569a83947ec74ebfa9eb6846d290452781f936e173da49be8b02d4b29abd2926,2024-11-21T08:56:42.197000
|
||||
CVE-2024-22854,0,0,20ef868342a0c80c3c6ce8ae432f79bfc261c8cf42cc8dcbda1f3275a134827c,2025-01-13T14:37:55.830000
|
||||
@ -252125,7 +252125,7 @@ CVE-2024-22891,0,0,a60262184c3c29b0e0c7f3fe22f6adcbb2816519fa464ccdba3d14fcd28d2
|
||||
CVE-2024-22892,0,0,ab4685bd3e54af7b091a985b4e2bd0ce232ea37ad229896d47c941f92093c96e,2025-03-14T16:15:29.140000
|
||||
CVE-2024-22893,0,0,c15a8e4daedb1b587bbdd4afc7a3262ee257bc5bc12862b5646b68c245079a97,2024-09-26T14:35:12.920000
|
||||
CVE-2024-22894,0,0,42f5b44dcbf5f726764f56c5b153b80c427e59c7fdf8f4595198f383354dc3bc,2024-11-21T08:56:45.447000
|
||||
CVE-2024-22895,0,1,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000
|
||||
CVE-2024-22895,0,0,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000
|
||||
CVE-2024-22899,0,0,e0b1270af06adae37849d6178e4aceee74c98c48605efe5906b7249773cb3736,2025-06-04T21:15:37.730000
|
||||
CVE-2024-2290,0,0,9d1c9ebac87a4153137b27026706ecff54dacd80661ace88cd79b9e6caec7807,2024-11-21T09:09:26.507000
|
||||
CVE-2024-22900,0,0,a6cf4dccbb4086d0140c6a89c699c9a0b37cc44314234bc884861be28bedd9aa,2024-11-21T08:56:46.100000
|
||||
@ -252135,14 +252135,14 @@ CVE-2024-22903,0,0,f03d3409124dee699a8824200879f5bb07df35f51b7ef94e62bbd5481e177
|
||||
CVE-2024-22905,0,0,af861a89b31b1cd519cf02c39e78baf454e4f374e5027f26c4ee555cf353373b,2024-11-21T08:56:46.740000
|
||||
CVE-2024-2291,0,0,619d761e61f944fc6b549132505892b7a31cc16bd266518c53fa8681dacbbe93,2025-01-16T18:02:45.747000
|
||||
CVE-2024-22910,0,0,8c467bd6905f47328179bbf1d802932c88b496fc8de8231d42c1b81ba98e84e0,2024-12-04T17:15:12.300000
|
||||
CVE-2024-22911,0,1,c5c45760e04e38e3f527d6abede56871d14899fdbce1f2fceed9a671affb60a8,2025-06-05T16:15:26.963000
|
||||
CVE-2024-22911,0,0,c5c45760e04e38e3f527d6abede56871d14899fdbce1f2fceed9a671affb60a8,2025-06-05T16:15:26.963000
|
||||
CVE-2024-22912,0,0,5ea775660d89bfc8062a1a2e64de2f4dcb16849b1db5073b4dff385a0b1fad2c,2024-11-21T08:56:47.240000
|
||||
CVE-2024-22913,0,0,ac1aca178c5689a84a4fe1d3de2822fdbc55949d87e5fc11519420261810c862,2025-05-30T15:15:33.337000
|
||||
CVE-2024-22914,0,0,62b78c42de78eae9ec85357ee373b76ca654492c7be19bbe9e95f2da85fae82b,2024-11-21T08:56:47.543000
|
||||
CVE-2024-22915,0,0,32a8402524c28738ba5c982871940dfede8bd85f6704a228ce9b9ff3d1f4db69,2025-05-30T15:15:33.513000
|
||||
CVE-2024-22916,0,0,dc6e6dd1de65a53d75ba394bc7e599a4dc619dc2005fa334e489df67375de233,2024-11-21T08:56:47.923000
|
||||
CVE-2024-22917,0,0,5dc97677d5637b8c93ae6363792ebfbbd65b3bd87e7df4c274e6739509ee871a,2025-05-08T15:07:37.577000
|
||||
CVE-2024-22919,0,1,6072dfb63e932d68691a9f3e3cc2f74de20bca994dbf8a0fa9527fa77618f485,2025-06-05T17:15:29.160000
|
||||
CVE-2024-22919,0,0,6072dfb63e932d68691a9f3e3cc2f74de20bca994dbf8a0fa9527fa77618f485,2025-06-05T17:15:29.160000
|
||||
CVE-2024-2292,0,0,456ca10d707e4bab1681a8f348e451b4c7e5812faea70f8784757c6398afe5c2,2025-03-20T10:15:32.340000
|
||||
CVE-2024-22920,0,0,2cb66f94468eec9fedec18126fbe216bba0b632eb7a0d63f08f9dbf5b8974cf0,2024-11-21T08:56:48.570000
|
||||
CVE-2024-22922,0,0,5b54c415def3bf9eb39c85aa178ff01a006a91dfa9aa9128f69f1cbe40482745,2025-06-04T22:15:25.727000
|
||||
@ -253067,11 +253067,11 @@ CVE-2024-24003,0,0,c2fdb96f74336a58f073e3d6e5342a558c6ba9447262facf2d4bd3275b229
|
||||
CVE-2024-24004,0,0,1af396ffe576b58bd7d5c2263568eb18988ccf768f92ad925bac44bd318a1e78,2024-11-21T08:58:48.950000
|
||||
CVE-2024-2401,0,0,4e38002be4f0651c9a9f05d68a6881530ac696a28b7a908e2323c00c03877685,2024-11-21T09:09:40.530000
|
||||
CVE-2024-24013,0,0,2a34af1025f24c4132129b4ff4f43bd6d740f5d624d3c16eb96a399e64c443ed,2024-11-21T08:58:49.200000
|
||||
CVE-2024-24014,0,0,7a19143ccfb751b6a902be163e96def71297465d5ab962fc6380207d28c9048d,2024-11-21T08:58:49.353000
|
||||
CVE-2024-24014,0,1,24e69431252a835005fb699e7773ddf8b1b5ee75122c2dcced36583adc1e4d44,2025-06-05T19:15:26.040000
|
||||
CVE-2024-24015,0,0,b9318301270b854339d3ee5442f67844b960e3883dca2b24a3618a27c70f2043,2024-11-21T08:58:49.523000
|
||||
CVE-2024-24017,0,0,c4d2b0da9bcf72d62c30eae5dd55c83d282703f49ff537c35eb3b58e1015df47,2024-11-21T08:58:49.680000
|
||||
CVE-2024-24018,0,0,f05f236b35fe0cd2cdabacd1c39850bd4cc0c002e7998df93397855c741a34f3,2025-05-15T20:15:45.407000
|
||||
CVE-2024-24019,0,0,abcbc45504d3322473e54b3ccf90d96e2e4fbf8819e9394a16fc12c867d75c6e,2024-11-21T08:58:50.063000
|
||||
CVE-2024-24019,0,1,c03741bce6b0161ad8704d2096d29737565e48e5af6de6090410ba0ac54a2b64,2025-06-05T19:15:26.293000
|
||||
CVE-2024-2402,0,0,688734248091b27aff84b6615386cccb61e0e8c77d7e5d170ef01495d5f440b5,2025-05-08T19:11:11.243000
|
||||
CVE-2024-24021,0,0,a401464578cd8772e7a44b662653d888d3432918f388c5ab659d827696cdc8b5,2024-11-21T08:58:50.210000
|
||||
CVE-2024-24023,0,0,3ee9e259451a221bd1226a86ab24cca18a0427c8accf85594b7fe8589f86fd50,2024-11-21T08:58:50.370000
|
||||
@ -253121,10 +253121,10 @@ CVE-2024-2412,0,0,68eb681b0fa4a4498fa14048430f94f9fe1b3cee4b03260c689eaea8c72d78
|
||||
CVE-2024-24122,0,0,247eb2b1a1ec57d0c51c2a9372cb7b02e321f9443f3d4b6a685cf05d4f14555c,2024-11-21T08:58:56.470000
|
||||
CVE-2024-2413,0,0,d82104708d4b956cc742211b85a729547d4498a8859153094f9b1f8c2ba96790,2024-11-21T09:09:42.080000
|
||||
CVE-2024-24130,0,0,61b89b1091ed34c2a6247446e6fc623150e02324d85165f1acb02667eb36ecb3,2024-11-21T08:58:56.903000
|
||||
CVE-2024-24131,0,0,fbd07b13940f6eb92873263a3ce2b80bb1df03df6ffde1656261d9d019ff03fe,2024-11-21T08:58:57.127000
|
||||
CVE-2024-24131,0,1,effeaf004ecee6eccd7a3540d45a94db2d623bba59d46d6056adfa77a0f7f0d7,2025-06-05T19:15:26.497000
|
||||
CVE-2024-24133,0,0,4253d0827f054649c3c100773249f49b3affc1dd1708c7be5814d1c022638e57,2024-11-21T08:58:57.280000
|
||||
CVE-2024-24134,0,0,e37620cc2ef82aa1c0c013b04690ea81dfac68aa1b0a8f1bdb9f9e2c8f149710,2025-05-29T16:15:38.477000
|
||||
CVE-2024-24135,0,0,85d530b3e82dce372d31e0d41be1ca6335efa4384064428a7fa6a716141e7b92,2024-11-21T08:58:57.643000
|
||||
CVE-2024-24135,0,1,e067ab4a4ace0d71286467bac2682e4b25a1353d1ce35504660331271faf9729,2025-06-05T19:15:26.727000
|
||||
CVE-2024-24136,0,0,d8bab72d0f6caae1296357639967ad53f9242424e445afcbc70db557f000fc15,2024-11-21T08:58:57.783000
|
||||
CVE-2024-24139,0,0,e048da5d9a48edd988fc156657053e9aec3fc7a06da29a9ac91b208e0bf22c50,2024-11-21T08:58:57.927000
|
||||
CVE-2024-2414,0,0,288cf1f5e7eea41678bd1847649e8873794525f431b2560f43d693c15049f16c,2024-11-21T09:09:42.200000
|
||||
@ -253167,18 +253167,18 @@ CVE-2024-2424,0,0,d38b413147578102258baaf4608c239ad65c34e87612768e40d89d9702993e
|
||||
CVE-2024-24245,0,0,b3d3873bbaca26fb2c131ecfbb7ed35f909142b8888b006b2e7a43cfd5eab2cf,2025-05-13T15:26:15.033000
|
||||
CVE-2024-24246,0,0,aee375bd384f6f6525ecaf7c72a242d761df287a727d4bd73ac8a34a8fb0ec3f,2024-11-21T08:59:03.260000
|
||||
CVE-2024-2425,0,0,819d6b5e41a9ad08d75b1d0f90a9bd716fe340d9aa9a5f5644e10d03953f24ea,2025-01-31T15:41:54.357000
|
||||
CVE-2024-24254,0,0,77cd5073ec47da62650b382fff6d9c4b9e4c378bfed34b209f24fe2e17fe7934,2024-11-21T08:59:03.540000
|
||||
CVE-2024-24254,0,1,0acae52a17b34b928e8010832139045a0156a5e123e812e3eac585be0fb47b8c,2025-06-05T19:15:27
|
||||
CVE-2024-24255,0,0,067b1951b4b56ac88e17305f5d4f5f6f79b6ba0fa933cc002ff369c87705e540,2025-05-08T19:15:59.257000
|
||||
CVE-2024-24256,0,0,2ffd820a3ea61d557ba957f141c2c58830e7859eac6ef3893ee4c352ae12d6d0,2024-11-25T18:15:10.727000
|
||||
CVE-2024-24257,0,0,13a73f5842f4571d2e22339c5383aaa27569e6214fd7fff88e31b104653acb62,2024-11-21T08:59:04.017000
|
||||
CVE-2024-24258,0,0,74667016fcefde53b5915f5e07452a132b2532e02264e8bac072cf0c9419bfa7,2024-11-21T08:59:04.247000
|
||||
CVE-2024-24258,0,1,ae929359bad07124420ea8a15b0a80d2fe2ce690e619327a2ecb004486a92ef3,2025-06-05T19:15:27.210000
|
||||
CVE-2024-24259,0,0,2b8c4eb1c6109c3751b77f24f6178b32fd1d734aee15867954b330e896c4ea9c,2025-05-15T20:15:45.760000
|
||||
CVE-2024-2426,0,0,6e4c7667e348763035bdec9da1887f8edb47f0ce9fdd774523849ccba3fbc09e,2025-01-31T15:41:55.917000
|
||||
CVE-2024-24260,0,0,c423ee7007521cec109068d9ab43a1b4a2645aac9f153db8551c66a880da5c62,2024-11-21T08:59:04.580000
|
||||
CVE-2024-24262,0,0,88092845f03ef8da70f7d772fd5c58e05f5b661d467dba7dcdf80cdcd31e9258,2024-11-21T08:59:04.840000
|
||||
CVE-2024-24263,0,0,939e88aba2abfd29b0449c22c0abfea9ce9ce2d3724d8bf3c4c278eafd5e33d7,2024-11-21T08:59:05.010000
|
||||
CVE-2024-24265,0,0,6e9c18a10ed665d0971c17b8d66c12683e1c03339bff964445be562bd85c003d,2025-05-09T18:16:03.527000
|
||||
CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2f36,2024-11-21T08:59:05.313000
|
||||
CVE-2024-24266,0,1,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000
|
||||
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
|
||||
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
|
||||
CVE-2024-24272,0,0,11fb412eb83c0a2aa1fd2ad772f5b73042c54fabd3e8078b95ce1c85c48de32e,2025-03-27T20:15:23.717000
|
||||
@ -253203,7 +253203,7 @@ CVE-2024-24308,0,0,606388f06c429a7fd55170d325cf78a59c162f34183a28be3e3e5908cb178
|
||||
CVE-2024-24309,0,0,e79427c6a9e2f3cd1729bc966988cc7423d248923027fd4457bcc817e82244a0,2025-05-08T13:48:36.583000
|
||||
CVE-2024-2431,0,0,ee9f8d1ae722ac1062b2154b1fa021af57b6dba016bb5c8d3898f27874cbc924,2024-11-21T09:09:44.550000
|
||||
CVE-2024-24310,0,0,6c0d01b2dc07394fe2d02a5e8e8afe4b0349bec86c8eaf95a37e3b217fe0a7cd,2025-05-08T13:50:07.047000
|
||||
CVE-2024-24311,0,0,0a89dbe220e1990e95427a53542237b1dc196720a8cd6716cc07ddb200ea74a2,2024-11-21T08:59:09.177000
|
||||
CVE-2024-24311,0,1,5ea26b67dc237e5bbd20f297b578b5aa85c8c3fb1b7e32ef6dbbac5d2bcd986a,2025-06-05T19:15:27.690000
|
||||
CVE-2024-24312,0,0,8b3a6d93a1dfe68291477da62c2d1b88140ebb8d3eeccda7b83797d822f25bfe,2024-11-21T08:59:09.337000
|
||||
CVE-2024-24313,0,0,a38a2a53ead6c0d7bb6f557a21419e96db9bf2a8d97bf8168ef8b779f3b3a255,2024-11-21T08:59:09.547000
|
||||
CVE-2024-2432,0,0,325cfbb37d9d09c07004aab2c2990057639ca218150b1224dcf8bf3266b7cd54,2024-11-21T09:09:44.680000
|
||||
@ -253234,14 +253234,14 @@ CVE-2024-24375,0,0,2ec8cc8458c767b854b4065d5df2cf76b30129c147e3cc417cdf6fafed3a8
|
||||
CVE-2024-24377,0,0,c3571d591fdd08eb6fe4c53e100023da606530fd66732a886bbbbe622f3d1b3b,2025-01-13T15:14:32.837000
|
||||
CVE-2024-2438,0,0,9df80e59305d069e4c0bafdf7501833f48e0be776a335419dde3462ed16ce96a,2024-03-14T09:15:47.820000
|
||||
CVE-2024-24386,0,0,dbf74fd10c547c8cbf3809c05783d8ff93602c40d0c6a081660b110834e3bf8c,2024-11-21T08:59:13.463000
|
||||
CVE-2024-24388,0,0,6f376eff214f4516d6e0ec88f3f524e9e4f4b0ac369baf5c6f6e0100e4db6ef5,2024-11-21T08:59:13.680000
|
||||
CVE-2024-24388,0,1,b5b9a9c932d5ea0074a6bfa07b09bff2aed0814a7338d511485d6fe446028b47,2025-06-05T19:15:27.903000
|
||||
CVE-2024-24389,0,0,2d7ff37174d9dbb9492b1a442673e426580708c5a1303fb8d0266900f0ba1dba,2025-03-27T21:15:46.297000
|
||||
CVE-2024-2439,0,0,0f8039336127c52c54ab5acd7c47352bf568be3c16c9d5d6a53d62d569133673,2025-04-14T14:18:39.200000
|
||||
CVE-2024-24393,0,0,533784798f5b3d915b4ebebb8e152f8dd31f7ee87957856dd85b0c6643a7f85c,2025-05-15T20:15:45.950000
|
||||
CVE-2024-24396,0,0,3439b8f9d42f52499fc3498a2bdf9d27d33a987106aaad6527a13387ca9dd891,2024-11-21T08:59:14.147000
|
||||
CVE-2024-24397,0,0,3501920d62c738b549e4fe694cac4cc134b8a3677ddb914004cc38d0f75b79bb,2025-05-15T20:15:46.120000
|
||||
CVE-2024-24398,0,0,c86501b22f4ff480bb0270c1a5e71e6cae2cca0a1f831c1449ad442be12187cf,2025-05-15T20:15:46.310000
|
||||
CVE-2024-24399,0,0,bb2eddb994e88bfdb604ce903ad2971bf2fe285b9c97350eea6bcc5df32e4306,2024-11-21T08:59:14.690000
|
||||
CVE-2024-24399,0,1,2f3ad87b190792fadc9b11dd70802b52f52e0fdb50c1703cefa598e8f0771412,2025-06-05T19:15:28.127000
|
||||
CVE-2024-2440,0,0,83378454086363d7ca4f57beb9690f64458469c3707996c259c9c7cf2668d08e,2024-11-21T09:09:45.437000
|
||||
CVE-2024-24401,0,0,71e4ae3c681bf9b1d76b85f2490244760ec98ea3c8d8cb9c503af1362e66c9be,2024-11-21T08:59:14.860000
|
||||
CVE-2024-24402,0,0,7f458a8af3fe0b9a45e7a437cbf857eb25ac5b2d4389714ce9b7162d41f6a675,2025-03-24T20:15:17.830000
|
||||
@ -253302,7 +253302,7 @@ CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ff
|
||||
CVE-2024-24485,0,0,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000
|
||||
CVE-2024-24486,0,0,edf4c4082ecf075b163f0a734e3b03d9e81a9a3ce6788f50621186f7694f47d3,2025-04-10T13:39:57.420000
|
||||
CVE-2024-24487,0,0,6336ce0210f6b19b06f24f3022017cb316f38b4c761c734f0dffcfce0a4fe08a,2025-04-10T13:39:33.260000
|
||||
CVE-2024-24488,0,0,bf27efb75bde32f281cfc397e5872b525b860bf9883f0dd43f8ff534d29e927f,2024-11-21T08:59:20.560000
|
||||
CVE-2024-24488,0,1,d1f837eb6d5785575508ba7513b8fcc1763262d83fe72b6f636d50cd9131373e,2025-06-05T19:15:28.363000
|
||||
CVE-2024-2449,0,0,81d8209e3a4b4be2ff45b2d18df08ecaeeaf5bbb2c00601fbdbf659de2857374,2025-02-10T19:33:51.660000
|
||||
CVE-2024-24494,0,0,85b42e348e5e5905e41947f429b45e0f36e259ee4fd6ef7d45e99cf59382c1cf,2025-05-15T20:15:46.657000
|
||||
CVE-2024-24495,0,0,d9038119e10c686060f002d1373fad59c5867a5d55e2b623cdae5ab6c145dfc1,2025-05-15T20:15:46.847000
|
||||
@ -271964,7 +271964,7 @@ CVE-2024-48915,0,0,22b831e4b76f3ff1bbf21dd69a4b74295f2c021ffd6565d2fbc637ebd54bb
|
||||
CVE-2024-48917,0,0,cbe4a7ce537127ff54eb604789bfae67e90e3547c74f710b6175a0ea1e584f81,2025-03-07T17:07:54.800000
|
||||
CVE-2024-48918,0,0,cfae4446d62adc80a48f2ad18619403b9e405854ec4cb3c0b0fcd077c6f1add6,2024-10-18T12:53:04.627000
|
||||
CVE-2024-48919,0,0,16efdb2b06ecb55d9885e13fd3da6695a4858f71e0605b88abf088c1c21e44e2,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4892,0,1,8ec239c34232ec4792f14a8f1387f23ae89afda61c6064e487f4297c39577848,2025-06-05T16:23:47.540000
|
||||
CVE-2024-4892,0,0,8ec239c34232ec4792f14a8f1387f23ae89afda61c6064e487f4297c39577848,2025-06-05T16:23:47.540000
|
||||
CVE-2024-48920,0,0,25b3c3e2b92fac9b9ccbf12e20ef4be721fe253175055ffeb6893f0b1913e275,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48921,0,0,5f5b362511bded165ed66ad2aa6eea76438ebb3ede733b9d5f6bee96ccb81c58,2024-11-07T17:20:34.160000
|
||||
CVE-2024-48924,0,0,77bac0758d919479be79c66b736b700fcf68da155199aa8dd6fee549a73c583e,2024-10-18T12:52:33.507000
|
||||
@ -279271,7 +279271,7 @@ CVE-2024-6700,0,0,409ab3c91e44011855a21d30373ec03de7918b1550584d03fe35b2d76fab36
|
||||
CVE-2024-6701,0,0,b11215b1cd0f3496a31e5835026526ed1f664a6a440daee8c25423da4f65a744,2024-09-13T16:08:43.407000
|
||||
CVE-2024-6702,0,0,31ae7b0d02f15bc6e94f2583111f260bbd885063942a49ff7a6b4b6dab070588,2024-09-13T16:07:22.420000
|
||||
CVE-2024-6703,0,0,a961a3d3db30f881afff3f629b75b80722347a4018e21f51f7d6136105cb372f,2025-02-10T16:13:16.443000
|
||||
CVE-2024-6704,0,1,4066bfd62ab3e2c56dd3154b9f53ee1e38e7f7a1ffab98619bf5fb8d7f4b35bd,2025-06-05T16:38:43.267000
|
||||
CVE-2024-6704,0,0,4066bfd62ab3e2c56dd3154b9f53ee1e38e7f7a1ffab98619bf5fb8d7f4b35bd,2025-06-05T16:38:43.267000
|
||||
CVE-2024-6705,0,0,44dc9cc67853da80020e3159d89e61e2953b5a07fd227ceb6f6c695d3a3737f7,2024-11-21T09:50:09.370000
|
||||
CVE-2024-6706,0,0,84671454775dde79ed78cf9a88d03e049da529ab8f19c88357984fca4748e308,2024-11-21T09:50:09.480000
|
||||
CVE-2024-6707,0,0,329427c8ea01aca18626eb8ed91b615765294ff8fef9da0930ca4b77f71a396a,2024-11-21T09:50:09.680000
|
||||
@ -281932,7 +281932,7 @@ CVE-2024-9526,0,0,acc606f8e9195e546a271d256c6ec9cc804f4a841580ecb828b473fe7b0b33
|
||||
CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000
|
||||
CVE-2024-9529,0,0,6b328ba0bed5589256da193b60a8a18489bbec6f2035b97998856b36e33a34ba,2024-11-15T19:35:19.160000
|
||||
CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000
|
||||
CVE-2024-9531,0,1,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000
|
||||
CVE-2024-9531,0,0,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000
|
||||
CVE-2024-9532,0,0,ee74e81fcd3228028851cbf05d2cfbe5eea8f3421ccb07415d383b1bab6b2af5,2024-10-09T11:18:49.027000
|
||||
CVE-2024-9533,0,0,11363b568362f03cfdabbcb932ea8a978b23b62f974945ecc7fb3cafbfa9061b,2024-10-09T11:18:34.560000
|
||||
CVE-2024-9534,0,0,491ec5d6b5ab9ce3a6949ab86a011008ecd469bc754ae94796c037eeecca32df,2024-10-09T11:18:23.607000
|
||||
@ -282322,10 +282322,10 @@ CVE-2024-9936,0,0,1f6ddab8c53f4d6f468bc3c998b336f907b00c883130cc27707d2e94ed2db1
|
||||
CVE-2024-9937,0,0,0766c76afe10a009ad41ed699dbcb8d528e71a258224f4e49db1d6ce7899ad8d,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9938,0,0,f49b9eb7f381d715bc7c56ebe1a2562d847f1875ed746118dd755a2d400bc9b1,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9939,0,0,c47ba97255f1c4100695a38e7349ad92d97a71d9b8357497d3b60d8266490e6a,2025-03-13T16:27:18.140000
|
||||
CVE-2024-9940,0,1,62e1ff5f5c0a2104a425b72d4724baaf471b60419bb5a8714e4094c89753fdff,2025-06-05T16:40:26.147000
|
||||
CVE-2024-9940,0,0,62e1ff5f5c0a2104a425b72d4724baaf471b60419bb5a8714e4094c89753fdff,2025-06-05T16:40:26.147000
|
||||
CVE-2024-9941,0,0,f8c1a3ce8301c9f96e0ee1a5f0096fa5255bc477de166caa18bdb6a9866bfb15,2024-11-26T19:37:15.283000
|
||||
CVE-2024-9942,0,0,c6315b95bdda9839ef612eba500df807a644d469ed95f37c88df9fcfa0cbb756,2024-11-26T19:33:35.843000
|
||||
CVE-2024-9943,0,1,356f69899a75ea0ea0e171d2de47a21c8a7cf6cad8cddb1f2cf0542e9958208a,2025-06-05T16:57:08.370000
|
||||
CVE-2024-9943,0,0,356f69899a75ea0ea0e171d2de47a21c8a7cf6cad8cddb1f2cf0542e9958208a,2025-06-05T16:57:08.370000
|
||||
CVE-2024-9944,0,0,f8fe44d98686a29a4c29e0df47e437528a061318d17270b2824d7d54b74548b5,2024-10-17T20:47:35.817000
|
||||
CVE-2024-9945,0,0,cea3df2b6f5b90a7f8d9b7bf1f4b5f371dc7412d9ebdd4e046c2e2c67744f223,2024-12-13T16:15:28.267000
|
||||
CVE-2024-9946,0,0,442c0aff28a23c9d67bb95abea8abfbdb9db72aae0a6f6a85ef41b89c2d30c77,2024-11-08T20:38:07.557000
|
||||
@ -283299,15 +283299,15 @@ CVE-2025-1212,0,0,4775d3c7abc8db0222566d77a07a3b283456acd669d779aebc898ec54ad5eb
|
||||
CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa553,2025-02-12T18:15:22.180000
|
||||
CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000
|
||||
CVE-2025-1215,0,0,28588a9b24de663f5bef0961d5dfe96e8a71be7eda3beced3b32d3f6d90dfb60,2025-03-21T18:15:34.290000
|
||||
CVE-2025-1216,0,0,abdcf7b1d24d8445a4f6ed627d67b343a3a87ed763645866fcef7a7de7e49669,2025-02-12T20:15:39.907000
|
||||
CVE-2025-1216,0,1,50376fb254a43a782342af97b4677c5fc99c4063ba5e1de50a8eca2831d4fcbd,2025-06-05T19:46:48.060000
|
||||
CVE-2025-1217,0,0,775b5b40e99ed6cb30df08cb80664125bba20f68dd952ce028f26b376f222b4a,2025-05-23T14:15:25.767000
|
||||
CVE-2025-1219,0,0,e17024aa809e518546045f8224c0a9988066d9d47c6a0948c6a958a7960baa9b,2025-05-23T14:15:25.950000
|
||||
CVE-2025-1222,0,0,37e1c4bd7e5e0aef71d4eaf69d903e1860c5e20ac2c3d888fafec2d8540da40a,2025-02-20T01:15:09.707000
|
||||
CVE-2025-1223,0,0,79c0b4e1b63833c27fb384ab59edaf7afe279373880088cf1aa2309d13ed89d4,2025-02-20T01:15:09.837000
|
||||
CVE-2025-1224,0,0,59fdfd1d3bd6ca02fc2d196a667525934b64022ed9429789a0b5f4e7c427eb9f,2025-02-13T15:15:20.500000
|
||||
CVE-2025-1225,0,0,775a64c9f4633524291ca7bef1a94707f1a9e8d35072c7b212b938041306fa46,2025-02-12T20:15:40.203000
|
||||
CVE-2025-1226,0,0,430a628b1f0e64c60ce97a31cd895fdf521cec0567fb592bd5bdf6f4fcd1e0b3,2025-02-12T21:15:20.470000
|
||||
CVE-2025-1227,0,0,b55af184f87caf618381835e880bc0a07b74fed7d0c7382ddb55edd0ddddfb9e,2025-02-12T22:15:41.383000
|
||||
CVE-2025-1224,0,1,fcef054865826c9eb5852cbebebf8a55d220f08e4237f5092abd44cbf6f4e9e2,2025-06-05T19:47:07.900000
|
||||
CVE-2025-1225,0,1,e6d32e36ec07a31dfb454e260dc9ff8a02ab3c926e53c37e618ef7c47ba76600,2025-06-05T19:47:35.927000
|
||||
CVE-2025-1226,0,1,5a6b711b964a183f3e1caf1568207f4c8b4fdcf214a6067a68cf41f1067c619b,2025-06-05T19:50:14.263000
|
||||
CVE-2025-1227,0,1,ebf45d04e240b048f685a5603dded7d44860f738e9c320618ec001ee23d74aed,2025-06-05T19:50:47.190000
|
||||
CVE-2025-1228,0,0,12c830b22a778120983d037d36321ed8fb02836367f4bbbd9be0e19668100480,2025-02-12T22:15:41.493000
|
||||
CVE-2025-1229,0,0,fa5787151bd081a7c3655f50c46799853d648eeeec0e4010ed7332955f8d9df1,2025-02-12T22:15:41.667000
|
||||
CVE-2025-1230,0,0,dd0a3ca0e089c26c5259a45f938e8e64977c81ece19c03ae3b8594f4d83448d5,2025-02-12T11:15:11.230000
|
||||
@ -283770,7 +283770,7 @@ CVE-2025-1808,0,0,e7598b7f8580190f908b3118b5c0d79761365b9d99dd376ca7955b674e589d
|
||||
CVE-2025-1809,0,0,0e051d8eda56035c04f32be51a96c16adce266a6be0493dc65b33d1bbb6b23ae,2025-03-03T21:15:17.397000
|
||||
CVE-2025-1810,0,0,5f1c16444374fb3ece0458b6736f8ec3c4daa432684a2200a8e31c80b7e6e99c,2025-03-03T22:15:37.280000
|
||||
CVE-2025-1811,0,0,857715adea2e0e1d71f608745fa6268cd41061918ed8a5823a90033505937a29,2025-03-03T21:15:17.517000
|
||||
CVE-2025-1812,0,0,961cd071b165b99871c88d8e940e599a427d829ad61c9054c38f1fcfedde3e87,2025-03-03T21:15:17.640000
|
||||
CVE-2025-1812,0,1,fc2bada80958d0497b66061adca3ba919c250184c829e158885439d506faefe7,2025-06-05T19:52:43.550000
|
||||
CVE-2025-1813,0,0,dc6153a43a96794f0a7da21f49cbfff542d23f1d2a49d063d808ed52db6e5f91,2025-05-28T20:31:05.023000
|
||||
CVE-2025-1814,0,0,f052b655becafe7f6e8e1d38682da2dbf4c2c6590d4c98cc9092d8c336659c0f,2025-03-05T21:21:54.603000
|
||||
CVE-2025-1815,0,0,cb8516a4bd1acad3269d8ebad1c2d004a0689886e960eaa6015183a95860e2a0,2025-03-03T21:15:17.830000
|
||||
@ -283790,7 +283790,7 @@ CVE-2025-1834,0,0,00fe78fd3caac7a502cdf75e4364d25f840ac9c9aaa69f4647f76b2228ceff
|
||||
CVE-2025-1835,0,0,aee1b4a486da841c7db8143deed10ae556bf311d96bdf0dba2c0ead166fcb14b,2025-03-03T20:15:44.867000
|
||||
CVE-2025-1836,0,0,e55d8c1ad6c532ca23d15111c1e742b84846f7f3c67ac8b9d72b2a3b7fffafce,2025-03-02T23:15:10.993000
|
||||
CVE-2025-1838,0,0,c53eb69ef96a5fe2305ece0f2cbbf93f285af0fa69ad3bc447aadc10cbe1cb8a,2025-05-05T20:54:19.760000
|
||||
CVE-2025-1840,0,0,11fc5062f9b2e0e0b2ba7a6f1fa5e4ee2c5a098000b6e86ddfd6cc6aca9b5fd8,2025-03-03T20:15:45.073000
|
||||
CVE-2025-1840,0,1,b8fba6b05c656edde4e8ecb6319ccde80209a403a68f06b91faf7a306cca50d9,2025-06-05T19:55:58.760000
|
||||
CVE-2025-1841,0,0,93c3963f7b28e530d32ddfce1cac9f7753c496bd96376c2ca5a5004f3e46c57b,2025-05-28T17:05:17.987000
|
||||
CVE-2025-1842,0,0,7ccd0ad08d0d8734df889044267fd3c6cfe4c03c4a27d4282f875e8799119511,2025-03-03T01:15:10.023000
|
||||
CVE-2025-1843,0,0,b6acf8256986f4d81d9dc0aa341dcd2b222099446bdc75e0a94764752196a841,2025-03-03T18:15:34.290000
|
||||
@ -284143,7 +284143,7 @@ CVE-2025-20276,0,0,6cf092eb5dd2245802a5bcb9a818620f11d716e95f3b62bde7f5e467cfd48
|
||||
CVE-2025-20277,0,0,917c2ecb7b6c2a75ec831ba32d70b778b24e255a063aa1b7e69bac1be259b202,2025-06-04T17:15:27.753000
|
||||
CVE-2025-20278,0,0,538962a5c4cb53f34921bd48affcf8a62ba0962069837fca6da1d48d30af1fb1,2025-06-04T17:15:27.963000
|
||||
CVE-2025-20279,0,0,5454c778c8e39c087bd2befd9596d767f063d8e825df4f01dbfa391f4eb686eb,2025-06-04T17:15:28.213000
|
||||
CVE-2025-20286,0,0,0649648a5f2f6b2990d14bc5035eebc05d3de4459dcb7e4420bc8d5010762b05,2025-06-04T21:15:37.940000
|
||||
CVE-2025-20286,0,1,12dd31a7bb3c1877c998d83f86a9d4cfdbfca18d891f84521b1e053cf7ca9300,2025-06-05T19:15:28.590000
|
||||
CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000
|
||||
CVE-2025-20297,0,0,fd036aef2926b86f71d7b735e8eace20d04567625f017b30a40eab31b1a018ed,2025-06-04T14:54:53.980000
|
||||
CVE-2025-20298,0,0,5ef123b99aecda479eda59b2805a60f94ea649d648ececceda6a02d8cab7316c,2025-06-04T14:54:53.980000
|
||||
@ -290036,7 +290036,7 @@ CVE-2025-29121,0,0,434c82f016c57d7556d63e2eda422fcf8e77cdebbec7ff8a56364350ed336
|
||||
CVE-2025-2913,0,0,05115e492e5903ee3a87f1df4d48942de0b75f3b4b0f3d949d399c048447b491,2025-05-28T20:37:16.777000
|
||||
CVE-2025-29135,0,0,500947b54e2f6360bd88908c4e621c7a101c66a93881bfd5d1d8147aa620860c,2025-04-01T19:58:46.270000
|
||||
CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179a1b,2025-04-01T20:37:02.110000
|
||||
CVE-2025-2914,0,0,7dea73f042650d596d2e3187700342f46fbe9d689db45320f8ba785ff1305b72,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2914,0,1,80de8c8203a8c6e5ee48a61979dd7eebd126df92749f77d2c9bd8a25b7ecec40,2025-06-05T19:21:11.357000
|
||||
CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000
|
||||
CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000
|
||||
CVE-2025-29150,0,0,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000
|
||||
@ -290062,7 +290062,7 @@ CVE-2025-2922,0,0,3bc5ec8a99fcde0c1ea21d21dc7b385206ff258c0afe476cd7ac1f9396d68a
|
||||
CVE-2025-29223,0,0,4eb47a6a12a40c8ad4f5fe35a8959205d1c0822c1860f68755d34960cac62f9e,2025-04-01T20:21:04.690000
|
||||
CVE-2025-29226,0,0,2a22bb41c1636f111fba56d4837d1f7d2c1c2827dade39d30847ae9b2258cb43,2025-04-01T20:29:05.520000
|
||||
CVE-2025-29227,0,0,98c6c2a56c36a920ebfda1c9f607bc1ce8140ab24fa775ca0ea0701e2b0db727,2025-04-01T20:28:58.697000
|
||||
CVE-2025-2923,0,0,67077d94759a07d3417cf09df0c07ecdc229308d14abdd8723b2f5fbfc4732e5,2025-04-01T20:26:39.627000
|
||||
CVE-2025-2923,0,1,3fa4450a30e61b795e0eb8eb6a8c6563b4cdc6b682ae774273d6df0273ec39bb,2025-06-05T19:21:58.263000
|
||||
CVE-2025-29230,0,0,a96d6f25884fce83e2e6e66d008df496713f73ab7711eea3506888e7dec9bf9e,2025-04-01T20:28:51.790000
|
||||
CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c84,2025-04-17T13:13:27.960000
|
||||
CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000
|
||||
@ -292978,8 +292978,8 @@ CVE-2025-3532,0,0,a2f5d1e1aeeff6c317e31a6e6d9145846fef7ec6ec6973517901d1a73b6137
|
||||
CVE-2025-3533,0,0,0517ee64c7ed259e758d3f181da415a253b558981950122d1448e5774aae3999,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3534,0,0,2272ee5251cae38598be241c56971c979c5200bb3e067a8d10aed0694d3aed07,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3535,0,0,f999a89f76aec7b751bc0506d7eea783fe36cff05bacd7f9284f3dd0ef46110d,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3536,0,0,214d5e2c283f254382d7a035e1512404ac54a530b5438ffb25d0ebcd03d2c9a9,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3537,0,0,c5790c039771191e787e5f3e5114b79ae1613e659749ca4490d4a00be99fafb7,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3536,0,1,47374e886ed77e1f30c8dfe7ae7747514b22ea59a630aca3bcd1d366a1b4fa5c,2025-06-05T19:26:38.817000
|
||||
CVE-2025-3537,0,1,26bb00c7ac0a8ffa088dda9dd8b04e46bf9e023f71dde1831d194d6d9e1ba45b,2025-06-05T19:27:31.170000
|
||||
CVE-2025-3538,0,0,be8972ee100bbce77ca472972c9e8d6b2e8810a9136a4043fbbb19bd2cda8449,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3539,0,0,13ffbd6325942e7997c9d670a6185b23f5b8169726331abd465f9125c41e2cac,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3540,0,0,f985cb3ef1ae01ebd2dd0344431149f5225f213ab49c447467ad0f6d71a72ecc,2025-04-15T18:39:27.967000
|
||||
@ -293027,7 +293027,7 @@ CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1
|
||||
CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000
|
||||
CVE-2025-3584,0,0,59ca71c3ddec8b989ca250d68253dd4ed4793bd2db21f016ec9f563d6fba7dc2,2025-06-05T14:10:30.393000
|
||||
CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000
|
||||
CVE-2025-3587,0,0,24a9d7f002b5d3dda78896e9b2347c9c9868aa706322ae2e0fbf5aeb34b2cb44,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3587,0,1,2f8e769f77e4ee455186772bee4aa97a90bfa8ed4fc03f982022d2823b79d01c,2025-06-05T19:28:11.513000
|
||||
CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3589,0,0,ec0c189c6bcc1523e6ba16f34ce102759c4f33ff83334f822a0d28647cf0ad2d,2025-04-29T20:16:58.833000
|
||||
CVE-2025-3590,0,0,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f857,2025-04-15T18:39:27.967000
|
||||
@ -294847,6 +294847,8 @@ CVE-2025-46251,0,0,d17dbf4e8e21c626e2d5432aff3bc0ed6b69b0ab0b53ad1b17cc7c8b8336e
|
||||
CVE-2025-46252,0,0,c50b6d0ac2ae9d7ce943a5ed8ef2fd6da152fdf4666412ab5a89649c7df0b743,2025-04-30T15:10:04.440000
|
||||
CVE-2025-46253,0,0,b25f3cee4a5e94813fb7283f6e435befe966b21315e8df614c830de7a55808b6,2025-04-30T15:08:45.127000
|
||||
CVE-2025-46254,0,0,5e703cc2f27dee605c5157342c085d9f1bee15259d5841a98b801a9b78337a6f,2025-04-30T14:59:42.390000
|
||||
CVE-2025-46257,1,1,704a1d8fabe44556c8e4d5f05b6f6bce19301f8af17e5abc52df3ec4a1a9afe1,2025-06-05T18:15:21.753000
|
||||
CVE-2025-46258,1,1,6a47e56a84225cab831d5442ffa31fc54141ca417836d65c947ded26aa61f917,2025-06-05T18:15:22.163000
|
||||
CVE-2025-46260,0,0,de05a0a1a6df47faa889a46f36513cb0a0e28fdfce45e20918b1c808a2fd7912,2025-04-29T13:52:28.490000
|
||||
CVE-2025-46261,0,0,f73cf724c402394b3913a420df099a6b766492bce3124de0e7d9c6a51320fc7a,2025-04-29T13:52:28.490000
|
||||
CVE-2025-46262,0,0,3a9f12ab6eb5cdcf6fa62ad6d3121c10d8abb7bcf9a3b5a5fed9a42bb0613e1c,2025-05-21T20:25:16.407000
|
||||
@ -295463,7 +295465,7 @@ CVE-2025-47612,0,0,c47b42ba681a0fc372d8b3ed0a64dde5908cf096a52bafb21bff62087f151
|
||||
CVE-2025-47613,0,0,c78d295eface98ad13067abd05fb456cdbee898feb32d0bc8a9c81f2cc2688c0,2025-05-23T15:54:42.643000
|
||||
CVE-2025-47614,0,0,9cf4846e333b058377603c0a3e55e737741e66282da97fc5632536599de77a65,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47615,0,0,1a3ce5c26750d3af0dfb7e2c23f693671e6af62e6086d59fddd30b2bc63caafa,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47616,0,0,a49f87bbe8e0df1c3349748a649cb8561f394823cb7774467b821f7808813f81,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47616,0,1,7b22ae0d2cf6192ca88e64db9c3ca2e5255851e179fe426e313b0c0b594daea8,2025-06-05T19:15:28.853000
|
||||
CVE-2025-47617,0,0,e87ad196f223568b94cdbfec08a1cc23cfe30c033180f35f4ddcc4a92dc8432d,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47618,0,0,a977e5bd264a0b193ead21f47dc3e088d7da52e58382b501125fe30243007f62,2025-05-23T15:54:42.643000
|
||||
CVE-2025-47619,0,0,9282f7baa4e808c0745e9280e307d0be36b63133d4d2bfaeaadbe12420e873cb,2025-05-23T15:54:42.643000
|
||||
@ -295539,7 +295541,7 @@ CVE-2025-47691,0,0,2fbcaec9e7aa91338754c59feea941303c490f94047df759c01680eb3cbc3
|
||||
CVE-2025-47692,0,0,c444a1a1a14d26e3caa340ba7e06ef944bc094c41e95aad797793f9895bd3464,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47693,0,0,e89b1a6670330d4d22f8cc221b89668c8cd5df047d9ad3b00d816d91b773e5b1,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47697,0,0,7017cb143ae00e39a6be41658c8a7e8e23de50ae8206815ae5f36b7139369e22,2025-06-04T19:57:39.970000
|
||||
CVE-2025-4770,0,0,2831683f289495e881491b095da878b75d549e4b63c7232b9b53981ad42c7257,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4770,0,1,5f368204f0ca7aae3eb62fd6ef282ad79cf1325c5be1729c43aaaf95e2bf0dbb,2025-06-05T19:35:54.267000
|
||||
CVE-2025-47701,0,0,85bb7ccaf297c9dca91c85cb3376ebab43abe419ae7564896c8e3565de9158da,2025-05-20T17:15:49.160000
|
||||
CVE-2025-47702,0,0,69356e692b2460ffa941a7d3976049902a43456cf1e503712f5b2444ac03a9b8,2025-05-16T14:43:56.797000
|
||||
CVE-2025-47703,0,0,bd0c128a404fc43b93902c0a4888431136875c8309ad71af5b4f81b9467b4e29,2025-05-20T17:15:49.330000
|
||||
@ -295609,7 +295611,7 @@ CVE-2025-47791,0,0,bb13ba0274d81a1986d65f7103abdff4aea9a73bf23faae8bda9c5552391f
|
||||
CVE-2025-47792,0,0,5db4e1b0099c338d37989cd3de0ee62c1464ff8fe0f69042bbd11e43a23f0241,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47793,0,0,a0dce33b5060bd7d152dca8ab7d8795e92e866ec8730dcbdb31b478b4b4a4aa6,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47794,0,0,fe7227e3d0226dcb896a577c64f1cd15be4a2124b27c33b886b791a4f94db856,2025-05-19T13:35:50.497000
|
||||
CVE-2025-4780,0,0,d131d931f8e20ab6766aaedd82235a82e87c6b0a7fa63ad71513e43f1b12a89e,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4780,0,1,50836fef64e4f508a2f70175fce08dae54861b0690bfd6af3a0acab7a4fbf285,2025-06-05T19:36:06.897000
|
||||
CVE-2025-47809,0,0,7378247eba6fac39102e733903012e4738ae1399f25f08cdedbbe88c7b8a3bad,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4781,0,0,9dabcc14836b43733524131bd4b7d81a20b179417e93f112f8e4e0e5eedf8fdb,2025-05-21T20:59:18.993000
|
||||
CVE-2025-47814,0,0,91d01c94bb9a2d6cbf1f2ce3b51913f5401bb5d496a9da26d55db4bea09f6271,2025-05-13T15:15:59.160000
|
||||
@ -295908,7 +295910,7 @@ CVE-2025-4849,0,0,79bafc8d78c1efc632ed95ad4a130766ed5d90c45e45605773df0d46773756
|
||||
CVE-2025-48490,0,0,87ecfeb6e490715223675b6987710680d7319b22f1f72e859b8289d6cc58a36f,2025-05-30T16:31:03.107000
|
||||
CVE-2025-48491,0,0,192909d10acf6a2f5c7dbd7cf4a77eb5c3f60df46b3da837effcf5a7a7693800,2025-05-30T16:31:03.107000
|
||||
CVE-2025-48492,0,0,403a5473251d0861ab7d826ccca3a9aee2288a4f6bf49b37e21ab18d8ee7611e,2025-06-04T19:56:47.567000
|
||||
CVE-2025-48493,1,1,033b0f2ecabbd4a5efd11dc5c0b94aedb4fdd1dec739449f2d4d37431b26608e,2025-06-05T17:15:29.377000
|
||||
CVE-2025-48493,0,0,033b0f2ecabbd4a5efd11dc5c0b94aedb4fdd1dec739449f2d4d37431b26608e,2025-06-05T17:15:29.377000
|
||||
CVE-2025-48494,0,0,e00521f8a0f3a9ebe9171d0cc58187598193294c5888b4b6a1109f72d9410a03,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48495,0,0,fb3d4c3815acb69b7e6dd709945e299a370be57fca621c3fdcbb8bde438068e6,2025-06-02T17:32:17.397000
|
||||
CVE-2025-4850,0,0,f4734de71688bb34b47f04cb41c5af0cc568cf46c9e6cb90745360a2b3c7693b,2025-05-24T00:57:35.620000
|
||||
@ -296023,7 +296025,7 @@ CVE-2025-48934,0,0,5fbbb42bd65d5a10fa3798188dfa5a3d35dfeeff75f700ed53d72fdf4fd7a
|
||||
CVE-2025-48935,0,0,285fbfce3a00bd7689fb5587111ddd0dc8f65774a119270b6d122b217a2f2c8f,2025-06-04T20:15:24.330000
|
||||
CVE-2025-48936,0,0,466cc85edbb9de09c6e53990c33f4edba165b1227854443bbecd0e6313d71310,2025-06-04T18:31:41.773000
|
||||
CVE-2025-48938,0,0,a912921d4d92c08babc86f1d87d9a3c7f64794d28789a8d268c733457eab99b1,2025-06-02T17:32:17.397000
|
||||
CVE-2025-4894,0,0,c35734ea3b9d1c2d9fc5ff2784c4ea0a6404c54d6ca085ce7efa4587f756b4da,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4894,0,1,e203d4bd91eb3e3cb92f624dec258fe2ede19a69c9e41059892032f4ff18f560,2025-06-05T19:39:01.520000
|
||||
CVE-2025-48940,0,0,69c8738c40ce7804d4df0abebfa7b439311ba65046421bb97675e682461cc8b0,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48941,0,0,27372c9a3f2bc12dcc7fb2eb69cf1151ae0278ab9c7bcb04bd6a31084f7da468,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48942,0,0,2a485fb562d70d0576cababddaf40f7a7eb7a022a0399a7752fb108cbdc63bd5,2025-06-02T17:32:17.397000
|
||||
@ -296061,7 +296063,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094
|
||||
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
|
||||
CVE-2025-49007,0,0,d8df88ddb67d849e1e0f062e7015a01cc75e40595f763cd8d0df9b7eb17fb116,2025-06-04T23:15:21.540000
|
||||
CVE-2025-49008,0,0,1a51e27e6a013c43166249fe0ee8fe5264ecf51cc772afb6e621b5cd0bc71c49,2025-06-05T14:15:32.520000
|
||||
CVE-2025-49009,1,1,97c70198aef0d40d4d31a16fb239db47907d0d4bc74a3f5c6ed4175be269a781,2025-06-05T17:15:29.570000
|
||||
CVE-2025-49009,0,0,97c70198aef0d40d4d31a16fb239db47907d0d4bc74a3f5c6ed4175be269a781,2025-06-05T17:15:29.570000
|
||||
CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e8d,2025-05-21T13:40:20.293000
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
@ -296112,8 +296114,8 @@ CVE-2025-4932,0,0,e41c8c7120f6be787f778775691442ae3f684922a5cb2fdd2af424e8de0f06
|
||||
CVE-2025-4933,0,0,0fbe7adf27b85ffbb28114888a777d26eb2d318b5f12830f1886cb4f39dc30e8,2025-05-21T17:43:51.150000
|
||||
CVE-2025-4934,0,0,661cbc97b2adf4ec313661a8210ecceab635f3c4c1dd76317d718414fbabce61,2025-05-28T12:45:54.230000
|
||||
CVE-2025-4935,0,0,92cb90814ea6fb6d6ceddf06a94155e30e3eafd607e5ccb1da311d381c9aeaee,2025-05-28T12:29:38.047000
|
||||
CVE-2025-4936,0,0,b796de04ed72d3ddae709233c3e5d64b8529db19cc4a5257b40d1d7d2f3b7003,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4937,0,0,7a5da748e88b98653597e71442ed8dabf484aeeb6d6748285bd4ad6898095dad,2025-05-21T20:25:33.823000
|
||||
CVE-2025-4936,0,1,fd9d880b7441ec1437d5f670ce3c73dd4d729c4bf41ee475585bff130ceae1f2,2025-06-05T19:39:27.940000
|
||||
CVE-2025-4937,0,1,b11676149af0c28f312982d79c8f35a9ba810703d80c77681d063c82de8ef130,2025-06-05T19:42:48.337000
|
||||
CVE-2025-4938,0,0,9bfbb8aefdfbb754eacbb83a30a05c557a118de2c85e31be873a9e69bcb3eeca,2025-05-28T01:33:36.677000
|
||||
CVE-2025-4939,0,0,5ec31620a920403386badd8ed8c9ad70156a6e4853cf1462dcd01754dc60b7d3,2025-05-28T01:32:20.263000
|
||||
CVE-2025-4940,0,0,2476264f5ca230e398816216f503ad21bd6ee0718fc81a3cc8e1ef1268a9a775,2025-05-21T20:25:16.407000
|
||||
@ -296292,7 +296294,7 @@ CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fb
|
||||
CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000
|
||||
CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000
|
||||
CVE-2025-5213,0,0,8262fd7ad3860a05f2599b6c82e670c892a52b241834cc36a8cbcfe508de4e0a,2025-06-05T14:12:38.577000
|
||||
CVE-2025-5214,0,1,a52b4862bb884abe1a919229c049af5540894bace11b462a27b3279b9175c70c,2025-06-05T16:00:18.113000
|
||||
CVE-2025-5214,0,0,a52b4862bb884abe1a919229c049af5540894bace11b462a27b3279b9175c70c,2025-06-05T16:00:18.113000
|
||||
CVE-2025-5215,0,0,b474fef582698d1da247f3d19a45fd39f888869bffdeede119632bb605f5727f,2025-06-05T15:59:44.683000
|
||||
CVE-2025-5216,0,0,055c6e0bf462827ac1da33850cd24c0034f80451f364dc70e380ec186ecf86e2,2025-06-05T15:59:14.990000
|
||||
CVE-2025-5217,0,0,845e58cc2a7cf7d636f8550dca345401beab30372e211227ca46148f5ec7226e,2025-06-05T15:58:28.290000
|
||||
@ -296581,12 +296583,20 @@ CVE-2025-5661,0,0,48584c23c019a116bc867e0c6bd399859edeb270cdcee39bbbbb2266d281bc
|
||||
CVE-2025-5663,0,0,8e3f5d413c4aa2afa0e7546309b4c5ab94c22ccf32423975da7301a2ebc5d1f3,2025-06-05T15:15:48.467000
|
||||
CVE-2025-5664,0,0,0195d66ec5053c33da77920f1e566cdf785064ad2f039ed17c4e60bf3a966013,2025-06-05T15:15:48.627000
|
||||
CVE-2025-5665,0,0,bde0ca2b3d1395a5645a500bf9e3ee250cfdeeb3ad50502bfb1f34f5edaf902e,2025-06-05T15:15:48.847000
|
||||
CVE-2025-5666,1,1,a465b9fbcda06eed40215a0319871093255e2484c23d800c36ea42c3bd561e93,2025-06-05T16:15:27.470000
|
||||
CVE-2025-5667,1,1,beff78e3ff677c9a3d449fc77798121a9445d57020cc79d811b1f9400c6a259a,2025-06-05T16:15:27.683000
|
||||
CVE-2025-5668,1,1,d9c38590eaf693600e0ab8471b4b62574adb74e0256445216af5e035e09d74dd,2025-06-05T17:15:29.730000
|
||||
CVE-2025-5669,1,1,e93c6e68a8323ddaabbf5ac9e3880a32030271b5f67e34ce4666d235eba27829,2025-06-05T17:15:29.917000
|
||||
CVE-2025-5670,1,1,b4f91dafeb4138ba612234c8143412892983d95e9240fa2ffee1de7394c7ac5d,2025-06-05T17:15:30.117000
|
||||
CVE-2025-5683,0,0,ba4cab8ac4a992f679318045c0972e1d1d7a83c5101ea31565eb781d5696d00a,2025-06-05T06:15:27.517000
|
||||
CVE-2025-5666,0,0,a465b9fbcda06eed40215a0319871093255e2484c23d800c36ea42c3bd561e93,2025-06-05T16:15:27.470000
|
||||
CVE-2025-5667,0,0,beff78e3ff677c9a3d449fc77798121a9445d57020cc79d811b1f9400c6a259a,2025-06-05T16:15:27.683000
|
||||
CVE-2025-5668,0,1,76c95f9734325b6f91df631f8c0e96fe0c6f248d11d8ab5df18d8df8fd2b78e2,2025-06-05T18:15:22.447000
|
||||
CVE-2025-5669,0,1,fe384574c395d319387b4a7905aad34bfb866da090b8f7e6c2759aab4910b610,2025-06-05T18:15:22.627000
|
||||
CVE-2025-5670,0,1,bb319b3e1f78ddbb0b25287ad73b0f5017700736f61811adde00cdc7a82f46f3,2025-06-05T18:15:22.790000
|
||||
CVE-2025-5671,1,1,da7978d309ee259af0cdfac673f0b0e208f5e3d92963b8778239b679f7e58169,2025-06-05T18:15:22.947000
|
||||
CVE-2025-5672,1,1,c4ee3e1d3b4311403311feb8cad1437d8fcaf28117056653f1fcde6e003e1808,2025-06-05T18:15:23.220000
|
||||
CVE-2025-5674,1,1,324741bb7b6abb6ccbb994090b7e4e98ff38299ae39c2b78118159271f422981,2025-06-05T19:15:29.627000
|
||||
CVE-2025-5675,1,1,21722a3f896ba0469fa2aae99cfc376ed9957b422b3c81bf5e2629e6ce677760,2025-06-05T19:15:29.993000
|
||||
CVE-2025-5676,1,1,0634663974cbb998802bfba213f9b0aba85adcf56fe2d94307c17ebca513cc04,2025-06-05T19:15:30.247000
|
||||
CVE-2025-5677,1,1,fbe2b02a639304da37eda3a9eef9cd4e6d151569861ab9b7eecacb591839e4c2,2025-06-05T19:15:30.487000
|
||||
CVE-2025-5679,1,1,21b457901aeabd6b63461d46d8982b2e96b6c47559232158af772aaacd4cf937,2025-06-05T19:15:30.697000
|
||||
CVE-2025-5683,0,1,96eafcd109560d45c8a6c123e3d3545fb70ce0bc8b75045730d5be51598134e9,2025-06-05T19:15:30.890000
|
||||
CVE-2025-5688,0,0,73bb641229fc7f0cc58d056bcd50b9204b2df12fec290a20f6d3344d9742580f,2025-06-04T17:15:29.330000
|
||||
CVE-2025-5690,0,0,ac9502bdafeae675eb4593084c8644a2164e57d1b6a23446acd8173b20c2ef82,2025-06-04T22:15:26.470000
|
||||
CVE-2025-5701,0,0,25dfd43bc0d8a99b1c1ad2c25933fffdc37face9a53fdc8c0d697535d26edf00,2025-06-05T12:15:24.233000
|
||||
CVE-2025-5702,1,1,7eb2db6bf991037e6e18e46a46e76c5c91b80b8e0ea1499a7274990d167be027,2025-06-05T19:15:31.073000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user