mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-25T20:00:19.931084+00:00
This commit is contained in:
parent
fdbd18ac4d
commit
2b5ba16802
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39343",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2021-10-19T15:15:07.877",
|
||||
"lastModified": "2024-11-21T06:19:21.513",
|
||||
"lastModified": "2025-04-25T19:11:59.100",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -105,9 +105,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mpl-publisher_project:mpl-publisher:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:mpl-publisher:mpl-publisher:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.30.2",
|
||||
"matchCriteriaId": "F02DDCA6-A47E-4196-92FF-FBC684BF5B17"
|
||||
"matchCriteriaId": "7A8A5DEE-D873-424F-9B90-C4D3C59A369E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-45985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-10T09:15:07.250",
|
||||
"lastModified": "2025-02-12T16:15:33.000",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-25T18:54:09.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,8 +86,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lua:lua:5.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9255844F-00EF-4D50-9292-3A12FD1FB3A7"
|
||||
"criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.0",
|
||||
"versionEndExcluding": "5.4.4",
|
||||
"matchCriteriaId": "6722715C-7599-4D4C-A636-8A9A9F7F4619"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-0698",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2022-11-25T18:15:10.470",
|
||||
"lastModified": "2024-11-21T06:39:12.727",
|
||||
"lastModified": "2025-04-25T18:15:21.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23044",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2022-11-25T17:15:10.637",
|
||||
"lastModified": "2024-11-21T06:47:52.483",
|
||||
"lastModified": "2025-04-25T18:15:22.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-26885",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-11-24T16:15:17.127",
|
||||
"lastModified": "2024-11-21T06:54:44.183",
|
||||
"lastModified": "2025-04-25T19:15:44.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2721",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2022-11-25T05:15:12.373",
|
||||
"lastModified": "2024-11-21T07:01:34.917",
|
||||
"lastModified": "2025-04-25T18:15:23.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36133",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T06:15:10.623",
|
||||
"lastModified": "2024-11-21T07:12:27.977",
|
||||
"lastModified": "2025-04-25T18:15:23.683",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37720",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:10.687",
|
||||
"lastModified": "2024-11-21T07:15:06.330",
|
||||
"lastModified": "2025-04-25T18:15:23.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T17:15:10.707",
|
||||
"lastModified": "2024-11-21T07:15:06.487",
|
||||
"lastModified": "2025-04-25T18:15:24.077",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38767",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T15:15:10.453",
|
||||
"lastModified": "2024-11-21T07:17:02.893",
|
||||
"lastModified": "2025-04-25T19:15:45.180",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T17:15:10.763",
|
||||
"lastModified": "2024-11-21T07:17:07.510",
|
||||
"lastModified": "2025-04-25T19:15:45.707",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3822",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:14.387",
|
||||
"lastModified": "2024-11-21T07:20:18.383",
|
||||
"lastModified": "2025-04-25T18:15:24.263",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3833",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:15.880",
|
||||
"lastModified": "2024-11-21T07:20:19.763",
|
||||
"lastModified": "2025-04-25T18:15:24.417",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3848",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:17.560",
|
||||
"lastModified": "2024-11-21T07:20:21.693",
|
||||
"lastModified": "2025-04-25T18:15:24.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41568",
|
||||
"sourceIdentifier": "dl_cve@linecorp.com",
|
||||
"published": "2022-11-29T05:15:11.427",
|
||||
"lastModified": "2024-11-21T07:23:24.753",
|
||||
"lastModified": "2025-04-25T18:15:24.833",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:10.800",
|
||||
"lastModified": "2024-11-21T07:24:22.093",
|
||||
"lastModified": "2025-04-25T18:15:25.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -100,6 +130,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-forum-subject-a453789736f2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45036",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:10.877",
|
||||
"lastModified": "2024-11-21T07:28:38.987",
|
||||
"lastModified": "2025-04-25T19:15:46.337",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45037",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:10.927",
|
||||
"lastModified": "2024-11-21T07:28:39.130",
|
||||
"lastModified": "2025-04-25T19:15:46.637",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45038",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:10.977",
|
||||
"lastModified": "2024-11-21T07:28:39.263",
|
||||
"lastModified": "2025-04-25T19:15:46.800",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45039",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:11.027",
|
||||
"lastModified": "2024-11-21T07:28:39.400",
|
||||
"lastModified": "2025-04-25T19:15:46.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-25T16:15:11.080",
|
||||
"lastModified": "2024-11-21T07:28:39.550",
|
||||
"lastModified": "2025-04-25T19:15:47.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45462",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-11-23T09:15:09.300",
|
||||
"lastModified": "2024-11-21T07:29:18.100",
|
||||
"lastModified": "2025-04-25T19:15:47.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45472",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-23T06:15:08.900",
|
||||
"lastModified": "2024-11-21T07:29:18.640",
|
||||
"lastModified": "2025-04-25T19:15:47.447",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45866",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-23T20:15:10.380",
|
||||
"lastModified": "2024-11-21T07:29:51.723",
|
||||
"lastModified": "2025-04-25T19:15:47.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45872",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-23T22:15:09.937",
|
||||
"lastModified": "2024-11-21T07:29:52.530",
|
||||
"lastModified": "2025-04-25T19:15:48.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45873",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-23T23:15:10.183",
|
||||
"lastModified": "2024-11-21T07:29:52.680",
|
||||
"lastModified": "2025-04-25T19:15:48.487",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49114",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2024-02-26T16:27:47.217",
|
||||
"lastModified": "2025-02-13T18:15:42.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T19:40:19.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,24 +49,70 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hexagon:qognify_vms_client_viewer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1",
|
||||
"matchCriteriaId": "00DC0AB1-9B1F-46CE-933A-1F309EE6F070"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/10",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://r.sec-consult.com/qognify",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Mar/10",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://r.sec-consult.com/qognify",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49960",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T16:27:47.373",
|
||||
"lastModified": "2024-11-21T08:34:05.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:09:33.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:indu-sol:profinet-inspektor_nt_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.4.0",
|
||||
"matchCriteriaId": "ACB4575D-0A21-4D0C-B5A2-5335BA3EE46F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:indu-sol:profinet-inspektor_nt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "619E7AB4-383B-438F-95BC-355D582D6D84"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.indu-sol.com/en/products/profinet/diagnostics/profinet-inspektorr-nt/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.indu-sol.com/en/products/profinet/diagnostics/profinet-inspektorr-nt/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50246",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-13T21:15:08.450",
|
||||
"lastModified": "2024-11-21T08:36:44.380",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-25T18:54:24.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -94,8 +94,18 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jqlang:jq:1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB4D6ED1-816E-4FB7-B9EE-188B66543156"
|
||||
"criteria": "cpe:2.3:a:jqlang:jq:1.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E376A1CD-1E0F-4637-944C-AE0760D79C6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jqlang:jq:1.7:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5302658-593D-45D1-AED6-F6A81F8E2777"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jqlang:jq:1.7:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99A8522E-20D7-4A3D-B0EA-8E8AA1F7DFFB"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1735",
|
||||
"sourceIdentifier": "dl_cve@linecorp.com",
|
||||
"published": "2024-02-26T16:27:53.123",
|
||||
"lastModified": "2025-03-29T00:15:17.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:13:45.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -71,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.27.2",
|
||||
"matchCriteriaId": "FC9B352F-EB61-446F-954A-17196DE00E81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/line/armeria/security/advisories/GHSA-4m6j-23p2-8c54",
|
||||
"source": "dl_cve@linecorp.com"
|
||||
"source": "dl_cve@linecorp.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/line/armeria/security/advisories/GHSA-4m6j-23p2-8c54",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20065",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:08.463",
|
||||
"lastModified": "2024-11-21T08:51:56.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:39:04.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,131 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20067",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:08.770",
|
||||
"lastModified": "2024-11-21T08:51:56.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:39:01.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,14 +61,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20068",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:08.873",
|
||||
"lastModified": "2024-11-21T15:15:26.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:30.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,186 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F419FE2-2D6D-48EE-9B6C-E88AC5D44186"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68AA1CF7-F1CB-44A0-980E-DB32D9E379B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBBB30DF-E963-4940-B742-F6801F68C3FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20069",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:08.977",
|
||||
"lastModified": "2024-11-21T08:51:57.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:24.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,136 @@
|
||||
"value": "CWE-757"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20070",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.093",
|
||||
"lastModified": "2024-11-21T08:51:57.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:13.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,251 @@
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B763B71-F913-45B4-B91E-D7F0670C4315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6298:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2EABFE5-4B6F-446C-9DE7-008D47C09ED7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6815:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7122918-8C44-4F24-82E4-B8448247FC83"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "855A8046-34ED-4891-ACE5-76AB10AC8D53"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A97CE1E0-7B77-49BA-8D92-9AF031CD18FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33DEF766-EAF1-4E36-BB7C-43069B26507A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2758122C-4D11-4D34-9B72-3905F3A28448"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20071",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.220",
|
||||
"lastModified": "2024-11-21T08:51:57.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:10.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,87 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.5.0",
|
||||
"matchCriteriaId": "BBCA2F4F-9703-49AD-A6B3-3374AD6E1357"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20072",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.320",
|
||||
"lastModified": "2024-11-21T08:51:57.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:06.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,87 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.5.0",
|
||||
"matchCriteriaId": "BBCA2F4F-9703-49AD-A6B3-3374AD6E1357"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AED95D06-8EC6-4070-BE3C-E0F851D7FFC1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20073",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.420",
|
||||
"lastModified": "2024-11-21T08:51:57.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:38:02.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,77 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.5.0",
|
||||
"matchCriteriaId": "BBCA2F4F-9703-49AD-A6B3-3374AD6E1357"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55EB4B27-6264-45BE-9A22-BE8418BB0C06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20074",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.520",
|
||||
"lastModified": "2024-11-21T08:51:57.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:43.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,211 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20090",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.430",
|
||||
"lastModified": "2024-10-07T19:36:41.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:39.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,129 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20092",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.680",
|
||||
"lastModified": "2024-10-07T19:36:41.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:36.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,129 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20094",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.823",
|
||||
"lastModified": "2024-10-07T19:36:42.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:32.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,149 @@
|
||||
"value": "CWE-617"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E30A2D2E-6A72-4070-A471-EEE75F7D07F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F1D09FC-5BE9-4B23-82F1-3C6EAC5711A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F883C6D3-1724-4553-9EFC-3D204FF3CAA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D09F23D-D023-4A60-B426-61251FDD8A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20098",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:03.127",
|
||||
"lastModified": "2024-10-07T19:36:42.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:17.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,149 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20099",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:03.200",
|
||||
"lastModified": "2024-10-07T19:36:42.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:37:06.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,89 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "437D8F9D-67DF-47A5-9C96-5B51D1562951"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20100",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:03.273",
|
||||
"lastModified": "2024-10-07T19:36:43.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:36:53.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,150 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:iot_yocto:24.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21917FFD-A4EA-43A2-BE2C-FB9B24ECDDB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.3",
|
||||
"matchCriteriaId": "717EE6D8-BCB9-4F8B-AC18-5B2CD6F847CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F897E19-008E-4DC8-B4CB-BF27044B9F5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8698:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A8B1C43-5770-440F-8015-3BBBD7AF8386"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21501",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-02-24T05:15:44.310",
|
||||
"lastModified": "2024-11-21T08:54:33.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T19:37:25.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,70 +81,162 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apostrophecms:sanitize-html:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "2.12.1",
|
||||
"matchCriteriaId": "39A4A2E7-4806-4E3D-861C-AF5D2A58CDD7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/apostrophe/discussions/4436",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/sanitize-html/pull/650",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334",
|
||||
"source": "report@snyk.io"
|
||||
"source": "report@snyk.io",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/apostrophe/discussions/4436",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/apostrophecms/sanitize-html/pull/650",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22371",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-26T16:27:56.557",
|
||||
"lastModified": "2024-11-21T08:56:08.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:56:25.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.21.4",
|
||||
"matchCriteriaId": "538BED08-EC3A-4994-AD1C-2E55AF256D72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:*:-:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.0.4",
|
||||
"matchCriteriaId": "0D74033D-CA38-4898-AAF5-9A326272C684"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.1.0",
|
||||
"versionEndExcluding": "4.4.0",
|
||||
"matchCriteriaId": "27A2B9B3-E722-442D-81B4-F2DE97C328FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:3.22.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA31037D-507A-42D5-97BE-E57A85C9FF4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://camel.apache.org/security/CVE-2024-22371.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://camel.apache.org/security/CVE-2024-22371.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22873",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T16:27:56.733",
|
||||
"lastModified": "2024-11-21T08:56:44.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T19:03:39.103",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,38 +51,81 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tencent:blueking_cmdb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.2",
|
||||
"versionEndIncluding": "3.9.47",
|
||||
"matchCriteriaId": "6C6EA836-7A56-4910-9ED1-A353F28B692E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blueking.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://tencent.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/exp1orer/0f190c6a64b668a9b1c4c47789affa09",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sphenoid-enquiry-9be.notion.site/BK-CMDB-SSRF-ba21e94f4976460188fa52d26c15a6ae?pvs=4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://blueking.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://tencent.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/exp1orer/0f190c6a64b668a9b1c4c47789affa09",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sphenoid-enquiry-9be.notion.site/BK-CMDB-SSRF-ba21e94f4976460188fa52d26c15a6ae?pvs=4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22988",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T23:15:09.623",
|
||||
"lastModified": "2024-11-21T08:56:51.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T19:36:34.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,34 +51,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zkteco:zkbio_wdms:8.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93E12F9E-A786-42AC-96DF-341AE2C3B068"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://zkteco.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://zkteco.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T16:27:58.897",
|
||||
"lastModified": "2024-11-21T09:00:39.500",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T19:04:02.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,38 +51,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itflow:itflow:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "25.03",
|
||||
"matchCriteriaId": "3C4BDF08-168C-4182-81DC-BB2169864681"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/itflow-org/itflow/commit/432488eca3998c5be6b6b9e8f8ba01f54bc12378",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/itflow-org/itflow/commit/8068cb6081e4760860a634c1066b2c64d0ee2d46",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itflow.org/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/itflow-org/itflow/commit/432488eca3998c5be6b6b9e8f8ba01f54bc12378",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/itflow-org/itflow/commit/8068cb6081e4760860a634c1066b2c64d0ee2d46",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itflow.org/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-23T23:15:09.740",
|
||||
"lastModified": "2024-11-21T09:00:51.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T19:37:07.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:crmeb:crmeb_java:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29B90E2B-2215-4CB0-B880-C1256838E9F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/crmeb/crmeb_java/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crmeb/crmeb_java/issues/20",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crmeb/crmeb_java/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/crmeb/crmeb_java/issues/20",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-301xx/CVE-2024-30152.json
Normal file
56
CVE-2024/CVE-2024-301xx/CVE-2024-30152.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-30152",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2025-04-25T18:15:25.247",
|
||||
"lastModified": "2025-04-25T18:15:25.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL SX v21 is affected by usage of a weak cryptographic algorithm. An attacker could exploit this weakness to gain access to sensitive information, modify data, or other impacts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120735",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50960",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-15T18:15:45.263",
|
||||
"lastModified": "2025-04-22T18:00:52.937",
|
||||
"lastModified": "2025-04-25T18:35:24.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -145,9 +145,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:extron:smp_211_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:extron:sme_211_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.02",
|
||||
"matchCriteriaId": "4DD03796-3C6B-4BC6-BE40-49E84F48B798"
|
||||
"matchCriteriaId": "57D28355-7E2F-4715-8564-FDD5FDC55DD4"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -157,8 +157,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:extron:smp_211:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC13812F-5573-49EE-BA54-244950DA6C25"
|
||||
"criteria": "cpe:2.3:h:extron:sme_211:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0083591-BB29-41DB-8165-EE410050B0B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56430",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-25T18:15:22.487",
|
||||
"lastModified": "2024-12-26T20:15:23.447",
|
||||
"lastModified": "2025-04-25T18:15:25.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -74,6 +74,10 @@
|
||||
"url": "https://github.com/openfheorg/openfhe-development/releases/tag/v1.2.3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/25/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/UnionTech-Software/openfhe-PoC",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2024-56431",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-25T17:15:05.510",
|
||||
"lastModified": "2025-04-21T16:53:13.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"lastModified": "2025-04-25T19:15:48.813",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "oc_huff_tree_unpack in huffdec.c in libtheora in Theora through 1.0 7180717 has an invalid negative left shift."
|
||||
"value": "oc_huff_tree_unpack in huffdec.c in libtheora in Theora through 1.0 7180717 has an invalid negative left shift. NOTE: this is disputed by third parties because there is no evidence of a security impact, e.g., an application would not crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,6 +97,14 @@
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2025/04/25/6",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/25/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22035",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:15:56.110",
|
||||
"lastModified": "2025-04-21T15:15:58.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:43:50.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,42 +51,151 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14.324",
|
||||
"versionEndExcluding": "4.15",
|
||||
"matchCriteriaId": "71EE7896-7ADF-4518-840E-AFA5008A220C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.293",
|
||||
"versionEndExcluding": "4.20",
|
||||
"matchCriteriaId": "D51950EF-B814-4998-A0B2-65B014DDF4B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.255",
|
||||
"versionEndExcluding": "5.4.292",
|
||||
"matchCriteriaId": "6E1C0F63-4CF8-4DBE-8382-68AAF5BA2EEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.193",
|
||||
"versionEndExcluding": "5.10.236",
|
||||
"matchCriteriaId": "C6A39FE1-2EDE-4A5B-A6B8-1FF7FB12FCD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.129",
|
||||
"versionEndExcluding": "5.15.180",
|
||||
"matchCriteriaId": "954DCB85-1A70-4D6F-803D-F08554B92053"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.50",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "64F3AB12-D09C-4CC0-A1D0-80C64AE2F11C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.13",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "043416BF-CC26-44F1-88BF-D9468ABD1929"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/099ef3385800828b74933a96c117574637c3fb3a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42561fe62c3628ea3bc9623f64f047605e98857f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/70be951bc01e4a0e10d443f3510bb17426f257fb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7f81f27b1093e4895e87b74143c59c055c3b1906",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81a85b12132c8ffe98f5ddbdc185481790aeaa1b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a2cce54c1748216535dda02e185d07a084be837e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c85efe6e13743cac6ba4ccf144cb91f44c86231a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de7b309139f862a44379ecd96e93c9133c69f813",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f14752d66056d0c7bffe5092130409417d3baa70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22040",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:15:56.590",
|
||||
"lastModified": "2025-04-21T15:15:59.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:42:54.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,94 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "2EFC4C26-A1CE-49FA-98FE-0CF323672E9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3980770cb1470054e6400fd97668665975726737",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/596407adb9af1ee75fe7c7529607783d31b66e7f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7dfbd4c43eed91dd2548a95236908025707a8dfd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9069939d762138e232a6f79e3e1462682ed6a17d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94c281721d4ed2d972232414b91d98a6f5bdb16b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa4cdb8cbca7d6cb6aa13e4d8d83d1103f6345db",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22041",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:15:56.693",
|
||||
"lastModified": "2025-04-21T15:15:59.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:42:20.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,94 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "2EFC4C26-A1CE-49FA-98FE-0CF323672E9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.13",
|
||||
"matchCriteriaId": "2897389C-A8C3-4D69-90F2-E701B3D66373"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15a9605f8d69dc85005b1a00c31a050b8625e1aa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/33cc29e221df7a3085ae413e8c26c4e81a151153",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ed0e9d2f410f63525afb8351181eea36c80bcf1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a8a8ae303a8395cbac270b5b404d85df6ec788f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca042cc0e4f9e0d2c8f86dd67e4b22f30a516a9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0eb3f575138b816da74697bd506682574742fcd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22085",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:02.700",
|
||||
"lastModified": "2025-04-21T15:15:59.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:41:52.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "442B00D1-26AD-4DD9-B74A-E818807D3E2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d6460b9d2a3ee380940bdf47680751ef91cb88e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d6a9e7449e2a0c1e2934eee7880ba8bd1e464cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/56ec8580be5174b2b9774066e60f1aad56d201db",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/edf6b543e81ba68c6dbac2499ab362098a5a9716",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22088",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:03.000",
|
||||
"lastModified": "2025-04-21T15:15:59.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:41:27.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,95 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "8B65B69C-B52B-4CD1-AEB5-C1EBC486B174"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/667a628ab67d359166799fad89b3c6909599558a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/78411a133312ce7d8a3239c76a8fd85bca1cc10f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7aa6bb5276d9fec98deb05615a086eeb893854ad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/83437689249e6a17b25e27712fbee292e42e7855",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a114d25d584c14019d31dbf2163780c47415a187",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc1db4d8f1b0dc480d7d745a60a8cc94ce2badd4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22097",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:04.080",
|
||||
"lastModified": "2025-04-25T15:15:35.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:41:04.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,34 +51,109 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.15.180",
|
||||
"matchCriteriaId": "B590CF27-0840-4946-B6A5-CBD9BB4796CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "3985DEC3-0437-4177-BC42-314AB575285A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "EFF24260-49B1-4251-9477-C564CFDAD25B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "26CAB76D-F00F-43CE-BEAD-7097F8FB1D6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25775",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-25T17:15:18.020",
|
||||
"lastModified": "2025-04-25T17:15:18.020",
|
||||
"lastModified": "2025-04-25T18:15:25.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Codeastro Bus Ticket Booking System v1.0 is vulnerable to SQL injection via the kodetiket parameter in /BusTicket-CI/tiket/cekorder."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/bus-ticket-booking-system-in-php-codeigniter-with-source-code/",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25775",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25775",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29039",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T17:15:32.797",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T18:28:39.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en dlink DIR 832x 240802 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n 0x41dda8"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,18 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/734fd1d93e4c08cea55dcb1e8b189a2b",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-set_ntp-year-CommandInjection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.387",
|
||||
"lastModified": "2025-04-21T18:39:38.827",
|
||||
"lastModified": "2025-04-25T18:34:37.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -61,8 +61,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-832x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A95905C-8E6C-470F-A0DC-F9BE8A4831BF"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -72,8 +72,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-832x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D215FF9C-55FD-438B-82EE-EF0E8B628444"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.520",
|
||||
"lastModified": "2025-04-21T18:40:47.357",
|
||||
"lastModified": "2025-04-25T18:28:55.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -61,8 +61,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-832x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A95905C-8E6C-470F-A0DC-F9BE8A4831BF"
|
||||
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -72,8 +72,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-832x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D215FF9C-55FD-438B-82EE-EF0E8B628444"
|
||||
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T16:15:38.560",
|
||||
"lastModified": "2025-04-18T15:15:58.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:32:08.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en dlink DIR 832x 240802 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del valor de la clave macaddr en la funci\u00f3n 0x42232c"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/841e78a3c4029808dac8c439595a1358",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-set_prohibiting-macaddr-CommandInjection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-set_prohibiting-macaddr-CommandInjection",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T16:15:38.657",
|
||||
"lastModified": "2025-04-18T16:15:21.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:32:43.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x417234"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en dlink DIR 832x 240802 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n 0x417234"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "692189D6-6D75-4C87-BA1F-15D9C34FAEF6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09CE2627-49F3-4B6F-B48B-F52665C6B8C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/d5a5b18743b7a2fcbc0f93001d8e2ad9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_traceroute-target_addr-CommandInjection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_traceroute-target_addr-CommandInjection",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3512",
|
||||
"sourceIdentifier": "a59d8014-47c4-4630-ab43-e1b13cbe58e3",
|
||||
"published": "2025-04-11T08:15:15.797",
|
||||
"lastModified": "2025-04-25T02:15:14.603",
|
||||
"lastModified": "2025-04-25T18:15:26.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -93,6 +93,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/25/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/25/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-37838",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-18T15:15:59.090",
|
||||
"lastModified": "2025-04-25T11:15:45.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-25T18:40:30.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,94 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.135",
|
||||
"matchCriteriaId": "29C64220-D258-41B3-A931-B8C3456115E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.88",
|
||||
"matchCriteriaId": "6E5947E5-45E3-462A-829B-382B3B1C61BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.24",
|
||||
"matchCriteriaId": "1D35A8A8-F3EC-45E6-AD37-1F154B27529D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.12",
|
||||
"matchCriteriaId": "4A475784-BF3B-4514-81EE-49C8522FB24A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.3",
|
||||
"matchCriteriaId": "483E2E15-2135-4EC6-AB64-16282C5EF704"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4b4194c9a7a8f92db39e8e86c85f4fb12ebbec4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/58eb29dba712ab0f13af59ca2fe545f5ce360e78",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/834e602d0cc7c743bfce734fad4a46cefc0f9ab1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ae5a6a0b425e8f76a9f0677e50796e494e89b088",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d58493832e284f066e559b8da5ab20c15a2801d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e3f88665a78045fe35c7669d2926b8d97b892c11",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-39xx/CVE-2025-3935.json
Normal file
60
CVE-2025/CVE-2025-39xx/CVE-2025-3935.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3935",
|
||||
"sourceIdentifier": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49",
|
||||
"published": "2025-04-25T19:15:49.143",
|
||||
"lastModified": "2025-04-25T19:15:49.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.\u00a0\nIt is important to note that to obtain these machine keys, privileged system level access must be obtained. \n\n\n\nIf these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.\u00a0\n\n\n\nThe risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.\u00a0 This had no direct impact to ScreenConnect Client.\u00a0ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.connectwise.com/company/trust/advisories",
|
||||
"source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49"
|
||||
},
|
||||
{
|
||||
"url": "https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4",
|
||||
"source": "7d616e1a-3288-43b1-a0dd-0a65d3e70a49"
|
||||
}
|
||||
]
|
||||
}
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-25T18:00:20.139716+00:00
|
||||
2025-04-25T20:00:19.931084+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-25T17:15:19.060000+00:00
|
||||
2025-04-25T19:40:19.010000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291454
|
||||
291456
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2021-32601](CVE-2021/CVE-2021-326xx/CVE-2021-32601.json) (`2025-04-25T16:15:21.360`)
|
||||
- [CVE-2024-56156](CVE-2024/CVE-2024-561xx/CVE-2024-56156.json) (`2025-04-25T16:15:25.597`)
|
||||
- [CVE-2025-2068](CVE-2025/CVE-2025-20xx/CVE-2025-2068.json) (`2025-04-25T16:15:25.857`)
|
||||
- [CVE-2025-2069](CVE-2025/CVE-2025-20xx/CVE-2025-2069.json) (`2025-04-25T16:15:26.020`)
|
||||
- [CVE-2025-2070](CVE-2025/CVE-2025-20xx/CVE-2025-2070.json) (`2025-04-25T16:15:26.180`)
|
||||
- [CVE-2025-25775](CVE-2025/CVE-2025-257xx/CVE-2025-25775.json) (`2025-04-25T17:15:18.020`)
|
||||
- [CVE-2025-3928](CVE-2025/CVE-2025-39xx/CVE-2025-3928.json) (`2025-04-25T16:15:27.817`)
|
||||
- [CVE-2024-30152](CVE-2024/CVE-2024-301xx/CVE-2024-30152.json) (`2025-04-25T18:15:25.247`)
|
||||
- [CVE-2025-3935](CVE-2025/CVE-2025-39xx/CVE-2025-3935.json) (`2025-04-25T19:15:49.143`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `68`
|
||||
|
||||
- [CVE-2023-32832](CVE-2023/CVE-2023-328xx/CVE-2023-32832.json) (`2025-04-25T16:15:25.017`)
|
||||
- [CVE-2023-32836](CVE-2023/CVE-2023-328xx/CVE-2023-32836.json) (`2025-04-25T16:15:25.250`)
|
||||
- [CVE-2023-32837](CVE-2023/CVE-2023-328xx/CVE-2023-32837.json) (`2025-04-25T16:15:25.410`)
|
||||
- [CVE-2023-37185](CVE-2023/CVE-2023-371xx/CVE-2023-37185.json) (`2025-04-25T16:52:59.580`)
|
||||
- [CVE-2023-37186](CVE-2023/CVE-2023-371xx/CVE-2023-37186.json) (`2025-04-25T16:52:59.580`)
|
||||
- [CVE-2023-37187](CVE-2023/CVE-2023-371xx/CVE-2023-37187.json) (`2025-04-25T16:52:59.580`)
|
||||
- [CVE-2023-37188](CVE-2023/CVE-2023-371xx/CVE-2023-37188.json) (`2025-04-25T16:52:59.580`)
|
||||
- [CVE-2023-38614](CVE-2023/CVE-2023-386xx/CVE-2023-38614.json) (`2025-04-25T16:55:31.270`)
|
||||
- [CVE-2023-42875](CVE-2023/CVE-2023-428xx/CVE-2023-42875.json) (`2025-04-25T16:56:23.237`)
|
||||
- [CVE-2024-25407](CVE-2024/CVE-2024-254xx/CVE-2024-25407.json) (`2025-04-25T16:29:29.440`)
|
||||
- [CVE-2024-3369](CVE-2024/CVE-2024-33xx/CVE-2024-3369.json) (`2025-04-25T16:43:34.787`)
|
||||
- [CVE-2024-44843](CVE-2024/CVE-2024-448xx/CVE-2024-44843.json) (`2025-04-25T16:48:36.610`)
|
||||
- [CVE-2024-55211](CVE-2024/CVE-2024-552xx/CVE-2024-55211.json) (`2025-04-25T16:31:55.183`)
|
||||
- [CVE-2025-25777](CVE-2025/CVE-2025-257xx/CVE-2025-25777.json) (`2025-04-25T17:15:18.143`)
|
||||
- [CVE-2025-26268](CVE-2025/CVE-2025-262xx/CVE-2025-26268.json) (`2025-04-25T16:33:11.420`)
|
||||
- [CVE-2025-28076](CVE-2025/CVE-2025-280xx/CVE-2025-28076.json) (`2025-04-25T17:15:18.327`)
|
||||
- [CVE-2025-28354](CVE-2025/CVE-2025-283xx/CVE-2025-28354.json) (`2025-04-25T17:15:18.500`)
|
||||
- [CVE-2025-28399](CVE-2025/CVE-2025-283xx/CVE-2025-28399.json) (`2025-04-25T16:53:50.600`)
|
||||
- [CVE-2025-29213](CVE-2025/CVE-2025-292xx/CVE-2025-29213.json) (`2025-04-25T16:49:30.973`)
|
||||
- [CVE-2025-29449](CVE-2025/CVE-2025-294xx/CVE-2025-29449.json) (`2025-04-25T16:28:28.240`)
|
||||
- [CVE-2025-29460](CVE-2025/CVE-2025-294xx/CVE-2025-29460.json) (`2025-04-25T16:27:20.303`)
|
||||
- [CVE-2025-29529](CVE-2025/CVE-2025-295xx/CVE-2025-29529.json) (`2025-04-25T17:15:18.677`)
|
||||
- [CVE-2025-33027](CVE-2025/CVE-2025-330xx/CVE-2025-33027.json) (`2025-04-25T16:54:53.077`)
|
||||
- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-04-25T17:15:19.060`)
|
||||
- [CVE-2025-43015](CVE-2025/CVE-2025-430xx/CVE-2025-43015.json) (`2025-04-25T16:30:24.887`)
|
||||
- [CVE-2024-20099](CVE-2024/CVE-2024-200xx/CVE-2024-20099.json) (`2025-04-25T18:37:06.520`)
|
||||
- [CVE-2024-20100](CVE-2024/CVE-2024-201xx/CVE-2024-20100.json) (`2025-04-25T18:36:53.990`)
|
||||
- [CVE-2024-21501](CVE-2024/CVE-2024-215xx/CVE-2024-21501.json) (`2025-04-25T19:37:25.937`)
|
||||
- [CVE-2024-22371](CVE-2024/CVE-2024-223xx/CVE-2024-22371.json) (`2025-04-25T18:56:25.390`)
|
||||
- [CVE-2024-22873](CVE-2024/CVE-2024-228xx/CVE-2024-22873.json) (`2025-04-25T19:03:39.103`)
|
||||
- [CVE-2024-22988](CVE-2024/CVE-2024-229xx/CVE-2024-22988.json) (`2025-04-25T19:36:34.800`)
|
||||
- [CVE-2024-25344](CVE-2024/CVE-2024-253xx/CVE-2024-25344.json) (`2025-04-25T19:04:02.670`)
|
||||
- [CVE-2024-25469](CVE-2024/CVE-2024-254xx/CVE-2024-25469.json) (`2025-04-25T19:37:07.450`)
|
||||
- [CVE-2024-50960](CVE-2024/CVE-2024-509xx/CVE-2024-50960.json) (`2025-04-25T18:35:24.457`)
|
||||
- [CVE-2024-56430](CVE-2024/CVE-2024-564xx/CVE-2024-56430.json) (`2025-04-25T18:15:25.390`)
|
||||
- [CVE-2024-56431](CVE-2024/CVE-2024-564xx/CVE-2024-56431.json) (`2025-04-25T19:15:48.813`)
|
||||
- [CVE-2025-22035](CVE-2025/CVE-2025-220xx/CVE-2025-22035.json) (`2025-04-25T18:43:50.147`)
|
||||
- [CVE-2025-22040](CVE-2025/CVE-2025-220xx/CVE-2025-22040.json) (`2025-04-25T18:42:54.833`)
|
||||
- [CVE-2025-22041](CVE-2025/CVE-2025-220xx/CVE-2025-22041.json) (`2025-04-25T18:42:20.980`)
|
||||
- [CVE-2025-22085](CVE-2025/CVE-2025-220xx/CVE-2025-22085.json) (`2025-04-25T18:41:52.250`)
|
||||
- [CVE-2025-22088](CVE-2025/CVE-2025-220xx/CVE-2025-22088.json) (`2025-04-25T18:41:27.627`)
|
||||
- [CVE-2025-22097](CVE-2025/CVE-2025-220xx/CVE-2025-22097.json) (`2025-04-25T18:41:04.243`)
|
||||
- [CVE-2025-25775](CVE-2025/CVE-2025-257xx/CVE-2025-25775.json) (`2025-04-25T18:15:25.937`)
|
||||
- [CVE-2025-29039](CVE-2025/CVE-2025-290xx/CVE-2025-29039.json) (`2025-04-25T18:28:39.133`)
|
||||
- [CVE-2025-29040](CVE-2025/CVE-2025-290xx/CVE-2025-29040.json) (`2025-04-25T18:34:37.217`)
|
||||
- [CVE-2025-29041](CVE-2025/CVE-2025-290xx/CVE-2025-29041.json) (`2025-04-25T18:28:55.070`)
|
||||
- [CVE-2025-29042](CVE-2025/CVE-2025-290xx/CVE-2025-29042.json) (`2025-04-25T18:32:08.817`)
|
||||
- [CVE-2025-29043](CVE-2025/CVE-2025-290xx/CVE-2025-29043.json) (`2025-04-25T18:32:43.667`)
|
||||
- [CVE-2025-3512](CVE-2025/CVE-2025-35xx/CVE-2025-3512.json) (`2025-04-25T18:15:26.103`)
|
||||
- [CVE-2025-37838](CVE-2025/CVE-2025-378xx/CVE-2025-37838.json) (`2025-04-25T18:40:30.147`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
236
_state.csv
236
_state.csv
@ -157621,7 +157621,7 @@ CVE-2020-29361,0,0,8f96dc78a3cd8251125d5886a5563892b214f2d34b6a7b081a6ead288974b
|
||||
CVE-2020-29362,0,0,9931bb19e4b0598e0c3625fe41026ed770a6f89771c12becec095f7a785382b8,2024-11-21T05:23:54.810000
|
||||
CVE-2020-29363,0,0,7240de99cbdf0b29f775b9d0ec1755291cba072d713ec51ff04c558cf8cb111b,2024-11-21T05:23:54.980000
|
||||
CVE-2020-29364,0,0,0091872191d0d50768a1d11c96ae4ded3f155fdc30e57a5585dee42d55523a69,2024-11-21T05:23:55.137000
|
||||
CVE-2020-29367,0,1,1405107004ee9ef1f5974d7a84007685e8265f258eede9e9b3191be3c3c28740,2025-04-25T16:52:59.580000
|
||||
CVE-2020-29367,0,0,1405107004ee9ef1f5974d7a84007685e8265f258eede9e9b3191be3c3c28740,2025-04-25T16:52:59.580000
|
||||
CVE-2020-29368,0,0,ffe83e508b9e290331695a6b555d2aea2ac624c4e43a34bb4f39120d1fc75d23,2024-11-21T05:23:55.457000
|
||||
CVE-2020-29369,0,0,84137d673643c06e419662624afee78dda7ff0692e8af488a49325043b066574,2024-11-21T05:23:55.623000
|
||||
CVE-2020-2937,0,0,a4e85d2401784200919fe232602f6182ced286ae5f2bda2f560a503ea886bb41,2024-11-21T05:26:40.753000
|
||||
@ -176569,7 +176569,7 @@ CVE-2021-32596,0,0,424179f5762cca82de0f14f559b7b491e9236c9866a05c1192cd38b05ba57
|
||||
CVE-2021-32597,0,0,fdba287094e6e99fdce3b8c9b6903bb17c330ce0642294a691777020a457e6d5,2024-11-21T06:07:20.997000
|
||||
CVE-2021-32598,0,0,d3ef9f06caa602a9957b61b53a1a3c862d2621f78c96354e7adf2d8ce3148f47,2024-11-21T06:07:21.123000
|
||||
CVE-2021-32600,0,0,f5d9abb66b0cc1d7f762634d9c2f6989cb7b9d1f7bbe381b36b11dae62a87366,2024-11-21T06:07:21.257000
|
||||
CVE-2021-32601,1,1,89993c0541b74df89278e66961613a486b9f2ee177c94b9bfb09f96e16baa5fe,2025-04-25T16:15:21.360000
|
||||
CVE-2021-32601,0,0,89993c0541b74df89278e66961613a486b9f2ee177c94b9bfb09f96e16baa5fe,2025-04-25T16:15:21.360000
|
||||
CVE-2021-32602,0,0,6ca314b2cd3a8ecf79fa14b8ca6677e7f3caed1291728e843a84f054ac16e63b,2024-11-21T06:07:21.377000
|
||||
CVE-2021-32603,0,0,597beea0e9948cc5e2833d547a7c454c1a8cfe9e5ef27ee8489a9f42a6bcbb04,2024-11-21T06:07:21.500000
|
||||
CVE-2021-32604,0,0,05befa00fbde34013f809073665ec42f08fff8cbc95806ffe7b1c7aeaecc93a0,2024-11-21T06:07:21.620000
|
||||
@ -181748,7 +181748,7 @@ CVE-2021-3934,0,0,e1da5ada84f9c169ece76d47fc946e8e32245482f47a26ad3933a83d882f81
|
||||
CVE-2021-39340,0,0,50c8fb7d7a2f996340aae1273cf77b7aa081fcff214c5d517de1549b23026353,2024-11-21T06:19:16.723000
|
||||
CVE-2021-39341,0,0,d262e72f5f503a4959660565182b5d9d651be947647c14c412e9588ae5fca436,2024-11-21T06:19:16.893000
|
||||
CVE-2021-39342,0,0,6d243eb32231eaeacf9963263dbbda4aeafa3b4383e40d74462533a9dd538586,2024-11-21T06:19:21.330000
|
||||
CVE-2021-39343,0,0,4cf44b1a2a339ef1eef3c8b6cea5e52f3b16bd367b8b6f0213baab896c2a6ac8,2024-11-21T06:19:21.513000
|
||||
CVE-2021-39343,0,1,85c22d3020b944023dfef76b9ae3cff14965be265fb35769f1b806f93053bc81,2025-04-25T19:11:59.100000
|
||||
CVE-2021-39344,0,0,7db492b91acb5ce1b3bffaff68f5effeff36e47dd295f7aacd45867b8aca6859,2024-11-21T06:19:21.687000
|
||||
CVE-2021-39345,0,0,8ec7aa9011734a5947ddb8bea09734b9cd8869dd8b1bae62544f76e366e4d5d3,2024-11-21T06:19:21.840000
|
||||
CVE-2021-39346,0,0,949ab327716a527043917ccaa6f14b224bec1431ce532a08b69cdc7e1a1daff4,2024-11-21T06:19:21.997000
|
||||
@ -186607,7 +186607,7 @@ CVE-2021-45980,0,0,f8f2f37f4a6203ec70045d070925b72d05a11e390af6d97d4dd6909f02232
|
||||
CVE-2021-45981,0,0,3fb61d192fcdf03c4e482a6f480291b6b4cf6a1c6b5f0d96897a2b2f98863b60,2024-11-21T06:33:25.317000
|
||||
CVE-2021-45982,0,0,722f12ed419e6b40ff534e919992de734fcef2d85f76ef61756675a8abe7c7d3,2024-11-21T06:33:25.463000
|
||||
CVE-2021-45983,0,0,27e69690d9d191816bcb545e6e4d4a356487e88778575d5d79ed848c0882fc5f,2024-11-21T06:33:25.603000
|
||||
CVE-2021-45985,0,0,a6f49e1af84b57e32c9f150a01af30fb8164f87fad5eff331b1e0b676337f5e1,2025-02-12T16:15:33
|
||||
CVE-2021-45985,0,1,dbc8b53569055eb729094811a1ea85f414253620dae03c6e25edac544018fd93,2025-04-25T18:54:09.817000
|
||||
CVE-2021-45986,0,0,07cb2076c889a9f5cc47d30541cc529afb9f9df95b088a267f0c6d85b5b0700a,2024-11-21T06:33:25.893000
|
||||
CVE-2021-45987,0,0,6146314797d834f557e34fc5c76cfc65c1d92bfd05de0b9af25f579274408f1c,2024-11-21T06:33:26.037000
|
||||
CVE-2021-45988,0,0,d33f41dcca6a050503a5a3cda9ca5b8a9efe656b8feea1e4d2c29dee75e79cfd,2024-11-21T06:33:26.180000
|
||||
@ -188462,7 +188462,7 @@ CVE-2022-0560,0,0,30f5f27c2bac15eb25a6f191b9aa5a9b2cff62d36542fb346d2174cfb0f532
|
||||
CVE-2022-0561,0,0,b4a6b6480fad0f0522489de783d48db48404776b8a46f328b7b5528890b6a14e,2024-11-21T06:38:55.217000
|
||||
CVE-2022-0562,0,0,438bfb8a181e27d77525629f599371baedcafa32392b0fe1e8d57d992a1b1949,2024-11-21T06:38:55.367000
|
||||
CVE-2022-0563,0,0,c5c42212ae633d8fa0e89e321ca1cbfbeff5a46425769d60b86af97550450e29,2024-11-21T06:38:55.503000
|
||||
CVE-2022-0564,0,1,35b17ad3049bc93645757297cbd4d956e9c5550c7a8a083d06d84401abcda483,2025-04-25T16:15:21.977000
|
||||
CVE-2022-0564,0,0,35b17ad3049bc93645757297cbd4d956e9c5550c7a8a083d06d84401abcda483,2025-04-25T16:15:21.977000
|
||||
CVE-2022-0565,0,0,5481f52e56923f57c29c9b01ce5d95bb9cceb57090ae17c7c6a52718697cab36,2024-11-21T06:38:55.793000
|
||||
CVE-2022-0566,0,0,81b59b68fec2129b7106950e0d18b36d03ec49ea9d4f27baeeaa2a4228e62218,2025-04-16T16:15:19.627000
|
||||
CVE-2022-0567,0,0,8eef7670f14f044c7b64b6848af9842be814c05ef7fbb7ebbfbef4f1871997f0,2024-11-21T06:38:56.037000
|
||||
@ -188593,7 +188593,7 @@ CVE-2022-0694,0,0,5a9fb359d1fbbf94ee48749f654974d38a759a3bbf0e1330ec108806d8f517
|
||||
CVE-2022-0695,0,0,d4dcfdacc8226c9ef923591f5b1e9f7942e529f57aac745b5d5a8ad6ba085ae9,2024-11-21T06:39:12.293000
|
||||
CVE-2022-0696,0,0,687a93e1b57e9057677a59d2d2d14ceb56ef6170e838914b1588db3a553cb5c2,2024-11-21T06:39:12.430000
|
||||
CVE-2022-0697,0,0,0ee4bc35858ec715f6b1899302dc268ab3b9d89f39916c9b00a262323d8e870e,2024-11-21T06:39:12.593000
|
||||
CVE-2022-0698,0,0,5831d76d03c19fa181c05d4fe4c1170fe77a0dd36e7764cac9496b8cb05c3b93,2024-11-21T06:39:12.727000
|
||||
CVE-2022-0698,0,1,c53ea38ed4213547259dde94ab0fe41cbd32c232aa611c29c8336209d988bdbd,2025-04-25T18:15:21.760000
|
||||
CVE-2022-0699,0,0,5976bb6a28df65f1e69a1a7b7c723e92803b986a54741243a560dc4c7e8486b7,2024-11-21T06:39:12.850000
|
||||
CVE-2022-0700,0,0,7565763c9904159706da45a2ec0200288243f78fc0f1e17643a4c6255ca4f955,2024-11-21T06:39:12.980000
|
||||
CVE-2022-0701,0,0,fdcf1f7bdb025d6fe0f4809fed9607847d5c1acd307c687ab269bd5c68293ec3,2024-11-21T06:39:13.100000
|
||||
@ -192786,7 +192786,7 @@ CVE-2022-23040,0,0,3eff688ce2782ea563847f14cbdbb09f88bf9b89641a20bfc9fb3fabc336b
|
||||
CVE-2022-23041,0,0,43eb61a70d4bf4ead6337a868755c8ea430e8a77f826fe4ecaa5aeb3e8752d50,2024-11-21T06:47:52.077000
|
||||
CVE-2022-23042,0,0,d58a5de49c2a9b6dee586940043105669a9fb76e7cc88fa2ef943aca6ce250b8,2024-11-21T06:47:52.210000
|
||||
CVE-2022-23043,0,0,893d981a6c84c97c8fa2dce984020b837333becf5de31414e4d37a842e8f7167,2024-11-21T06:47:52.353000
|
||||
CVE-2022-23044,0,0,8e05c733f4dfc4ac0232a8f5d49bc2e1d9602a853720a4a89a28dcd8c8b4a5e6,2024-11-21T06:47:52.483000
|
||||
CVE-2022-23044,0,1,701e45be4c36d4b7ed3f4f379b1702ec06004289d60121c7f1b035512e1be901,2025-04-25T18:15:22.373000
|
||||
CVE-2022-23045,0,0,43f1dd122bfd0861d23c367a3ee76afa3e880835ed1ed608e356a4b3a248e056,2024-11-21T06:47:52.610000
|
||||
CVE-2022-23046,0,0,2990806d80c8a11c0ebcc02fa912566f447e84c8d7e84699a8dc18492ae6648f,2024-11-21T06:47:52.730000
|
||||
CVE-2022-23047,0,0,12c5105c06c4c3fc3f4d43c70d7e183c245617977cb64b10594e8d8b93840d3e,2024-11-21T06:47:52.853000
|
||||
@ -196101,7 +196101,7 @@ CVE-2022-26877,0,0,5f979b96ddc49527bf7d9fb75516d2367e396f7b8dcce2a39bc6d0e57163d
|
||||
CVE-2022-26878,0,0,b327530039ea5d60add8e862f7ea0837cd1d2ddb8bf980de0c11179044b36d23,2024-11-21T06:54:43.893000
|
||||
CVE-2022-2688,0,0,ccd9eb21cef178ad7994715bdc0a1b4c9fc135984f6ed451e126ab797c988b26,2024-11-21T07:01:31.063000
|
||||
CVE-2022-26884,0,0,f79165fd2223609cb46b0e9e39492392e91d8c40a8f267c0cc790caa7700b8ff,2024-11-21T06:54:44.060000
|
||||
CVE-2022-26885,0,0,684b93dcd24c8273f9b3c4c7f504494bbdefa870b0404bd95d3db79f068a3af8,2024-11-21T06:54:44.183000
|
||||
CVE-2022-26885,0,1,e568e6215452c35347b4f15ba5ac5299bfeb583f7634c26e6a11d7be1ceb562c,2025-04-25T19:15:44.617000
|
||||
CVE-2022-26887,0,0,0967b2dfe00b7ba7df3d0d0b88f8fa0cbcb1b85f68390b84e34ee3dcd9c2c687,2024-11-21T06:54:44.297000
|
||||
CVE-2022-26888,0,0,493a5a47276e4f0757d077f58ccc73cdc24c1c9666cb727d3706b76505317466,2024-11-21T06:54:44.417000
|
||||
CVE-2022-26889,0,0,e267d8527774af6646ab18983354e40dc640444da589da4f7441f50f97a57c57,2024-11-21T06:54:44.530000
|
||||
@ -196343,7 +196343,7 @@ CVE-2022-27206,0,0,26b51d2d775b6160d8a333449e002b289e2846777159e5c3ffa1a3260d602
|
||||
CVE-2022-27207,0,0,42002e52081d00c1d86b204fc579088b0f9aec89151f014338d018da550d8b09,2024-11-21T06:55:24.667000
|
||||
CVE-2022-27208,0,0,5346874958188a1bab87779453661a3fa7c1636930b4e237bb1310c66bec7046,2024-11-21T06:55:24.777000
|
||||
CVE-2022-27209,0,0,ddb4e93365dc78b6d3220014350f0a35f76bc7ad387381e2434c530ca74c5ba9,2024-11-21T06:55:24.893000
|
||||
CVE-2022-2721,0,0,e57dfe88108b0db59e872f5e917c286cc91ab885b80dcc5b6045feb0465ab983,2024-11-21T07:01:34.917000
|
||||
CVE-2022-2721,0,1,6bc44e96ca921bdb976c54df211d5c8f9c62d73a26311f251c5aa237927b1594,2025-04-25T18:15:23.510000
|
||||
CVE-2022-27210,0,0,4f1a562f0b8366e0199c6eb21623e688315f1e2a8dee944d925e7126208fc012,2024-11-21T06:55:25.010000
|
||||
CVE-2022-27211,0,0,318141ecd667e9513db477e5931dbe0f11ec378285167b1f3b1d143c3f7ff99a,2024-11-21T06:55:25.127000
|
||||
CVE-2022-27212,0,0,c8710bd3427e6feff68edb3c0775de93abdcc54182bd0fe866069b9ff75772b4,2024-11-21T06:55:25.247000
|
||||
@ -198463,7 +198463,7 @@ CVE-2022-29826,0,0,f57f75466afcc69fabec1f46925c78acb84712401570d6f3c0048e5017922
|
||||
CVE-2022-29827,0,0,e55e4324e886d7d8bb76cf692d1576571cd9341c10d40ce3dda64c05e9bda00e,2024-11-21T06:59:45.917000
|
||||
CVE-2022-29828,0,0,eba63d23910f720d1fd387ccd1794772e51a93e003a4754dc55a1436683b45b1,2024-11-21T06:59:46.053000
|
||||
CVE-2022-29829,0,0,3318252a9a444dc44a17fb7f3cc994365673cfdcccd8f39ca5a4aadaa05240be,2024-11-21T06:59:46.187000
|
||||
CVE-2022-2983,0,1,cbd0e62d3098a26abce4f0d82de8134870fd99fb38dcd09c21ab2de4167a8999,2025-04-25T16:15:22.467000
|
||||
CVE-2022-2983,0,0,cbd0e62d3098a26abce4f0d82de8134870fd99fb38dcd09c21ab2de4167a8999,2025-04-25T16:15:22.467000
|
||||
CVE-2022-29830,0,0,4ba08aa70c90c8ac19f4179a47cdbfce01de5f5b6d8c0c859cf069a65202b83b,2024-11-21T06:59:46.313000
|
||||
CVE-2022-29831,0,0,10b449602a388a7bafde8664facce46f86055c5c39af55cf4875b24ffb14c4c3,2024-11-21T06:59:46.443000
|
||||
CVE-2022-29832,0,0,29f3389bc7e19f5cd428bbc1f81aae8ff6ab63eeb9cf45d281c7d3487ff38393,2024-11-21T06:59:46.563000
|
||||
@ -202555,7 +202555,7 @@ CVE-2022-34892,0,0,310d0e76967fe05ff5d408dd7f5ef5d6120320fc5ec3ad9316ebebad414c2
|
||||
CVE-2022-34893,0,0,b7d42d3c369fc6bdcdf69885e726d4d71b9f420251931f47c9029a134bdd0227,2024-11-21T07:10:23.500000
|
||||
CVE-2022-34894,0,0,3e6e61cc7a8f21d141d146ed9f75446b1f5628d5ba72ef39d599f8d4e2958769,2024-11-21T07:10:23.627000
|
||||
CVE-2022-34899,0,0,7fb4067693fb745066483d6bd1cde3377cbc4efdf9523fa73dd2a3c3f4b768c9,2024-11-21T07:10:23.750000
|
||||
CVE-2022-3490,0,1,a696c765a24e92f526594123ac42ed947eaec0b49a8f9645eac55682aba6cc21,2025-04-25T16:15:22.763000
|
||||
CVE-2022-3490,0,0,a696c765a24e92f526594123ac42ed947eaec0b49a8f9645eac55682aba6cc21,2025-04-25T16:15:22.763000
|
||||
CVE-2022-34900,0,0,c661d4b58882934350d2bd92a18fae931dc6128c5c82d4c450c63864ae8dcce0,2024-11-21T07:10:23.883000
|
||||
CVE-2022-34901,0,0,1cb199ed83dcc632c123582b9ad0aed3f88cec8fa13405e3d1f14fe82a763bd8,2024-11-21T07:10:24
|
||||
CVE-2022-34902,0,0,3bca642036a7f5fbef7abb4384927b60af66690baf9b9711fd545cc79d136bab,2024-11-21T07:10:24.113000
|
||||
@ -203602,7 +203602,7 @@ CVE-2022-36096,0,0,95aacd9b5413290f04f9e1a3ae976cacb7e35bb82c1f464ac5478ed901b59
|
||||
CVE-2022-36097,0,0,f6f4899d81536cbd410f55021708ea4e583c8db8d60a907a143d0a9bd90780b9,2024-11-21T07:12:22.857000
|
||||
CVE-2022-36098,0,0,d3d450cdd5095aa13b4b48be5e7d618eb003d98615f7c89ef2f510998e41e8bf,2024-11-21T07:12:23
|
||||
CVE-2022-36099,0,0,1195fc445efe0eee5e0eef97f5d83769ca665c61c84e5c5472f25aa60377e15f,2024-11-21T07:12:23.143000
|
||||
CVE-2022-3610,0,1,2ffcc224b2ef64eba6771f0002b7a4e487895756fa65423b8942281052d07f48,2025-04-25T16:15:23.050000
|
||||
CVE-2022-3610,0,0,2ffcc224b2ef64eba6771f0002b7a4e487895756fa65423b8942281052d07f48,2025-04-25T16:15:23.050000
|
||||
CVE-2022-36100,0,0,10a171af1fcfd07fcbdffe554049d97ff588cf75e077046c70b02c59fa397cd3,2024-11-21T07:12:23.300000
|
||||
CVE-2022-36101,0,0,511439abe5040fef699a32431c6013cf7860164c8e19cca31aa44f23defc0dbd,2024-11-21T07:12:23.440000
|
||||
CVE-2022-36102,0,0,a92ea1323a8dfa90a072a1453db57f496f95297d707e88d18498d3e1b9558e06,2024-11-21T07:12:23.590000
|
||||
@ -203636,7 +203636,7 @@ CVE-2022-36129,0,0,646c01cd1216604cb685ab0bff87fb4f808d312ac35261cabf5ff5e4da679
|
||||
CVE-2022-3613,0,0,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019fc7,2025-04-08T16:15:23.557000
|
||||
CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000
|
||||
CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000
|
||||
CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000
|
||||
CVE-2022-36133,0,1,196d345ed0a9342cb046a741b4a83792753549b6036023aa57b6ffa6e574c67b,2025-04-25T18:15:23.683000
|
||||
CVE-2022-36136,0,0,f2da00eeb95619dc82935888d31d7dc5e37800676e71e79bf569e55982f884b8,2025-04-25T15:15:30.587000
|
||||
CVE-2022-36137,0,0,3e19c276bc61d87eb33c9bac15601459f55477ff8a0f6ead4ac974fe498a88e6,2025-04-25T15:15:30.760000
|
||||
CVE-2022-36139,0,0,22bdb15852dd30b8f2f5ab5bf1ec8c83d48d99445394ee7e973fc0c1815e8ebe,2024-11-21T07:12:28.437000
|
||||
@ -204774,7 +204774,7 @@ CVE-2022-37660,0,0,58491ea394aa7c735141b394ba0276aa3a15bbc95058da85744c30737dcef
|
||||
CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000
|
||||
CVE-2022-3767,0,0,ed3cd922c5ded514b552cac9f45e3c1a4d69fd46472e97df4ac10ba5025d6152,2025-02-28T18:15:25.663000
|
||||
CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000
|
||||
CVE-2022-3768,0,1,24cd26ed61869dc6373c041aa7b59e4cbcdbd159f6545c6cfbe207f1194ca616,2025-04-25T16:15:23.427000
|
||||
CVE-2022-3768,0,0,24cd26ed61869dc6373c041aa7b59e4cbcdbd159f6545c6cfbe207f1194ca616,2025-04-25T16:15:23.427000
|
||||
CVE-2022-37680,0,0,0f45f78801f17e1f85d2fa1a73ca26a0150735d21b0b3cb11777a8712f135f61,2024-11-21T07:15:04.530000
|
||||
CVE-2022-37681,0,0,2f948e8907ff83dd1c5c3e251826bb44fd66955ca1bfca3c33a0e188cac5cc5b,2024-11-21T07:15:04.670000
|
||||
CVE-2022-3769,0,0,9c39e37e60db84f67819b6edf308680304c897cf262f2b53a87c71447f65e161,2025-04-25T15:15:31.620000
|
||||
@ -204791,8 +204791,8 @@ CVE-2022-37710,0,0,e7c5bc091bed0f04c4377767ee5d0c82fdd0d61b69286d35bcef549b290c0
|
||||
CVE-2022-37718,0,0,901406119284ea9888c973181e26da5fc6031fd13eca0f4d285c808bfa726670,2025-04-02T16:15:20.690000
|
||||
CVE-2022-37719,0,0,7bf781095843edb3ab9da6c72e80b9229fbcd2c39c8b1333e12f31038c3e9d8b,2025-04-02T16:15:20.977000
|
||||
CVE-2022-3772,0,0,8b2f10e963a59a7eca6bc8df1291451d7e86833c3314ed2279f08750053537d2,2023-11-07T03:51:47.197000
|
||||
CVE-2022-37720,0,0,a973eb370fac42f324b708832597fa3b8b443c427e84a2fb751d98e3a607a400,2024-11-21T07:15:06.330000
|
||||
CVE-2022-37721,0,0,690a67d77f28bcc9d76308798ba2e41e2dda15a809cbb6686ab100d869c39d4f,2024-11-21T07:15:06.487000
|
||||
CVE-2022-37720,0,1,a7a1c6e026c94aab25af3b68e5588849b61e3cbf76d7ab9ae9c947d750fe62f9,2025-04-25T18:15:23.883000
|
||||
CVE-2022-37721,0,1,e5d8e480017dc910e2386dab2e7871513e4affb30494997137ccde1f16a48def,2025-04-25T18:15:24.077000
|
||||
CVE-2022-37724,0,0,6c281a778789cd5efb9bf133e6719747a8903090baa1394d02829590fb5546f3,2024-11-21T07:15:06.627000
|
||||
CVE-2022-3773,0,0,8398ad226f80e82735baf89f730c80c7d729330e9eec6e7bbbb55ab8befa8759,2023-11-07T03:51:47.233000
|
||||
CVE-2022-37730,0,0,3df066d3fcf27e2b045e666ec86575bfc900597e1c650648a54ce9182b4d890d,2024-11-21T07:15:06.777000
|
||||
@ -205217,7 +205217,7 @@ CVE-2022-38210,0,0,1cd6fd5d14a434b5a5f51968f5168a8e3876226be6e67f883f97c4975699c
|
||||
CVE-2022-38211,0,0,237622d0f4ee7ddb35c7c50d1e0096a89ec5db961f7c0b21739aa201d5d9682a,2024-11-21T07:16:04.307000
|
||||
CVE-2022-38212,0,0,0b210e11cb58e0f62b93fad799c1a993a9ca8e136ada36ccbfefad89a6045f44,2024-11-21T07:16:04.450000
|
||||
CVE-2022-38216,0,0,53ad6a4bf21439d81742880b4310bac9b826a4caa93c0c8d77ff8af531f7fdde,2024-11-21T07:16:04.593000
|
||||
CVE-2022-3822,0,0,ee98c78e919c24d4096ef955318057a448b7c47c9c5cdc193f37e851fe6f8af0,2024-11-21T07:20:18.383000
|
||||
CVE-2022-3822,0,1,a2ff56b4561eb46dea138c81299680631bbffde0bcf5f5cbc1652e9b869cc3e4,2025-04-25T18:15:24.263000
|
||||
CVE-2022-38220,0,0,b317a9a4caef6fc9a703980616929643665fb6471f99fbfead5837cecbcb48df,2025-03-18T15:15:41.067000
|
||||
CVE-2022-38221,0,0,fd78da8ad76fed3c951126436d0f81c2e548cc1f96c247fde12e3249209b83cd,2024-11-21T07:16:04.900000
|
||||
CVE-2022-38222,0,0,7c7a2a13a7bb100acf8a26bdbfd02a83105b3b46dbc4a6c8e6cc767f8cce66a3,2024-11-21T07:16:05.063000
|
||||
@ -205261,7 +205261,7 @@ CVE-2022-38276,0,0,0c7f6e2597c00ad61f883cf34af42566fc8ed6a3d08c8d5f3c8fa6dd43f80
|
||||
CVE-2022-38277,0,0,ebe70d5587ac97bdee5692d4e554bcb4a9a6b5f4f4a171afcd76b4712350af1f,2024-11-21T07:16:10.117000
|
||||
CVE-2022-38278,0,0,cb9325ef011e42422c434578688d68934e81f9c77b3b2a4eddaf1be1fb2e7a6e,2024-11-21T07:16:10.260000
|
||||
CVE-2022-38279,0,0,1d0e542b45ba4e985b1fc393b18d27a586684a4031ba7d3a22fee89f1169d862,2024-11-21T07:16:10.413000
|
||||
CVE-2022-3828,0,1,9ba8f899c0ce4aba1c96fd0bf765e4199dfc9677655cf40c4586ef5fb593c1ef,2025-04-25T16:15:23.630000
|
||||
CVE-2022-3828,0,0,9ba8f899c0ce4aba1c96fd0bf765e4199dfc9677655cf40c4586ef5fb593c1ef,2025-04-25T16:15:23.630000
|
||||
CVE-2022-38280,0,0,2b9f38e0babdde39ff517db2111da443737beb0a2040ceff81c106b8508f0ab6,2024-11-21T07:16:10.577000
|
||||
CVE-2022-38281,0,0,0e4a383888f3dfd54d4bee5c25dbdef854ed6b0c0661df37597b780ebf7474cc,2024-11-21T07:16:10.720000
|
||||
CVE-2022-38282,0,0,715738be9ad2e222d344bb8ab1ae417e60b182e3ce7b26bb2cc0bafbab1ddba9,2024-11-21T07:16:10.863000
|
||||
@ -205301,7 +205301,7 @@ CVE-2022-38323,0,0,a59aa796c66304243a913448227bd84dfae16a322d88dfa5c15f131a7b9c6
|
||||
CVE-2022-38325,0,0,f05814fdb2faeaa1a16993e9c3e4d8b593360da26da02c45383df8aed9d115bf,2024-11-21T07:16:16.047000
|
||||
CVE-2022-38326,0,0,ddd7a593ab446359e0263613bd7bd24a513ca227d55a19a786e72d6d4ab9aeb2,2024-11-21T07:16:16.237000
|
||||
CVE-2022-38329,0,0,7491b23f4dbb0183807cd13c54f1a1794cfea6daa2f509e1c06ab6ca6a57c788,2025-03-28T15:15:42.063000
|
||||
CVE-2022-3833,0,0,974c54d94de219b584179b8997883fe36eb0c7a696a69be9c7f81e0683694a52,2024-11-21T07:20:19.763000
|
||||
CVE-2022-3833,0,1,87704f32fa72b98c1ce75d804ab58293995acd79e11f28523b93d6324cb0d485,2025-04-25T18:15:24.417000
|
||||
CVE-2022-38333,0,0,56d7bfd5982c43db05a55606c661f8e0c65aff61b2fbcf70156d5f71c00f433c,2024-11-21T07:16:16.637000
|
||||
CVE-2022-38334,0,0,860dd9433bcbaf1585f6c36716391fc7a1ca2a042ef681020b899ecb163d199d,2024-11-21T07:16:16.843000
|
||||
CVE-2022-38335,0,0,d08b6845818eafc543c4273cf30fe8e86802268f690ea2f3c4cb8ff57a721fd0,2024-11-21T07:16:17.470000
|
||||
@ -205441,7 +205441,7 @@ CVE-2022-38475,0,0,c72cdd91c218dc3032ac3c90b114a76a3f057ba2b80717b324d0260e01fe9
|
||||
CVE-2022-38476,0,0,bcdcb3343af9fd73a81fd992682154326060082bc32b25b97eb6d9319161043e,2025-04-15T18:15:43.750000
|
||||
CVE-2022-38477,0,0,e02fe71d5abd679a3dc416f62508e20ba3201d6b09f6b74ceee437eeef496785,2025-04-15T18:15:43.907000
|
||||
CVE-2022-38478,0,0,eb03c97b6896f851462ad3367333599cbfb99fc16aae3b9a6b2e2fc24fbc9108,2025-04-15T18:15:44.067000
|
||||
CVE-2022-3848,0,0,de383ae1a53e3d0aa561d19764791c6db0f7588ffac9421e8a76d994471ae2fb,2024-11-21T07:20:21.693000
|
||||
CVE-2022-3848,0,1,530ff8cbaeb3dd0739c8cca282ccc1109dd129dc26db67e95dc5a29f9b80872d,2025-04-25T18:15:24.573000
|
||||
CVE-2022-38481,0,0,5db63a047b363568cb90bf596fe4d291b3daee17e3f40efb2b89befed15067d3,2025-04-09T16:15:19.517000
|
||||
CVE-2022-38482,0,0,35b995182a57df288dcce9e70c14a84d2fd48c55a6fa17c202b06b8cd7500e7a,2025-04-09T16:15:19.720000
|
||||
CVE-2022-38484,0,0,dd824d004dab43b6dfa95f4a00d862f4467925c0598986767f7f0ce98bcf06cd,2024-11-21T07:16:34.293000
|
||||
@ -205641,7 +205641,7 @@ CVE-2022-3876,0,0,13061e34f6ddb61ab2a968144dca196c58935c948b59056ba2d08edef7c4d2
|
||||
CVE-2022-38764,0,0,5eb67ba932346432d1df6479f3990a9ed95081d782776faacc776c31f6a73499,2024-11-21T07:17:02.427000
|
||||
CVE-2022-38765,0,0,ad7b163eade447f031fa31c15942da6773cbac7dca06a7ea8025b5e06bcdeda0,2025-04-23T16:15:21.857000
|
||||
CVE-2022-38766,0,0,6660a67bf0040958cdd6bba214e5f8e187c2d32b8710088adde0982c4b26eb22,2025-04-10T16:15:21.550000
|
||||
CVE-2022-38767,0,0,ad3e243a9cb347dfda1aba6c18f4368d0e12dabfb8ed3f82ffb2829c85a13272,2024-11-21T07:17:02.893000
|
||||
CVE-2022-38767,0,1,835805970146fc2a8e811fe4e9e93ea55dbc42986cfbebd2c95f4c1e80dbc4d4,2025-04-25T19:15:45.180000
|
||||
CVE-2022-38768,0,0,d15b5785b307827d74469c62d6948754f46b525ec95d10d011f67bfdeadb0ae0,2024-11-21T07:17:03.057000
|
||||
CVE-2022-38769,0,0,38cc034b7b56162294d45e7946b2c6cff9f219d3a1f6627d24d9a1232f9523b0,2024-11-21T07:17:03.227000
|
||||
CVE-2022-3877,0,0,5638077fca32468383135e1711626384fee7c0067b756d1a5c6911aa25672d9f,2024-11-21T07:20:25.177000
|
||||
@ -205675,7 +205675,7 @@ CVE-2022-38803,0,0,5e1874fdb75829bd7bc4ccac2cc55b4768c980efe4525cea5dccaa450fcfc
|
||||
CVE-2022-38808,0,0,c3b715196991d7192d1efd2a16e15d00eeef051af1ec23511269fde9b0c7248a,2024-11-21T07:17:07.180000
|
||||
CVE-2022-3881,0,0,032bfd5117dc4e2144d8132cfc87af06fada0cb2080c28d32c9a6fdfd511147e,2025-04-22T20:15:23.790000
|
||||
CVE-2022-38812,0,0,eb08289c82cbe02ae53bb556d02873e859f2281d87355f90e5a02b376429623a,2024-11-21T07:17:07.347000
|
||||
CVE-2022-38813,0,0,afe72e99d1b47e1f0c5121eb70aa4c66e249dc23d157362979c3c041c3561fb3,2024-11-21T07:17:07.510000
|
||||
CVE-2022-38813,0,1,d5830ac7f7f24cfa86be0447499795bfe367ceea895bb9a51b55cb5b6659d7e4,2025-04-25T19:15:45.707000
|
||||
CVE-2022-38814,0,0,fb00e959ad9c11938df30cd18798372a97b425ab2dfa7a7195183f6b28ba9f8f,2024-11-21T07:17:07.670000
|
||||
CVE-2022-38817,0,0,b30220971de4b939384d08972186eb2f25c01907f70c5c31bbc224e50f363a83,2024-11-21T07:17:07.823000
|
||||
CVE-2022-3882,0,0,c2fe8004fb7bf51c6657d4eb701982a7014068c75f7ca8db24e284642b394f68,2025-04-22T16:15:34.993000
|
||||
@ -207735,7 +207735,7 @@ CVE-2022-41564,0,0,5a03d12592507c05fd8a379ae72b4ef90507684e54eaf4cb8e891d2cfbbb4
|
||||
CVE-2022-41565,0,0,b3abcc44ad7b332db1f3478087f6a4ed73103b5a588111c0a5d5a845b9401e09,2024-11-21T07:23:24.400000
|
||||
CVE-2022-41566,0,0,e743b6a2fcceac38e32dba1597ee02bc72b3a6e4b00e9af8eac96a1b4f269d95,2024-11-21T07:23:24.527000
|
||||
CVE-2022-41567,0,0,0693ed36abf1923a09db8b8d1587a8490a2c66b5bcda9e3644d2cea274ac5455,2024-11-21T07:23:24.640000
|
||||
CVE-2022-41568,0,0,6205fdde5e39bc36de73db4dcd6211c4ac286d5b081b138486c1c05c18b4e846,2024-11-21T07:23:24.753000
|
||||
CVE-2022-41568,0,1,fe6de37da0cc7e35a34e070cf787e31c960cfc085a8e6f85999e37f415176343,2025-04-25T18:15:24.833000
|
||||
CVE-2022-4157,0,0,d662f859f279f16c8788b2c5f2b8f383e9b2c0033612c5b4767e87c54df200ef,2025-04-12T00:15:17.427000
|
||||
CVE-2022-41570,0,0,68d8e3713c67a900ebaccd270512214f137c6b2444cfced04a663beebd955153,2024-11-21T07:23:24.863000
|
||||
CVE-2022-41571,0,0,d21192f5b84bd2e0d8b3b7685c8fa13d81d53fbe0d3de64478a1014c88f8f353,2024-11-21T07:23:25
|
||||
@ -208213,10 +208213,10 @@ CVE-2022-42095,0,0,b129db200e4ea897945e52f557d2ac4e72ff2d92b24d16f31f36ed08bbdcc
|
||||
CVE-2022-42096,0,0,8db413a7852ef657cded8b82a7da095df454a0aba9e60129336b09079ebd8e3d,2024-11-21T07:24:21.657000
|
||||
CVE-2022-42097,0,0,9ef66d066c85c030bfcc87a0625d7e4a2178854d20ad82e0743c1e05a5b4d611,2024-11-21T07:24:21.803000
|
||||
CVE-2022-42098,0,0,3a272ac5c2fba93d24b52d762dcec34f391f35783032cb79df191383c137d440,2024-11-21T07:24:21.950000
|
||||
CVE-2022-42099,0,0,6bf07a13bd7ae64a7bcbf8827ee36e0c945fd215357bdc78800456ecf421b0f4,2024-11-21T07:24:22.093000
|
||||
CVE-2022-42099,0,1,ac0fae522d40075f7ac142ad44c748ea6cee0cc60b372e3bf3e51a433980d1d3,2025-04-25T18:15:25
|
||||
CVE-2022-4210,0,0,f58f977b3dc4b94f4b429be8c6b138c2c4b70afe385584220bde9413e960ecb3,2024-11-21T07:34:47.807000
|
||||
CVE-2022-42100,0,1,cb85ecdf69a59124fff498b60d054545e9a4e619333aa0119509023ecbb1cc3c,2025-04-25T17:15:16.203000
|
||||
CVE-2022-42109,0,1,c73d67e5b1833592bcba4ec78c91a5da141163f924f6699178d5ebaa9728fa39,2025-04-25T17:15:17.570000
|
||||
CVE-2022-42100,0,0,cb85ecdf69a59124fff498b60d054545e9a4e619333aa0119509023ecbb1cc3c,2025-04-25T17:15:16.203000
|
||||
CVE-2022-42109,0,0,c73d67e5b1833592bcba4ec78c91a5da141163f924f6699178d5ebaa9728fa39,2025-04-25T17:15:17.570000
|
||||
CVE-2022-4211,0,0,b7146fa0dd0b2c7673b496b31dff23941d40de31a5ba9dd8ca05445d813e46ac,2024-11-21T07:34:47.920000
|
||||
CVE-2022-42110,0,0,90a644bab320f1236e30f3af3fb2f521ab53438724c9f82ba0286b9c9bf75540,2024-11-21T07:24:22.523000
|
||||
CVE-2022-42111,0,0,af3b081ad79fa680393021281278919264c62cecffccade6a76fa3c0982098ac,2024-11-21T07:24:22.677000
|
||||
@ -209109,7 +209109,7 @@ CVE-2022-43320,0,0,582ef5bacbbea1faa44ff74f5f6b2e1d0f5bbbca98e7e4adf16fba69b931e
|
||||
CVE-2022-43321,0,0,36984219d0abaf209b6280011a33081c1ec321069251dcc702cd9fdbfe241832,2024-11-21T07:26:16.720000
|
||||
CVE-2022-43323,0,0,32a1fe5e599fc6a63dd699911826a6632a4d310412e8e81ee3ed3d8e0abbb125,2024-11-21T07:26:16.877000
|
||||
CVE-2022-43325,0,0,c48e98148a8d146d63c6cd299dd9a7306ae4482bcf8d159939db4d99334efc7d,2025-04-24T20:15:25.330000
|
||||
CVE-2022-43326,0,1,9752c6480b4b20fa496baa91d832c265e4fadfdcdec51966c541bb74e0aaa939,2025-04-25T17:15:17.780000
|
||||
CVE-2022-43326,0,0,9752c6480b4b20fa496baa91d832c265e4fadfdcdec51966c541bb74e0aaa939,2025-04-25T17:15:17.780000
|
||||
CVE-2022-43328,0,0,0d846d6771d3e2d29be70b8f96a660480ffb8b6718949ff62b9d2606c40e13d9,2024-11-21T07:26:17.360000
|
||||
CVE-2022-43329,0,0,c91b51bbb0f7b127943a243feb380aad210451cf0df48ec9c238a8d360adc0e7,2024-11-21T07:26:17.527000
|
||||
CVE-2022-4333,0,0,8737cbb8755750973d92107f4b54f069ec08a4942c4dc4c77861346693de5076,2024-11-21T07:35:04.503000
|
||||
@ -209743,8 +209743,8 @@ CVE-2022-44032,0,0,67a4707c3189e9dbc6ecad623f592aedd751302dc5c0f602c5a8e668c92c8
|
||||
CVE-2022-44033,0,0,8bb570327f0eeef60e2ca10da50437c061fce3a3452b20ef166c4d546706cc46,2024-11-21T07:27:34.690000
|
||||
CVE-2022-44034,0,0,25d60ecd3c8156e5f829ae989bed5ee1dd527fa47058ef06ab1c7270a99aeb14,2024-11-21T07:27:34.847000
|
||||
CVE-2022-44036,0,0,eaf49935e81ffe720dc261cdc0d76efeaa4a075cada49c7209158fcb0522c73e,2024-11-21T07:27:34.987000
|
||||
CVE-2022-44037,0,1,d2d8cc48fe43ac3fb7f464c308d1af6fb7ed211d48b0bd56a0d39833aa825684,2025-04-25T16:15:23.793000
|
||||
CVE-2022-44038,0,1,9569adf717bba31d206c17608bb0841dca9709faf0d8393428c9b2e3acf585b9,2025-04-25T16:15:23.983000
|
||||
CVE-2022-44037,0,0,d2d8cc48fe43ac3fb7f464c308d1af6fb7ed211d48b0bd56a0d39833aa825684,2025-04-25T16:15:23.793000
|
||||
CVE-2022-44038,0,0,9569adf717bba31d206c17608bb0841dca9709faf0d8393428c9b2e3acf585b9,2025-04-25T16:15:23.983000
|
||||
CVE-2022-44039,0,0,51a6b3d4c7818653ae48fda3a8e1d3a67385418d7db95bbc4b08ea94ec695b04,2025-04-24T14:15:39.200000
|
||||
CVE-2022-4404,0,0,ba625c43db2864d65a0ff31257f21f8f69354cda3fd5674e2dec0e49c55a9cee,2024-08-19T16:15:06.710000
|
||||
CVE-2022-44048,0,0,e19e637bb828ad07a324301e4d30cbf1e81df840130bfea2cbc7cd9a74bf9001,2024-11-21T07:27:35.667000
|
||||
@ -209858,7 +209858,7 @@ CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f
|
||||
CVE-2022-44276,0,0,9873716515ec4fa50e073fda987b7d10a38ef2998e1c36de7d4ade38c66f0b44,2024-11-21T07:27:49.347000
|
||||
CVE-2022-44277,0,0,6e1daac4bfba364cb91588d0c39292ffc6a771c04cbb491302f9a959e6ec44d2,2025-04-24T21:15:20.040000
|
||||
CVE-2022-44278,0,0,94a282b9a6005d4d3c571b1453a8290cf012ad0aee9c10410ddd49bfc0b053cd,2024-11-21T07:27:49.677000
|
||||
CVE-2022-44279,0,1,c92acd3fb086eb57ba52e9527ed1014af01d6b777169cb1484023b7c44f32146,2025-04-25T16:15:24.167000
|
||||
CVE-2022-44279,0,0,c92acd3fb086eb57ba52e9527ed1014af01d6b777169cb1484023b7c44f32146,2025-04-25T16:15:24.167000
|
||||
CVE-2022-4428,0,0,d0d4f42df09be7ec1a860c66d491e78aff6ed76491f826686c2bfb6c87dafce6,2024-11-21T07:35:14.653000
|
||||
CVE-2022-44280,0,0,b4f59441e265e12c7599064feb9b89af1efc849a36a8e0e67f276521fc9f2d42,2024-11-21T07:27:50.003000
|
||||
CVE-2022-44283,0,0,98258eaeb12584330004f74255c0ca63c75edfc925c970635149340ca91f788c,2024-11-21T07:27:50.147000
|
||||
@ -209897,7 +209897,7 @@ CVE-2022-44348,0,0,44ccfac69868e2afc8e368855808900913083d7e481c753d4b83a6aa95205
|
||||
CVE-2022-44349,0,0,77e0ac1ea0d2dc430605d8413f12a35713a9f95944443f1b60acb50d80e1aafc,2024-11-21T07:27:54.303000
|
||||
CVE-2022-4435,0,0,09fcbc545d95dda0e23a80b812d81848513369bf47210635c1dfeb4dfb7f0751,2024-11-21T07:35:15.420000
|
||||
CVE-2022-44351,0,0,c10897244d37a1ea917124caf93e5b932f852accad76e4264bb7d568b60b590d,2025-04-23T16:15:26.583000
|
||||
CVE-2022-44354,0,1,50c4be009cc2f33e0107d58bdfabc2bf1e20cf13afd17197b33ea462573a0e1a,2025-04-25T16:15:24.373000
|
||||
CVE-2022-44354,0,0,50c4be009cc2f33e0107d58bdfabc2bf1e20cf13afd17197b33ea462573a0e1a,2025-04-25T16:15:24.373000
|
||||
CVE-2022-44355,0,0,46f52b6e90b4ac9041764e7a3e48635cd10698155a1fe005a7d739567fc5f74e,2025-04-25T15:15:32.987000
|
||||
CVE-2022-44356,0,0,7678667c0a4b5e6b43389a64f9a9efa65bbdfbd023ebb596082024943d137780,2025-04-25T15:15:33.157000
|
||||
CVE-2022-4436,0,0,054096d3f3721387e7dc56a27e838b284f4344ca986c9ea87b6f33dddc4e2e72,2024-11-21T07:35:15.543000
|
||||
@ -210265,7 +210265,7 @@ CVE-2022-4493,0,0,a6c305836afe47825221a3141e35893b683513a62cdcf4e1724cc11324fe15
|
||||
CVE-2022-44930,0,0,2ea729e0c6c25dbaf92535cd557c9488380254d081c1ae7ffedc5810dcbcc306,2025-04-24T15:15:53.283000
|
||||
CVE-2022-44931,0,0,979188b006e83e359a41fef9ba5209110763cc94f574c089dd1c31de8146f09d,2025-04-23T16:15:26.960000
|
||||
CVE-2022-44932,0,0,eafa84d584c7af58f0e79f9ea669cc3f5e1334a7382fae41d06172e24273789b,2025-04-23T16:15:27.143000
|
||||
CVE-2022-44937,0,1,12782eebbf35917c7b719fb4ad27f5f5204bc528d24ab95b63e82fb6ff51015f,2025-04-25T16:15:24.570000
|
||||
CVE-2022-44937,0,0,12782eebbf35917c7b719fb4ad27f5f5204bc528d24ab95b63e82fb6ff51015f,2025-04-25T16:15:24.570000
|
||||
CVE-2022-44938,0,0,bcff830624776ab4e0cd58d6356270fa4fe98429116cd1c67ceabee055cee4d5,2025-04-23T16:15:27.323000
|
||||
CVE-2022-44939,0,0,c3bdadbca4375b62cd46bb34499c0a496ecdd72902f6042a06d7f62a44b59dd0,2025-04-09T21:15:42.533000
|
||||
CVE-2022-4494,0,0,5ca116f3cf04e044bfbf882eab45e20f83382b01002983385e6a10d6f685e2c7,2024-11-21T07:35:22.483000
|
||||
@ -210317,12 +210317,12 @@ CVE-2022-45028,0,0,d814072f6c33d8be67405a81b4e24ef66053fbd190c9a8f9271040d00a698
|
||||
CVE-2022-4503,0,0,a1d4f0b44c03b0f88ef9ef27b9999b83018fd405199eb7f07b094fc94c2e266b,2024-11-21T07:35:23.577000
|
||||
CVE-2022-45030,0,0,3ced0aca532ea345080d9de2a404334c178b6c669d4225d75b21820be03fea6a,2025-02-06T16:15:30.977000
|
||||
CVE-2022-45033,0,0,8100f1fcbc9b050372d8631b5de95b6938ba1bebe276e28eb50403b48954bc77,2025-04-21T15:15:54.913000
|
||||
CVE-2022-45036,0,0,d24f0f27531cae0d2da3d7f80ce20f3e16974338fb22786849098e122b098be0,2024-11-21T07:28:38.987000
|
||||
CVE-2022-45037,0,0,5477fde00c0a51cc40ae20986209734a288b4573cbd8383ee814f026de3c724e,2024-11-21T07:28:39.130000
|
||||
CVE-2022-45038,0,0,8082acb7b14695d94a89af443661cec3f9c5be6e50a62b38d0d1ed92560d9c27,2024-11-21T07:28:39.263000
|
||||
CVE-2022-45039,0,0,8d247e2dbe5a174bf700c14e14bd0ac17a8055c933299de463994d0cfae98371,2024-11-21T07:28:39.400000
|
||||
CVE-2022-45036,0,1,b2f70db74049a1a7c01d51f54322e941dd19081123a58c64f503057b85cd8341,2025-04-25T19:15:46.337000
|
||||
CVE-2022-45037,0,1,a5b9e5ba9d801f432f5674680e7b3da1680c78993bbf89b367a42fa9bba20031,2025-04-25T19:15:46.637000
|
||||
CVE-2022-45038,0,1,5880f93583d67ceff7a676369500fe196d67168ed4cc914b2f5290a9be915fbd,2025-04-25T19:15:46.800000
|
||||
CVE-2022-45039,0,1,23e8f0ed92e285f9029e531efea23f60474a25e7ef7ed448318bf85eae0f16a2,2025-04-25T19:15:46.950000
|
||||
CVE-2022-4504,0,0,b27eff37d4e7abb720eed93fbe05e69d563cdca4548519b6b195855e489cbdf5,2024-11-21T07:35:23.717000
|
||||
CVE-2022-45040,0,0,7f873037a4786798898c146da01c230a02bee3ed298acbb4a79b18a72b6c5e6a,2024-11-21T07:28:39.550000
|
||||
CVE-2022-45040,0,1,43b381da8c0159c4ed49134288e182104625ec0fc589ff47c43bdb5eb6132393,2025-04-25T19:15:47.103000
|
||||
CVE-2022-45041,0,0,ef1949d1460233572fdfb2716287baf4a2f8389968f29ef424eb0bc8fc8e4d4c,2025-04-17T15:15:50.250000
|
||||
CVE-2022-45043,0,0,ac882d269905f73b62bf35a98382b22838daf661f0a5193bea18c8462ca7fa6e,2025-04-22T20:15:25.490000
|
||||
CVE-2022-45044,0,0,d8f9472e9417b70caae34cc756800e14625bdcd45f0866e663decb76d4c1825a,2024-11-21T07:28:39.987000
|
||||
@ -210516,7 +210516,7 @@ CVE-2022-4532,0,0,51cbf5a1e6ae006dcc5d3711843ce95455a4843a125d988c30c12abe1a1341
|
||||
CVE-2022-45320,0,0,41feb2eb65ecbe15fe302ae29b4aa27b54ade6f2bfc269e3fd99635e760000df,2025-03-28T21:15:14.607000
|
||||
CVE-2022-45326,0,0,aea3b3a534ac813296fa52e014e255e0b6b5db4a3b0a74a0f977d041b710578c,2025-04-23T15:15:53.797000
|
||||
CVE-2022-45328,0,0,571dc7eaa216465f82833d12ff66b7ec8816ff40e88f9a99f1241c1af8c0bce4,2025-04-24T20:15:30.093000
|
||||
CVE-2022-45329,0,1,18a296911520f28c23b55b34853bd0fd3e89fd97014fef3bb6ffab836b27e636,2025-04-25T16:15:24.763000
|
||||
CVE-2022-45329,0,0,18a296911520f28c23b55b34853bd0fd3e89fd97014fef3bb6ffab836b27e636,2025-04-25T16:15:24.763000
|
||||
CVE-2022-4533,0,0,5028488aee4d8101796592539cd327f65fd97c2e41b17fb89ad2b7ffa206701f,2024-09-25T18:53:27.377000
|
||||
CVE-2022-45330,0,0,603318baeb48b7fa0ffe1ebb40ca73e6ab1da0353239d9aacc60b18489041819,2024-11-21T07:29:03.557000
|
||||
CVE-2022-45331,0,0,00ce193262c1a09fa839a54d72a75debb4ffdecc8dd95d08148bf256c1b7892e,2024-11-21T07:29:03.703000
|
||||
@ -210648,13 +210648,13 @@ CVE-2022-45459,0,0,52fc738fca054e1e59ef130c3e49535b50985eeb02090fd677cebf53dd0d4
|
||||
CVE-2022-4546,0,0,a275390a0c71d8857a324ba9fa466d0bba4cda733aa6c3f49e34e4a84a5abbba,2025-03-21T18:15:28.520000
|
||||
CVE-2022-45460,0,0,e1d7528242b52a378866f99edff6b522be6c02bbbd30737f66a2f14358a69c88,2025-02-19T20:15:33.057000
|
||||
CVE-2022-45461,0,0,56f2b787c69deca86bd3b5d6242a910782e4836cc155b584a001e8e770eb3c65,2024-11-21T07:29:17.963000
|
||||
CVE-2022-45462,0,0,32a35c19ff603662093585c37e6728cd478d853de03e2f1a86a26cb05e496a4b,2024-11-21T07:29:18.100000
|
||||
CVE-2022-45462,0,1,91be49fa47587bbaf88c6f3a7b458af1b7665780c1554f77a726de2dfaecdecc,2025-04-25T19:15:47.260000
|
||||
CVE-2022-45468,0,0,a712a69482b987f1fd3ae2b2fbc6f4961ecf8e05c39ea4dc0a2d3fcaed8af41a,2025-01-17T22:15:26.927000
|
||||
CVE-2022-45469,0,0,10bf55fb9ce7b61a18b792fad66711157265be7d37c9751a18b547b87ea10df4,2024-11-21T07:29:18.303000
|
||||
CVE-2022-4547,0,0,07613f52bc490b06815bd631c31a1325f69c8bbd4a4c6629d352538c8682ef73,2025-04-04T19:15:43.767000
|
||||
CVE-2022-45470,0,0,7a0272577430809ad451c7cc2786bf7c96e8f498b5c4453652c56de828914865,2024-11-21T07:29:18.417000
|
||||
CVE-2022-45471,0,0,559a6e87408c334e4456c48307db55502b98bc2d1450613e64712caf20994238,2024-11-21T07:29:18.520000
|
||||
CVE-2022-45472,0,0,6384a1ca4bf781a6f4d00fb1178d93ea3809b4609f24adaa3a30d222a0e51513,2024-11-21T07:29:18.640000
|
||||
CVE-2022-45472,0,1,21957b961a2b40f75b3b33b39845961d374085e4c6d52e2e3df939569be290a8,2025-04-25T19:15:47.447000
|
||||
CVE-2022-45473,0,0,950e04aa97a1f2a1b81a40a1e88bed2d0f055b87af1fec2d92866f355f6e6629,2024-11-21T07:29:18.763000
|
||||
CVE-2022-45474,0,0,8504c595d6ef5d44bb01da1f073b7e9e23dd9af444fd9da25e25dea9be6df555,2024-11-21T07:29:18.897000
|
||||
CVE-2022-45475,0,0,a72d10c000cc96ffc1b1356865ad176e7fac11ee53f429b491041335cdc882a8,2024-11-21T07:29:19.023000
|
||||
@ -210933,14 +210933,14 @@ CVE-2022-45862,0,0,c8e663a0a66569fd891720623e223ccd744369aeaaeaa4f6caa3c7ce9d103
|
||||
CVE-2022-45863,0,0,979d09a25ee237e5d7a7a9ba6666386ef79a4018645bafb656367d9c2b35cb90,2025-03-17T23:15:15.320000
|
||||
CVE-2022-45864,0,0,42b198898f6723f0161fa99c3eed77048c34a7de68883cd6b58f4014a1f57534,2025-03-17T23:15:15.380000
|
||||
CVE-2022-45865,0,0,99072a1864eaec436d549aa7ef13afd58be1b50531df051b45dd6ab0906f9b7c,2025-03-17T23:15:15.433000
|
||||
CVE-2022-45866,0,0,758a1dd850f661b712e8fdfd478312e4015dbcd14dcaeb788de101b605d2ab52,2024-11-21T07:29:51.723000
|
||||
CVE-2022-45866,0,1,2cfc9f591fe04a6aec1da66a0ea19b855bfaf12d141a94b04baa368509c233b8,2025-04-25T19:15:47.793000
|
||||
CVE-2022-45867,0,0,7d2e1133ec67de3abdc62203a810fe87e7475d37b16b9d2bae9586a274f78c1e,2025-04-10T16:15:26.493000
|
||||
CVE-2022-45868,0,0,80b9445c4364c8194c9e46b75b1b1f764c0aa073fe35122541db4dac46bae7c6,2024-11-21T07:29:52.050000
|
||||
CVE-2022-45869,0,0,e7236b90212aaef6fa4db5262994103b789ab7111802a975769083917ee3d463,2025-04-24T19:15:44.800000
|
||||
CVE-2022-4587,0,0,883ef7e3e0962999a7d6d8c14d8ecab8eeccd5fb2faf7db48642e497d80404be,2024-11-21T07:35:32.837000
|
||||
CVE-2022-45871,0,0,c27af02067ce41d5a47121feba27daf1574ce18c13314e3d5d85e910e44631a5,2025-04-22T15:16:05.497000
|
||||
CVE-2022-45872,0,0,a907443ce4f03e99a976737e2d47cb015ba05e3816eae1b1e624fcdd2161183d,2024-11-21T07:29:52.530000
|
||||
CVE-2022-45873,0,0,42c6c1129d53ef778f4baa826bc586cb39ac06b30554c1745f3ebd88089eac8c,2024-11-21T07:29:52.680000
|
||||
CVE-2022-45872,0,1,f2383a6f0bdef156e8d2a71ff3c6e5e2fe29ad563dcc848cbda2c74e8e9900de,2025-04-25T19:15:48.060000
|
||||
CVE-2022-45873,0,1,1f665266cbd29b71689882ceff339831dd641b155414ff8d54801878d326923b,2025-04-25T19:15:48.487000
|
||||
CVE-2022-45874,0,0,3198226534d2d5b8f6108cb213a5a0cb79874fbf2f09ef45ca0b9f2d612a2fbe,2025-04-11T16:15:17.270000
|
||||
CVE-2022-45875,0,0,d056f92603fcfdede95de6715dfd98048a9a2d25d390b906c4a4104c2a140b82,2025-04-03T16:15:28.510000
|
||||
CVE-2022-45876,0,0,d70a8354437a5d727daeeefbf8e766205015f588234179d2757a51060bbed30f,2025-01-17T18:15:18.117000
|
||||
@ -222317,14 +222317,14 @@ CVE-2023-27645,0,0,9bdea78facc44693f6b2cca82b4aa3b98c5dfee144609e318860bbba6069b
|
||||
CVE-2023-27647,0,0,c771f91be4cd8e94e2e1a9d71c8b79330c5408d70dfa4a94bd2a996d86997dd9,2025-02-10T16:15:34.873000
|
||||
CVE-2023-27648,0,0,a345bd7dd563b74af93887106ac2129082ff6540975981de71d7b876657aa2b8,2025-02-10T16:15:35.060000
|
||||
CVE-2023-27649,0,0,690c8e8861b6c3ccf1c2a9a32fe27efe1acc4c3a22e8da1559768390006d5db4,2025-02-10T16:15:35.240000
|
||||
CVE-2023-2765,0,1,85ba79e0908fe2bbb7e289023cb81d1d503e2f720c9bd3b667e73ac40df8cd28,2025-04-25T16:59:59.533000
|
||||
CVE-2023-2765,0,0,85ba79e0908fe2bbb7e289023cb81d1d503e2f720c9bd3b667e73ac40df8cd28,2025-04-25T16:59:59.533000
|
||||
CVE-2023-27650,0,0,57463d25ac9935fe8879d4874c614dad0677c88c572e415bee989ca5ecf7ee61,2025-02-11T16:15:37.753000
|
||||
CVE-2023-27651,0,0,f74913356a9565e7384b031d5e9b30a11813dd397e53651ce82276175e9931d4,2025-02-10T16:15:35.430000
|
||||
CVE-2023-27652,0,0,02fb7ad36fc56eaf01f117b66060eab0de43f07df05525a3493d076728923ddb,2025-02-05T21:15:20.250000
|
||||
CVE-2023-27653,0,0,3b9102e073ea87f8958f28e28d82c95ddd9a8c68947b76dae77bff98717f69a9,2025-02-10T16:15:35.610000
|
||||
CVE-2023-27654,0,0,015067eda73f559e0c0ef4fd89030e70ed80ba5c1ee8a190b382f6ad4b0c4b0c,2025-02-10T16:15:35.807000
|
||||
CVE-2023-27655,0,0,09067e72763ef1c1b0e1b8efb991a5d0625b9a3d4585b44cf46740884e06632d,2023-11-07T04:10:02.500000
|
||||
CVE-2023-2766,0,1,9252628da415302739061f199fad9c4fc15c64793a1e7f16034434140f4e1a66,2025-04-25T16:59:59.533000
|
||||
CVE-2023-2766,0,0,9252628da415302739061f199fad9c4fc15c64793a1e7f16034434140f4e1a66,2025-04-25T16:59:59.533000
|
||||
CVE-2023-27666,0,0,668a4b3b3db0035a242929c2195c35e05c4fc97c3f806c222e073e0c7b838e2b,2025-02-10T16:15:35.990000
|
||||
CVE-2023-27667,0,0,aa46e2e6056865c9dc3ed74ea562afbb7dd6c84eb370f60cf2dd8f6bd16c9f10,2025-02-07T17:15:25.543000
|
||||
CVE-2023-2767,0,0,52639779fc3bcf1bcaba564655b2b8e6f4d1cb9a6fb4a80d1aa8d0cf5d6950c8,2024-11-21T07:59:15.147000
|
||||
@ -226511,11 +226511,11 @@ CVE-2023-32828,0,0,7d28c8e21fccdbbf85447520b7e1574dcd7df594b434fc3872dc6609c5de2
|
||||
CVE-2023-32829,0,0,3b2994656f2f8a6a500ab70c945d2cf8853320ff2b87598bf5c796ac03e2fd8a,2024-11-21T08:04:07.997000
|
||||
CVE-2023-32830,0,0,365fbe893396a73c7fba47a1cd8706993f01880d7d51a1306fa0b9ad581725c7,2024-11-21T08:04:08.193000
|
||||
CVE-2023-32831,0,0,c6a60310ad90b9609a99ce1a1d8442829cfbe0fbc657b087a523ef266646e512,2024-11-21T08:04:08.440000
|
||||
CVE-2023-32832,0,1,17eca33855341d40195afa00f9015d685f61d16304f401df435f56ca758f9a53,2025-04-25T16:15:25.017000
|
||||
CVE-2023-32832,0,0,17eca33855341d40195afa00f9015d685f61d16304f401df435f56ca758f9a53,2025-04-25T16:15:25.017000
|
||||
CVE-2023-32834,0,0,4623de73bc8c1129aff0d6a1bedbfa0c5627757bd9f67d7cfbd1ccc03a1c70ad,2024-11-21T08:04:08.700000
|
||||
CVE-2023-32835,0,0,bfa8f054df4e95d31f6b3e3e130614fee02f4348aa51c41b4932cd4be94dc944,2025-04-24T16:15:24.900000
|
||||
CVE-2023-32836,0,1,674e39f3f2b83641426905bde36d8089efb8410ccdc28913cd0309d35b2e72b0,2025-04-25T16:15:25.250000
|
||||
CVE-2023-32837,0,1,61f37ce037362df1a005ee9d94d6d079ae9dc6a6ac0412eaf44b02e46698905a,2025-04-25T16:15:25.410000
|
||||
CVE-2023-32836,0,0,674e39f3f2b83641426905bde36d8089efb8410ccdc28913cd0309d35b2e72b0,2025-04-25T16:15:25.250000
|
||||
CVE-2023-32837,0,0,61f37ce037362df1a005ee9d94d6d079ae9dc6a6ac0412eaf44b02e46698905a,2025-04-25T16:15:25.410000
|
||||
CVE-2023-32838,0,0,ac4f798d8fb6ad7aca32e1cf9716c71ad083c3cf3f268abadf7fe0bf367b8194,2024-11-21T08:04:09.203000
|
||||
CVE-2023-32839,0,0,533fb6c0db267a842abda82ac358ddc9868fc0c842888c325297bd281bbfdcc1,2024-11-21T08:04:09.410000
|
||||
CVE-2023-32840,0,0,19ceaffb138ab584de3095443d0ca4e301aee2c217ce30b7cc74bd8fa2c383a7,2024-11-21T08:04:09.620000
|
||||
@ -229674,10 +229674,10 @@ CVE-2023-37173,0,0,9cafe10d0492932b72257ec79258893e242ff7e9752b39870c821cd0b7dea
|
||||
CVE-2023-37174,0,0,d27e22d218731a7b504953dc14807623afee400a33282814b31de239b006f5d0,2024-11-21T08:11:08.307000
|
||||
CVE-2023-37177,0,0,ce59270826cd5d0a74b2a4d7ba10c0931e773793ffcfde3b9d9b249cb8dc7293,2025-03-25T16:52:50.167000
|
||||
CVE-2023-3718,0,0,082109449f5dd4be4184616e480bf6c689fbc7a34bbdc0b22102ed7a869cd612,2024-11-21T08:17:54.727000
|
||||
CVE-2023-37185,0,1,23269f673a5466785a9b600d030f989d43a26d56b56b9c22b2a18219506fe864,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37186,0,1,e82d61e24e7219b1a8225d07bc766fbfb7a79bc69b3bea34e1f7e9d5d14826e0,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37187,0,1,4f2b1ad4b91b84f98791e48c95922df1abd140ae819ec1f9b0e4048b228d096d,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37188,0,1,f6fb929d1ec1c6bb6246c5f2a0dca9139707ccfed4319a5a5de902f97605b54b,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37185,0,0,23269f673a5466785a9b600d030f989d43a26d56b56b9c22b2a18219506fe864,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37186,0,0,e82d61e24e7219b1a8225d07bc766fbfb7a79bc69b3bea34e1f7e9d5d14826e0,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37187,0,0,4f2b1ad4b91b84f98791e48c95922df1abd140ae819ec1f9b0e4048b228d096d,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37188,0,0,f6fb929d1ec1c6bb6246c5f2a0dca9139707ccfed4319a5a5de902f97605b54b,2025-04-25T16:52:59.580000
|
||||
CVE-2023-37189,0,0,c18f35f98f81f274f20d9c58179323b9f2712f48f5775d8e12db84481995ea49,2024-11-21T08:11:09.400000
|
||||
CVE-2023-37190,0,0,fd47d9522e6519757535f058a2d6989f07c3c59a7834a7758f3db7074022737f,2024-11-21T08:11:09.557000
|
||||
CVE-2023-37191,0,0,e03189f1ae96d82488e032d48019c03b0fd0a7361b3e7ad10e1f612d44b512af,2024-11-21T08:11:09.713000
|
||||
@ -230978,7 +230978,7 @@ CVE-2023-3861,0,0,256bdf9cd413cbfa70ed4e6a0b9211792976947f22c0d0ba6729c1ba3a66e3
|
||||
CVE-2023-38610,0,0,5b1c562f1f49f921b46133fee8d471ee29cf078a6629ab5095e1922e4043b83d,2024-11-21T08:13:56.150000
|
||||
CVE-2023-38611,0,0,0c21e67a52c96f626024280838ea08bd20ff315d2265b8b2d16822974fdb8823,2024-11-21T08:13:56.267000
|
||||
CVE-2023-38612,0,0,48cd578239b90ed5f53555ebc56b60ba0fce0c95cc22952e8f469727beb8f38b,2024-11-21T08:13:56.393000
|
||||
CVE-2023-38614,0,1,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000
|
||||
CVE-2023-38614,0,0,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000
|
||||
CVE-2023-38615,0,0,28bd829212c2f8b51c8cf7299df44606c3187aa7dfa98e6e69703360924f1d09,2024-11-21T08:13:56.540000
|
||||
CVE-2023-38616,0,0,ea82608142832dcfd883bf3693a7c0861aa42b549f974e01baec1cf033c971f4,2024-11-21T08:13:56.663000
|
||||
CVE-2023-38617,0,0,d151c42ca3fd59e9ce2ca053dd91845e43669620a0219f2ba7e5f71d43ff4694,2024-11-21T08:13:56.790000
|
||||
@ -234336,7 +234336,7 @@ CVE-2023-42871,0,0,f13ae996b006635f073f8383fb0028141adede656e942393444895575f506
|
||||
CVE-2023-42872,0,0,f3648f3deeaad97df776a3d1c44a939ca77b2546d7b8c107ac43dbb6270e605d,2024-11-21T08:23:24.257000
|
||||
CVE-2023-42873,0,0,b3dfa63eb459c092ac2aa5aedcda220b27286ce47f315d5d35a9e624e19fb581,2025-03-26T21:15:19.500000
|
||||
CVE-2023-42874,0,0,8d97b98bb633cc5493c7ddadbc5a3fcb0aafa4a63566c7b95c55d43990d4043d,2024-11-21T08:23:24.537000
|
||||
CVE-2023-42875,0,1,27055301fd938208881d98240bb9101599be819875b923f96ac8491d73dcdb70,2025-04-25T16:56:23.237000
|
||||
CVE-2023-42875,0,0,27055301fd938208881d98240bb9101599be819875b923f96ac8491d73dcdb70,2025-04-25T16:56:23.237000
|
||||
CVE-2023-42876,0,0,37b25b9c642b4cac6eb6d94ea53d367b2768529c56bc4e8a14593b75edb0b4ab,2024-11-21T08:23:24.640000
|
||||
CVE-2023-42877,0,0,4dc75ad666df108b4705e6025618ee85d160e3119c62da22b0b7ef71ac91a0a2,2024-12-09T17:13:29.847000
|
||||
CVE-2023-42878,0,0,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000
|
||||
@ -238801,7 +238801,7 @@ CVE-2023-49110,0,0,a1bbb45f4a96757275295f97a0674fb7c93e72998d5eb9340d7f0c83127b7
|
||||
CVE-2023-49111,0,0,5d69d06a2c7e1a6f756073bf456e5d1dbac3d4b05a2908316cf5f6c8ca69aebb,2024-11-21T08:32:51.160000
|
||||
CVE-2023-49112,0,0,5b3cd8afd3302cc3c9d30e56b0e97435448a49fecf53f906a8f1c24822ed55b3,2024-11-21T08:32:51.343000
|
||||
CVE-2023-49113,0,0,a645edc2d059059a6cc440879e5396f12000f28b99d6cfaea32abf1a3c964003,2024-11-21T08:32:51.523000
|
||||
CVE-2023-49114,0,0,61e8e622cc34dfe6449f9cc7f55528241556adefe550ae97302498803748a601,2025-02-13T18:15:42.940000
|
||||
CVE-2023-49114,0,1,879878b4f8eaa197734336656ab7e1c168ddc6a059d592643a88a6f4bf410b86,2025-04-25T19:40:19.010000
|
||||
CVE-2023-49115,0,0,1f757a513db513b733ebda85df1c9db109f4027c15395f4b0a87843cbeb0399b,2024-11-21T08:32:51.937000
|
||||
CVE-2023-49117,0,0,9d333f843a6c0ae89d6d5258a4874a60d76cd2811cc5a490853711e00e52c11b,2024-11-21T08:32:52.093000
|
||||
CVE-2023-49118,0,0,db51841a47dda730656f7979239e7338150bfee1e310d0b6c850367249c33c17,2024-11-21T08:32:52.223000
|
||||
@ -239429,7 +239429,7 @@ CVE-2023-49957,0,0,40e0859d0022c68fb8fa3e1697efdbebae0273366219631a810efaf23e1fd
|
||||
CVE-2023-49958,0,0,a47816abf8c233bed9f507dcb6b4c0dbbf07edff7beb12284b1c81d5c0bf1b97,2024-11-21T08:34:05.007000
|
||||
CVE-2023-49959,0,0,0ca4d774731b65b33ea8bfb57c67f833699a8244929b280c93520d1027b20dd6,2024-11-21T08:34:05.233000
|
||||
CVE-2023-4996,0,0,15b342803c1f80acd3d2d39cee9fc3cf4cd0335f6d9d76ea3694b9fd4e617042,2024-11-21T08:36:25.640000
|
||||
CVE-2023-49960,0,0,986419f745137773e4cb2aa0bc3c5ea6029fc7bd434aaf17ad2cfc2417ea8ae9,2024-11-21T08:34:05.453000
|
||||
CVE-2023-49960,0,1,b32b1729b3193a2a7667d80db05e0111f9aa9f19c9c0da8b4f6644c05809a992,2025-04-25T18:09:33.990000
|
||||
CVE-2023-49961,0,0,e502960afd32284c1b3cbb230bd3ef288a991750ecf23595e60cdad2fd4fcc61,2024-11-21T08:34:05.660000
|
||||
CVE-2023-49963,0,0,716a28f46de42a2e56dd2dbb762be5dc774690d8da0a8361cd05a453c1e4581d,2024-11-21T08:34:05.803000
|
||||
CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06
|
||||
@ -239619,7 +239619,7 @@ CVE-2023-50241,0,0,a48890697caf8ba2cc2080f2f9fa7f6139fc26b7e7eb2257cc80eca327850
|
||||
CVE-2023-50243,0,0,8b35a626202df2531ed237de7dd8b4e2622c9bbf6a0070ff4d58d807fac0b8e8,2024-11-21T08:36:43.953000
|
||||
CVE-2023-50244,0,0,90a7ce321efc3c07725815a8dd4bcca9111c094ef65e3a5a7552bdbd2f86adb5,2024-11-21T08:36:44.110000
|
||||
CVE-2023-50245,0,0,3d9154bc7d832950f1b23fbfc0f914f089111c52aeb010213de182dd304b02ea,2024-11-21T08:36:44.243000
|
||||
CVE-2023-50246,0,0,65f5495b9fadebf34a4fba1832f7cc4b344057fc37ff56f4b82a512db63a02b5,2024-11-21T08:36:44.380000
|
||||
CVE-2023-50246,0,1,9550cfaf50b9b3792392efd2b51266ede77add5a84d3eac8a58781c89ce706ab,2025-04-25T18:54:24.277000
|
||||
CVE-2023-50247,0,0,601ac97060cb0114c709c2742626394f951f43bb0eefb0da580e8f3010adecf7,2024-11-21T08:36:44.530000
|
||||
CVE-2023-50248,0,0,01e3c4d1f4e5d4ccab8155589c068cc6d45a0e43106fa608edb81e1d689c3bcb,2024-11-21T08:36:44.680000
|
||||
CVE-2023-50249,0,0,d91f2dcf8c6d0fcd8f7b1adea160cb8aadbc48cd52ae3f2f90b89701d8a59587,2024-11-21T08:36:44.813000
|
||||
@ -248768,7 +248768,7 @@ CVE-2024-1731,0,0,1c4799278319f44bc1f2394dba9b8fa6d7033d0ca06d706b80a9fd86dcd9b6
|
||||
CVE-2024-1732,0,0,f0faf98c61d7814db4d39f791e5545925e8accb9aa6c5efc9a70509edc7894fc,2024-11-21T08:51:11.253000
|
||||
CVE-2024-1733,0,0,ef30bb620614cb26a911bc474924519472462f4526251f6318e1d5b8e7395f39,2025-04-18T15:32:56.347000
|
||||
CVE-2024-1734,0,0,06c929339991c714689394dcc4d43dc8b4df609fdf4f8ccb32bcae2e7b8b7169,2025-02-11T02:15:34.043000
|
||||
CVE-2024-1735,0,0,149ae731bb9590988b4834888789f09c86e1a0f6d47840c3cd77290a626576b9,2025-03-29T00:15:17.107000
|
||||
CVE-2024-1735,0,1,9b6239f058732cce9b71c1fe5a98c2c1cdad54afe7339597b838984264b69f4b,2025-04-25T18:13:45.867000
|
||||
CVE-2024-1736,0,0,8844706a3e68d2dcbf3764ca91f6b5acfccaa7343cfd31da9dab0ed1924920fe,2024-11-21T08:51:11.693000
|
||||
CVE-2024-1737,0,0,593418afa5de4602eb69dd941b0e02c901b4d4739e447e76ddfa6cfa85dbabe0,2024-11-21T08:51:11.837000
|
||||
CVE-2024-1738,0,0,b1050e00e6fdc7521086a8fbece787ee9563029ea11b8a0cff427d5db403186c,2025-01-10T14:35:21.370000
|
||||
@ -249089,17 +249089,17 @@ CVE-2024-20059,0,0,f43e5b062f45304be39bcb5dae92b6ee1c5b2ee5de21825d3ba6a3416a54b
|
||||
CVE-2024-2006,0,0,8edf579119d048fb0addb069e3e97e116defb6c81523e84fb8ce83f7cf4b6a4b,2025-03-13T00:55:44.487000
|
||||
CVE-2024-20060,0,0,7647c29d37e2e936c5550fb9ac99649ae94b81d388c24c005d6b4c728ebf524f,2025-03-20T21:15:19.853000
|
||||
CVE-2024-20064,0,0,6b398848a5ddf3ed5b8a4c98badc8135e23f45b3ddb362be7df0dea2ecb1bfc2,2025-03-29T00:15:17.283000
|
||||
CVE-2024-20065,0,0,bf074bad299ffa79a3be73371461cbe43be69d6ec7b9d447aba21b460c271103,2024-11-21T08:51:56.390000
|
||||
CVE-2024-20065,0,1,6b436cf5988b8b7f4dc3022ffa9899ffb0e7b9550ff4195eddceca832a4b1833,2025-04-25T18:39:04.767000
|
||||
CVE-2024-20066,0,0,0f85fe051819a9be24207b717ae67bb1aa3886173e6db86ab7492cdf7d870565,2025-03-27T16:15:21.380000
|
||||
CVE-2024-20067,0,0,901f3d8ffac01d227dbd399686ef68e66883e2ceabc7974cf4ebf3015fa2b2d3,2024-11-21T08:51:56.720000
|
||||
CVE-2024-20068,0,0,e8917e7224a78ea2b81bc102a0672a078fe9310aa9002d95585fcb4dcc2eb1c2,2024-11-21T15:15:26.107000
|
||||
CVE-2024-20069,0,0,cb8b51716d8af44a4da05fa5082284a53d777e13684248400691e0c288b02bcf,2024-11-21T08:51:57.060000
|
||||
CVE-2024-20067,0,1,7a6e29fdc4913ebd1f71afe7f54ea4f5078686bf3ce10dbc8b506302259e8ca9,2025-04-25T18:39:01.213000
|
||||
CVE-2024-20068,0,1,61ddc002af0d0ddf69dce5ade39f4653c4486d436f21efb15073fcdfc9c3810c,2025-04-25T18:38:30.833000
|
||||
CVE-2024-20069,0,1,875dfd0be69ca66a05acadc760869c21548a7bcc2801594cda005fcc8982c15f,2025-04-25T18:38:24.040000
|
||||
CVE-2024-2007,0,0,dd753ae907b6a2e5da0127b93337be4c5ee1ef196fd2da4ce8981d1860c7f5ac,2024-11-21T09:08:47.890000
|
||||
CVE-2024-20070,0,0,60fc67c95167d0b48912d8e2b09b48f14222b51099ba39195045d37c73cfd9ad,2024-11-21T08:51:57.257000
|
||||
CVE-2024-20071,0,0,7884ad25d18168b2699c9e4e19d117fad33de94b53f83ba46627c6cda4ba8727,2024-11-21T08:51:57.433000
|
||||
CVE-2024-20072,0,0,31c94c10eeffc138c15dbd92b4664230cac36e81728231bf7fe7256b1ef33559,2024-11-21T08:51:57.607000
|
||||
CVE-2024-20073,0,0,07f0822b3fd14de0e741854a96fccfd976ccf68d3355a88668c62f284d493e58,2024-11-21T08:51:57.800000
|
||||
CVE-2024-20074,0,0,7c362ac85e324e731d48cff7cbbbe716d2cf25b771ccc17560cd42052c42fe7f,2024-11-21T08:51:57.973000
|
||||
CVE-2024-20070,0,1,14dad7897ce30d439dfb9340d57ecf9ccd11d04d5ffd4c8fd35210d65693641e,2025-04-25T18:38:13.850000
|
||||
CVE-2024-20071,0,1,8a6cd3b4b278b838fba269bc146be756d54434f5dbe7841da000a2444e0ecdde,2025-04-25T18:38:10.847000
|
||||
CVE-2024-20072,0,1,37c50da273863006cc8a2780d84a42c015df4a5b3b6a0450d7001f326422aeb5,2025-04-25T18:38:06.520000
|
||||
CVE-2024-20073,0,1,12c38549900816e2de94dfa26851bf473a6ce4fc42fc648041b6689375223cf2,2025-04-25T18:38:02.823000
|
||||
CVE-2024-20074,0,1,29dac5fde0f0d9d71bc051a580dd5a246f8eed1b3e96df25608d252200fc5ed6,2025-04-25T18:37:43.243000
|
||||
CVE-2024-20075,0,0,d0c6aa860dfeccbd9dc45f37006b53da8ad961ce4ccfcedf20e069ef4cbd24e9,2025-03-13T17:15:26.080000
|
||||
CVE-2024-20076,0,0,fd5819e847bb53da5e6bcc13a92001213a63fd0e827570a579802534c6aa7f6b,2024-11-21T08:51:58.260000
|
||||
CVE-2024-20077,0,0,07f38d510770e06ff3155be7bc8ba8fbd7cb2bdb66f616fbfcdfe488be9b9594,2024-11-21T08:51:58.440000
|
||||
@ -249117,18 +249117,18 @@ CVE-2024-20087,0,0,127fda73dc634b061b298bf97ad3e36651c853da287dbf3edeee880a02dac
|
||||
CVE-2024-20088,0,0,809c53365556131dae63d6b9af44d217af16a14e2570dd7ca9f187b647f23510,2025-03-13T19:15:41.937000
|
||||
CVE-2024-20089,0,0,ab63f2683963fb30bca2be5c703bf1c80e2ef2082975e77e18edca5b61d8b301,2024-09-05T14:28:02.713000
|
||||
CVE-2024-2009,0,0,a95cc3276775bcc7dde00cf967dc1f96f66c0ed60235a9a297d4e12c0edb221e,2025-03-04T12:39:44.687000
|
||||
CVE-2024-20090,0,0,a65fed379c4dce4f0c9e874b96968f906ad2b824d77ffe473363a1c9911ded18,2024-10-07T19:36:41.627000
|
||||
CVE-2024-20090,0,1,0395c995df0308357329fd68af3046ab18703cbac3d7c107bbee83baece1dc5f,2025-04-25T18:37:39.607000
|
||||
CVE-2024-20091,0,0,52bbd4e5e4ea1b1110e5db08fb1eef905f8b4c771967a4a299c0ee13344532b6,2024-10-27T03:35:01.130000
|
||||
CVE-2024-20092,0,0,bccf2d6f90e4a3c613ce6cf5daf983cac4e07c4ee3a83bc53222394d67633936,2024-10-07T19:36:41.920000
|
||||
CVE-2024-20092,0,1,2ae017de0e9b27895fcaba3abf462c30d1fcffbd1dadb0460d63ab042edc44d0,2025-04-25T18:37:36.207000
|
||||
CVE-2024-20093,0,0,915f6f6e508a2ed83a03371050796324c669a27432f46ca2f4e258d470cf2dab,2024-10-27T03:35:01.380000
|
||||
CVE-2024-20094,0,0,4e48bdd280140d399a11bf253c3ff74eecc422d07cabb6600e8e6a4933a9e94a,2024-10-07T19:36:42.200000
|
||||
CVE-2024-20094,0,1,41a58587ecf83c3f0f0c24748cd8288314201129db1618ef771d6e2723394aa1,2025-04-25T18:37:32.080000
|
||||
CVE-2024-20095,0,0,ee7e9bfb03ea8ee02e3995aaed4a15c6f5c27d1436591d402666fa023da80c47,2024-10-27T03:35:01.623000
|
||||
CVE-2024-20096,0,0,3926058b6457768c9eebee9c76f414c5994e44e2d67378ce88636c61c9f55e86,2024-10-27T03:35:01.863000
|
||||
CVE-2024-20097,0,0,4e8b6d9c3a7ded8679b657d23db9e76fa4ae86a9ed7761309f3108f08806be61,2024-10-27T03:35:02.103000
|
||||
CVE-2024-20098,0,0,cba056b662ec0dfdd36805f9b202b4ad920ea711d6b2fb32751c2b85a01e6f23,2024-10-07T19:36:42.660000
|
||||
CVE-2024-20099,0,0,f8cbc0b643cecf55d25339668cd4adf6fb70d7cfbbcbdc341aef051f42a0d00b,2024-10-07T19:36:42.860000
|
||||
CVE-2024-20098,0,1,0ddae9a19f1a7653d92d5eceae4c9ee0eda527e28aaab19c9d1b51f07b594ce6,2025-04-25T18:37:17.913000
|
||||
CVE-2024-20099,0,1,b44edb128aed5e0463ef33e5a3e5932c1444325cbcf5db7e511bb42a285a48ab,2025-04-25T18:37:06.520000
|
||||
CVE-2024-2010,0,0,d6a5881f3001262023e1c9ddb899c14f0fedd0932d581d560dc006cc2c398530,2024-10-02T13:52:09.270000
|
||||
CVE-2024-20100,0,0,57a6aa54e72a40199130f7a31f0329aa7d05b6ec881df3a5b90d869e3a11e218,2024-10-07T19:36:43.050000
|
||||
CVE-2024-20100,0,1,17f1b87ffa45557231cf3971d560ad8c2607ac7afdffa37d00f5bc10fafa6683,2025-04-25T18:36:53.990000
|
||||
CVE-2024-20101,0,0,ae097b8905cf46faf0fc8168bdcd3cd573e9e1661f83b1729d79883aa4950af3,2025-04-24T15:06:54.753000
|
||||
CVE-2024-20102,0,0,213b2653005a8502face2976cb57da28ce2dc01d95d8ec089881065d74704696,2025-03-13T19:15:42.127000
|
||||
CVE-2024-20103,0,0,ef7dda1dc8fe5f29386d8335dd7736afa8cf1dd84b6f3eedbd2c04b36fd0cba8,2025-04-24T15:06:32.527000
|
||||
@ -250385,7 +250385,7 @@ CVE-2024-21498,0,0,2bf402b1559306f16ac8c8e66d84bb15b551ce6a438faa3500a7705f9ece2
|
||||
CVE-2024-21499,0,0,44205a76d76d27ac43ddd65fb9b5571ec5f3ca5f195196306071755bf720f01e,2025-02-26T21:42:58.847000
|
||||
CVE-2024-2150,0,0,11709d6f33f6feac5b4c76a551fdc402bc450d0a937559060df9be2ccc270565,2025-01-02T20:11:35.597000
|
||||
CVE-2024-21500,0,0,701beefedd86107168fe49c159a5f355a6b33ca03c5844fc0be8cbbb3cd9e8ef,2025-04-03T16:12:19.953000
|
||||
CVE-2024-21501,0,0,199ffb3aa23fde5d8d3391df678cad4c6e4de0c519c1101051786020f9390c39,2024-11-21T08:54:33.967000
|
||||
CVE-2024-21501,0,1,4948de47b7ceae2954e127d905e15dc5a8323ab5adb5cfa1a5f427332f5f02d1,2025-04-25T19:37:25.937000
|
||||
CVE-2024-21502,0,0,be52d9905683ab294ba785631c963d51dec48843f6b2534015a1e7a491f02394,2025-02-12T18:49:07.160000
|
||||
CVE-2024-21503,0,0,2d8b1531388019cc86e8879846b75d7a49f3eb88d43b5b3abceab313eaaaeadf,2024-11-21T08:54:34.260000
|
||||
CVE-2024-21504,0,0,8ddda1b2279e9e5fd25a9c426089896d67afe4eaf6b865945dfced29ba5d0db2,2024-11-21T08:54:34.390000
|
||||
@ -251168,7 +251168,7 @@ CVE-2024-22368,0,0,42f1e51c584ac67c724cd77ff67e48a5ec43d1dc3a71a029cf38e486d8136
|
||||
CVE-2024-22369,0,0,25a54f5eeb18cbdc2e924f131f0d3183c031ad520a18106efbe880eefbb69d70,2025-04-02T20:17:04.160000
|
||||
CVE-2024-2237,0,0,10342a3bcedc4ff39999af4eb389909f61f2ebcb0c10fb4672d2ed188d1b8434,2025-01-23T16:35:26.147000
|
||||
CVE-2024-22370,0,0,154c2c04f020f54de37bfc5e89569563afcd67d6a9da771051468d73c892d8f9,2024-11-21T08:56:08.407000
|
||||
CVE-2024-22371,0,0,d0e92b003134c0fed730aae003a7b80fa3bc3f32abee1c84a03ebdae53062d2f,2024-11-21T08:56:08.540000
|
||||
CVE-2024-22371,0,1,f463c3626f2289601375eda762d2749b4e86f3cbbf878584db4e5ebe6c51b5ce,2025-04-25T18:56:25.390000
|
||||
CVE-2024-22372,0,0,b551e264aeec89c61ff7f8afba5117db921544e7fbe334b539067eccc9f75085,2025-02-17T06:15:12.283000
|
||||
CVE-2024-22373,0,0,df42c24604a328ccd0420d248e34b3fdffc796f28184a2239f0afc6ac9ce15b5,2024-11-21T08:56:08.823000
|
||||
CVE-2024-22374,0,0,5c7e3927a1e30e4a1951b89d41d5acd0f03658ab52ecfb78b0e3348e51d5c55e,2024-08-14T17:49:14.177000
|
||||
@ -251426,7 +251426,7 @@ CVE-2024-22861,0,0,7383253856fe1904e459646987bfd0c0194f4519532cfe898c97a3d6d5f22
|
||||
CVE-2024-22862,0,0,2591cd8c2cdc2b45e89b0dfb9be9b8c6bd501c140a65a300a4787cbf21b1c17c,2024-11-21T08:56:43.717000
|
||||
CVE-2024-2287,0,0,6a39bd22bf778ab9ef88f37dcc3c969ac4abf6d6c0b210c60c8dae9cd488c871,2024-11-21T09:09:26.127000
|
||||
CVE-2024-22871,0,0,503caaa942c867528446287508fafee35776d5f0e040bbab31a84c8d2c0724c8,2024-11-21T08:56:43.880000
|
||||
CVE-2024-22873,0,0,78a7877b1a09ddd2537ed7cf255cc6a3a855d40547eb3276022d060327f8d0e3,2024-11-21T08:56:44.137000
|
||||
CVE-2024-22873,0,1,6165970db789c15d94a1c759e386900acfe17775ba21a6f751b4c2bc62bbc560,2025-04-25T19:03:39.103000
|
||||
CVE-2024-22876,0,0,7b64300d77b839c22e56dafc52a8b282c24d807d3e1138deb97774c53ad9e682,2024-11-21T08:56:44.390000
|
||||
CVE-2024-22877,0,0,869857cd8b9a44e1d528c28503ad46b7c531212f5054c9f21fd2618927c6b492,2024-11-21T08:56:44.530000
|
||||
CVE-2024-2288,0,0,f6ed54bcc2b3e715f6f7f1bc8122a65aceb675402a6406a77355fa6ec0523110,2024-11-21T09:09:26.250000
|
||||
@ -251476,7 +251476,7 @@ CVE-2024-2297,0,0,3a62bf9d33e04a2b2a4ead4d48354328d27d50a4ecda4746840937c137d18f
|
||||
CVE-2024-2298,0,0,a85fa7730d2df572068f0e46cf7b1543a1326e3663c97e6671307d8012f9d6f8,2025-01-15T17:47:00.477000
|
||||
CVE-2024-22983,0,0,1b90439e8700c2cb391c1d6ada3037539a1078d92c93c8cec7565e36e9b21aaa,2025-03-27T22:15:15.637000
|
||||
CVE-2024-22984,0,0,fc6f2532d62536f57f6959754844311196ea55b6a39fbf85c7d2f459ee5381d0,2024-02-07T20:15:49.320000
|
||||
CVE-2024-22988,0,0,794767bfe659079c8fad239879c26f911639a8938186caab10358dd1185783e5,2024-11-21T08:56:51.083000
|
||||
CVE-2024-22988,0,1,52babdbf9fe00c501de9469bd9133944e1cd5e9cafb87fbb31184da92f0b9330,2025-04-25T19:36:34.800000
|
||||
CVE-2024-2299,0,0,76e1268d9e586f7e108759dfb4a3b616648fa75f57f1f685f576ecccc85b8d02,2024-11-21T09:09:27.393000
|
||||
CVE-2024-2300,0,0,c92a8f4bde6838d4ec64cad2649eead9a06ac17086996316734c20573aeb6bdf,2024-11-21T09:09:27.507000
|
||||
CVE-2024-2301,0,0,64adce604b0bc27e42016cdb8242b23454751df3587b599cdf9bd5fd28acf7da,2025-03-14T01:15:38.990000
|
||||
@ -253235,7 +253235,7 @@ CVE-2024-2533,0,0,6ae2130a2853cfc35a0325db37738d70d71a25805f631d6422b528a071b1e7
|
||||
CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000
|
||||
CVE-2024-2534,0,0,f24633e3eff1520ce3c2eedeed339e97d80233d79efd834bb5b9d5ffd097cfc8,2025-03-03T16:45:52.740000
|
||||
CVE-2024-25343,0,0,e95b5c5e8048e4efd735c454ea3bfb2db00d33bbce0bc4a2a17d6a93c15ddff4,2024-11-21T09:00:39.283000
|
||||
CVE-2024-25344,0,0,08e491d8e8fc1521c6807369a2bd12624b63af05a206286efd1b0f19eb777609,2024-11-21T09:00:39.500000
|
||||
CVE-2024-25344,0,1,1d37f417b2857c3f92d549197061b03ca0a3c30434d1771e1f176d151c26b4a1,2025-04-25T19:04:02.670000
|
||||
CVE-2024-2535,0,0,0bf848903fc38663f407d2d981ac3254e4cae4551d368c29ada205f88200bdc8,2025-03-03T17:08:17.677000
|
||||
CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ace07,2025-03-27T15:09:10.017000
|
||||
CVE-2024-25351,0,0,7dd6fa3c0615d36dfbffb6fcdb5c9b681d789f881b9a847118c7e4975d141eaf,2025-03-27T15:09:22.307000
|
||||
@ -253266,7 +253266,7 @@ CVE-2024-25395,0,0,0c910e4e908b84543fb9378900cdc50df6c7890c4b17618a09a14c28ded0c
|
||||
CVE-2024-25398,0,0,f919c2593c4ed3584d6838cd87f2bdee41966c5d10decafa94aa0009b9f153f2,2024-11-21T09:00:44.480000
|
||||
CVE-2024-25399,0,0,9aac39c97375ca767b7b4f1c2b93743ade9f809aa68e40b452b919f9a396e1bb,2025-03-27T14:55:13.720000
|
||||
CVE-2024-25400,0,0,b8395d2e0e2441d89e46af5e06e62a588ad3ddd0715330b6c3bf06010e7fcfd1,2024-11-21T09:00:44.967000
|
||||
CVE-2024-25407,0,1,4c1e42840cde0b439967358bd9fc3655db9fe8f21bea9690c359c2b4728d7a6b,2025-04-25T16:29:29.440000
|
||||
CVE-2024-25407,0,0,4c1e42840cde0b439967358bd9fc3655db9fe8f21bea9690c359c2b4728d7a6b,2025-04-25T16:29:29.440000
|
||||
CVE-2024-2541,0,0,5e4a53f51ba8752f74c9f57c8894c57856dd31a2758293bd1ba5d82829a52e5f,2024-09-09T18:40:23.437000
|
||||
CVE-2024-25410,0,0,34aa3a5dfa0b461c1402bfc8d040049deed5d9d55f98cca2b67ff82eb7e83a3f,2025-03-25T16:59:21.083000
|
||||
CVE-2024-25411,0,0,139eeef6edada50361deb7799ace9009bc429357d81e031e0f6ba067fd7f71f4,2024-09-30T12:45:57.823000
|
||||
@ -253307,7 +253307,7 @@ CVE-2024-2546,0,0,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c
|
||||
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
|
||||
CVE-2024-25466,0,0,a244fe8d49a36527a1f5c75b9c9426e9a28195f9625a9b3e3e209390a6e509b4,2025-03-27T14:12:47.357000
|
||||
CVE-2024-25468,0,0,0a984f0077461946bbe3786d60e02b37226ef00ceeac0bf4423d2505f7336155,2025-03-28T21:15:15.940000
|
||||
CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000
|
||||
CVE-2024-25469,0,1,772ba370c4cc6b04083ba7c7b053f0a1071af1c536ff93588a9869b32ff3b37e,2025-04-25T19:37:07.450000
|
||||
CVE-2024-2547,0,0,0fbdba73bc7be8457d09d4345e26314e53b3ed78656f404771387e6b5b6a4bd6,2025-01-27T17:03:24.857000
|
||||
CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000
|
||||
CVE-2024-2550,0,0,86cdddeb45053971f7f1105a7c754a32e98d0e52f3686f8072e5f3b184f89ddd,2025-01-24T16:02:49.703000
|
||||
@ -256935,6 +256935,7 @@ CVE-2024-30148,0,0,84668e8d7533f924329b8c5b385e0283a3ce09f5d2b14feac5d00bde98496
|
||||
CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d679,2024-11-01T12:57:03.417000
|
||||
CVE-2024-3015,0,0,4dfa2543ab30c11de477468d8bfbd168b7abfd5d1d708e2d95a366186fbaa151,2025-03-05T18:36:56.977000
|
||||
CVE-2024-30150,0,0,4fa60d6dd4f0daeaee31653e34cf1f5215c4dba48f3d62569322a4d06540dc29,2025-02-25T23:15:10.753000
|
||||
CVE-2024-30152,1,1,64e0619e8da673d41fb5060f741bdf54425a351c9ff53076276d3dd1594cee10,2025-04-25T18:15:25.247000
|
||||
CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959affc,2025-03-04T17:15:12.010000
|
||||
CVE-2024-30155,0,0,1df92efba90a634db6d5e4b1e722ee6fefdf4510d2e810b3b6cff4b522f32450,2025-03-27T16:45:46.410000
|
||||
CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000
|
||||
@ -259664,7 +259665,7 @@ CVE-2024-33686,0,0,3afcd6cea304556460a374d9713cea2e14cef1e01eefca9f1328446ed4166
|
||||
CVE-2024-33687,0,0,8fae2af58d4ab6629ad1653780d6550d0f5b066a5f0b1226cded1d4e00058e89,2025-03-13T15:15:43.910000
|
||||
CVE-2024-33688,0,0,457aa3c6a8bf471d023c378e0adcb6907f2b6ce5990a04eef4fa7a062571ec27,2024-11-21T09:17:24.550000
|
||||
CVE-2024-33689,0,0,0bc0392661c86cc6937d68a94c0d3c236dc897f938e4765a8cd55f48ae118ddd,2024-11-21T09:17:24.680000
|
||||
CVE-2024-3369,0,1,c1f1e10b4fde67f14e1f66411d827e0c39263fdca524bd764bc6a12ee53a3cdb,2025-04-25T16:43:34.787000
|
||||
CVE-2024-3369,0,0,c1f1e10b4fde67f14e1f66411d827e0c39263fdca524bd764bc6a12ee53a3cdb,2025-04-25T16:43:34.787000
|
||||
CVE-2024-33690,0,0,008c538ee3e33963786d09aabc2681e74651f5e2046951ce2958567ff70041c3,2024-11-21T09:17:24.803000
|
||||
CVE-2024-33691,0,0,b96b56c17cb3964557c2b2e5b79d38d0f28edf82927cf0798e5af6c9cc9b4b4d,2024-11-21T09:17:24.923000
|
||||
CVE-2024-33692,0,0,15f945927b827862bc222b3b20b31185c330bb09e0997f4d27e79be4818771a2,2024-11-21T09:17:25.040000
|
||||
@ -268285,7 +268286,7 @@ CVE-2024-44837,0,0,d99be13bd28102fab04d2436e2423a9abe7e5510be44a84cf457d3b46476b
|
||||
CVE-2024-44838,0,0,9093e17cf998d701a84ce478930b56745dc53c30e5c24288b738f85259303dbe,2025-04-22T14:04:24.433000
|
||||
CVE-2024-44839,0,0,33d150fc27b9ef149e93cbc27429d77af0da7d079044cf380a62d22825038bbf,2025-04-22T14:03:59.667000
|
||||
CVE-2024-4484,0,0,e9d9ab7a181084a2609fc26ec989da9dcf4a22d48b5c7405b3d8209db6a264e7,2025-01-29T18:26:19.747000
|
||||
CVE-2024-44843,0,1,b60c32ca3be3ee1a6ff346a6f3b563f901b6eba8b70b927008364c1c40c6ea4f,2025-04-25T16:48:36.610000
|
||||
CVE-2024-44843,0,0,b60c32ca3be3ee1a6ff346a6f3b563f901b6eba8b70b927008364c1c40c6ea4f,2025-04-25T16:48:36.610000
|
||||
CVE-2024-44844,0,0,543b67798b80c9f433394b5371f67242f69c06e81a35f5031e65aa2bc37f2c80,2024-09-11T16:24:51.660000
|
||||
CVE-2024-44845,0,0,be723405d776fcd23ce5801cd5dc6a06dd41574f2f123999283d6be69263ae54,2024-09-11T16:24:23.970000
|
||||
CVE-2024-44849,0,0,556a0bd4002e0d7931d67df8540866973c154d8cb1d32b49d0c67e3b0c20db93,2024-09-09T20:35:18.097000
|
||||
@ -272863,7 +272864,7 @@ CVE-2024-50954,0,0,02068458dd8d6a2ffb99f46bf4d0a02d5a8b6d37dbba06978db764a483c08
|
||||
CVE-2024-50955,0,0,d286c5359e65ec4107e3297ae49fde58b3efeb0287b5581ad11b8684b68fae9a,2025-03-13T19:15:48.793000
|
||||
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
|
||||
CVE-2024-5096,0,0,158df124ac63cd0f2f1e57be7cd9d0373dc2a0ceea7bd2bb10f556aa3af44df8,2024-11-21T09:46:57.483000
|
||||
CVE-2024-50960,0,0,3588629b8935c5ac93d1a88fd59b84635f01bfa1bb459f918da74e06f0fef2ad,2025-04-22T18:00:52.937000
|
||||
CVE-2024-50960,0,1,cf8ad1cf36f3e03d797ca98dfcbbc766551f5433fc3a257ad81baad4ade3984b,2025-04-25T18:35:24.457000
|
||||
CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000
|
||||
CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50967,0,0,a510a0bc53da9b8204db12045069c14674f172a420837c75cd83c80e3a09cc7a,2025-02-04T16:15:37.863000
|
||||
@ -275756,7 +275757,7 @@ CVE-2024-55199,0,0,9dbaedf3926a39070909e5e303310645f833671fab2b674351cde48dbd521
|
||||
CVE-2024-5520,0,0,01efd331d154fb9586681073be2279b521156350c5be40c4a9f1de66fcab99a0,2025-04-23T19:47:13.970000
|
||||
CVE-2024-5521,0,0,65eac7a22071804fff3e5df58d27b016cf36e8f2d5f96f7b3f239d0f0e1781c6,2025-04-10T19:17:25.220000
|
||||
CVE-2024-55210,0,0,a71a62a662512d2d0838f7c48ccfe2c44cec8f766bd5c8b170221a7ee4300a61,2025-04-11T15:40:10.277000
|
||||
CVE-2024-55211,0,1,2a7561b7d30ea5451e381cd3b9cb9293c8fc41c8c2b959e2abbf5e9e460c8de2,2025-04-25T16:31:55.183000
|
||||
CVE-2024-55211,0,0,2a7561b7d30ea5451e381cd3b9cb9293c8fc41c8c2b959e2abbf5e9e460c8de2,2025-04-25T16:31:55.183000
|
||||
CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000
|
||||
CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000
|
||||
CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000
|
||||
@ -276164,7 +276165,7 @@ CVE-2024-56142,0,0,d0863d2f76899d0c75d2dc51b8dc37ad0a79fde1963b9a5230e4e213f062d
|
||||
CVE-2024-56144,0,0,841b97f9dd621b3a904707e190c030b6c378f0f01017b04615b98da4da201d0b,2025-01-16T23:15:07.830000
|
||||
CVE-2024-56145,0,0,1bf04321f372be6a391b26e37787c9310c18edadc786028f82c542bd3efa0f5b,2024-12-19T21:15:08.383000
|
||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||
CVE-2024-56156,1,1,1fcbb1f9b53613e827e8623c0fe2a4958382c85978e469be946fb7fe1f2af9cf,2025-04-25T16:15:25.597000
|
||||
CVE-2024-56156,0,0,1fcbb1f9b53613e827e8623c0fe2a4958382c85978e469be946fb7fe1f2af9cf,2025-04-25T16:15:25.597000
|
||||
CVE-2024-56159,0,0,d6437f8167288212b0feaa31ad952f4a47211de648a6e462a65c30d1453de687,2024-12-20T21:15:09.940000
|
||||
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
||||
CVE-2024-56161,0,0,0d178b949303de8c713ee1a20dc301b7fd5ce9c07af4747a5e53f97976af5874,2025-04-02T22:15:17.963000
|
||||
@ -276383,8 +276384,8 @@ CVE-2024-56412,0,0,9de65a8965a720aee61d5a73e14bdf5e61cc3466412a93eb6a99af9f75093
|
||||
CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009015,2025-01-02T16:15:08.570000
|
||||
CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000
|
||||
CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000
|
||||
CVE-2024-56430,0,0,0262ea105dbec15a8d2974aa338fd319cfb88d949549b9f7b495f5427178dfce,2024-12-26T20:15:23.447000
|
||||
CVE-2024-56431,0,0,d86626c9b8d8fef008e7a4c5675ea03019c9bf5693f6e523bcbe518eebd8b433,2025-04-21T16:53:13.917000
|
||||
CVE-2024-56430,0,1,793ad769696f8d73a9cfb81a81145a30fc7cb2a21b49fe3a2fbeec2e889fc965,2025-04-25T18:15:25.390000
|
||||
CVE-2024-56431,0,1,f555a7a35c74920f1a85f63803491328469afd8f8f76cab9a23b9cb8dc9dce8a,2025-04-25T19:15:48.813000
|
||||
CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed51f,2024-12-26T09:15:07.267000
|
||||
CVE-2024-56434,0,0,77666c843737cc5a12cb8a3f8ccfddbad46fbc8e173c92ce2eda6e7d103804e3,2025-01-13T21:27:24.040000
|
||||
CVE-2024-56435,0,0,f9607cd64d453a5b32a52a5f464a83b8791cc483defad6f82c176abb69cec61b,2025-01-13T21:27:37.100000
|
||||
@ -282980,9 +282981,9 @@ CVE-2025-20662,0,0,12aa5c5a0a2a4254a5cd5d0284932b03688b985d4a6e164fb473eeea68ae8
|
||||
CVE-2025-20663,0,0,596335f6a6120390f38a326693e2ad25807954564d3cf32daf45c2adaccfa901,2025-04-11T15:57:27.597000
|
||||
CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3577,2025-04-11T15:52:40.517000
|
||||
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
||||
CVE-2025-2068,1,1,b9ebe0371f279f409260c701a98794e1b68f687f46aae4768d175f0210cb2431,2025-04-25T16:15:25.857000
|
||||
CVE-2025-2069,1,1,5b587b38044bac534832f4b88b466ac580b6527bd26a6a46ba8b3f1dd66f4d59,2025-04-25T16:15:26.020000
|
||||
CVE-2025-2070,1,1,f2c3ef0c12cf8bad7511ced9e652ac8fe8db3f96601dda6236ff48501b9e9e80,2025-04-25T16:15:26.180000
|
||||
CVE-2025-2068,0,0,b9ebe0371f279f409260c701a98794e1b68f687f46aae4768d175f0210cb2431,2025-04-25T16:15:25.857000
|
||||
CVE-2025-2069,0,0,5b587b38044bac534832f4b88b466ac580b6527bd26a6a46ba8b3f1dd66f4d59,2025-04-25T16:15:26.020000
|
||||
CVE-2025-2070,0,0,f2c3ef0c12cf8bad7511ced9e652ac8fe8db3f96601dda6236ff48501b9e9e80,2025-04-25T16:15:26.180000
|
||||
CVE-2025-2071,0,0,f72741a6a8cd10ef9b626183eff7ab8b6e66837ba6759a6a57e284a984d113e1,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2072,0,0,8e644488e83c18f58cc5036e9fa9ebc749bbf6017963c3bc2cbe7baae1385ee2,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2073,0,0,33cc05c2bf8bea135a9269a0269abfc52f9830a581f768811aa50383f9c97d77,2025-04-17T20:21:48.243000
|
||||
@ -284001,13 +284002,13 @@ CVE-2025-22031,0,0,849fde881fd29023fa69ecbb3f0292ef2c909b93259987e79e8b77179fa04
|
||||
CVE-2025-22032,0,0,d8d46ed0ab7ad4e4a209e27540af090df65243d3ec0b7cf912d27e016956e819,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22033,0,0,5d687c6cdb245cab0ab2fccdc38938212362007da0b1f0c09f4a656d0dfade1d,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22034,0,0,335f06c05d59207ddcab31c2c706fe92af2f8066994dc6b755b48d7e1e97bee8,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22035,0,0,4a2dcfba0cd6bfaa897929e21ef629e42891cce6c9cbfc5b64d0efbb2fe03120,2025-04-21T15:15:58.903000
|
||||
CVE-2025-22035,0,1,8d863c07a8fe035c1c87b49562306a59654bd499e6022f52b48f2bc9577f741e,2025-04-25T18:43:50.147000
|
||||
CVE-2025-22036,0,0,05980d710f09eb1112ca863d8b29a98316ec7a2c3e49ff67ff04d1c4f55d48fb,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22037,0,0,9f6a14d24a556411d352d8da558e241b24d4877d6712cc178c64fa3a95eecabd,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22038,0,0,7c04dabccd2aedca2760979f4c3566d24c7d0f452760e19fde34faf197c6b8d4,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22039,0,0,d6eecb826c470d1c829bb472517035dab25551be0ff321b5b5d2e1d24fcaaa9b,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22040,0,0,79bb4655c03fc2077c89c3efdad2b5dbf4331ef18e19796ef876c2277ee787d0,2025-04-21T15:15:59.080000
|
||||
CVE-2025-22041,0,0,f4e7ce0c379105fded17645b8428e8762295289b398e66c369dbe515f1b022ef,2025-04-21T15:15:59.233000
|
||||
CVE-2025-22040,0,1,facb6428bab7ff0adc4403e4fdb73ca357b926f3da19061d48bc7f547885fe40,2025-04-25T18:42:54.833000
|
||||
CVE-2025-22041,0,1,f465946e1f8b020b18dae60195dc1a1341623f37f026561071d6857b92726733,2025-04-25T18:42:20.980000
|
||||
CVE-2025-22042,0,0,37b5ad7d87ff60e9eb371b7c5914eba8c38794e9b4b821181001c73a8452975c,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22043,0,0,59598fbfa5a3fbbff3a4b7e4df9127c1fcc37b4554026c72750f4f4392599777,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22044,0,0,02f1b82fab5642f487212bae20873bae26f75acac38412894b3037ebd8d41731,2025-04-17T20:22:16.240000
|
||||
@ -284055,10 +284056,10 @@ CVE-2025-22081,0,0,ea788b6a3d709f00aa6084bef59b6502512f240fbc76f18c7f527cfea83d4
|
||||
CVE-2025-22082,0,0,a36dbc7923bc05d507b05e72d494080e8826fe6e3b8781be1e0fb8a7c09dcb15,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22083,0,0,77bad77a1060e46a6397dcd7997b03186bff448f22a2f92a4576e0be6e2ad121,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22084,0,0,1c4013c553842d6bd619e1f828aa513d2b72c2725631ea6eb2cd88688af143f6,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22085,0,0,c0bf445eb79c974996e4a373f4dbc0519e031112d79f60cb2d7c21548d483faf,2025-04-21T15:15:59.380000
|
||||
CVE-2025-22085,0,1,3b47edfbb6862e8364907e1fe441b976192fdfcdd3483d9e8dc716877b73ab51,2025-04-25T18:41:52.250000
|
||||
CVE-2025-22086,0,0,f33dd187faf596f27ace74fd75a693ec9056d799565032126edf3f13c763a712,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22087,0,0,9168e2780ae9c70b0ce3e8df49b7019244c58b10758f6acd4703edceab75245c,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22088,0,0,5d614764d873603ba4724faa763716f5197a6bccbe169e9d81698ff74285975f,2025-04-21T15:15:59.540000
|
||||
CVE-2025-22088,0,1,37ac0263127b6cb922938639bc8fb953dd15e5a10067cd80205f2e7fe684a5fd,2025-04-25T18:41:27.627000
|
||||
CVE-2025-22089,0,0,23009b54ed2c971654c6dd781ded5b5bd3844702e6ade580779a755040598db3,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2209,0,0,0d27fafa138ac9907102cfce099d995eaea6d73dd6e7fb95e0d118cf4241e21f,2025-03-12T14:15:19.897000
|
||||
CVE-2025-22090,0,0,90c8d00adb50f29e85229931e3829c7d5dd33cd18704b9723277cd5d2cc64563,2025-04-17T20:22:16.240000
|
||||
@ -284068,7 +284069,7 @@ CVE-2025-22093,0,0,b24898d0dc107f2346d4f833c1e67c8777d58976698fba06e76ef65fa2245
|
||||
CVE-2025-22094,0,0,09059d5b58fbce3fad4eec10c69cc254c1648cdfac3dad0ef08bac2421a9be35,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22095,0,0,4fe140e98f99be6f92b616d06388d067b7260a8e9d2fa1df5fc4a895c33e6785,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22096,0,0,15b45f8823c1996770a96b120ba092f00becf4bccf2d6c3fffa128e5e78bf9e9,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22097,0,0,97a4a0d6b56c0154f972186cd420d43ebf62d6e5f01e1cca44d8ecc0935f4b19,2025-04-25T15:15:35.647000
|
||||
CVE-2025-22097,0,1,0061b7620d631c8cce8f289820d05e4be337c6e91e619f5ef2b8f9bdd13d9d7d,2025-04-25T18:41:04.243000
|
||||
CVE-2025-22098,0,0,6c4fdc85168785cf9bc2888afe555bae93a6aae32137479fb1d6e685ac07fbc0,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22099,0,0,34c86007a0246898343f27ac5d47b808a7794c7beb1126406566dff2e90f041f,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2210,0,0,86475c50184989786e182feb1184f7a2855d2c84538b322933b89181189cad61,2025-03-12T14:15:20.017000
|
||||
@ -286770,8 +286771,8 @@ CVE-2025-2577,0,0,b42cdd709191575ce088ec06e1554e25be2db50148fe53b9714dad89d20df0
|
||||
CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72dba7,2025-03-28T20:07:33.183000
|
||||
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
|
||||
CVE-2025-25774,0,0,217aaab1390f6b1eba60d1bc1ee5dcd1167d8b5507491fd4cc7d4a7ca3945256,2025-03-12T19:15:39.777000
|
||||
CVE-2025-25775,1,1,e9678e33ffbdbe762ec3661d48187990d759c4fb5e4e7a1a7c7f3f38e72f9c0c,2025-04-25T17:15:18.020000
|
||||
CVE-2025-25777,0,1,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000
|
||||
CVE-2025-25775,0,1,5544670cc9a7add259c6e5cbf53cd850470977944146ac06f99bc3b124b05057,2025-04-25T18:15:25.937000
|
||||
CVE-2025-25777,0,0,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000
|
||||
CVE-2025-2578,0,0,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000
|
||||
CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000
|
||||
CVE-2025-25784,0,0,0ad0989845f8e30f12e455449de911107ffaede0d9733a72f1c0bd4468008319,2025-04-10T17:42:20.670000
|
||||
@ -286937,7 +286938,7 @@ CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f
|
||||
CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
|
||||
CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
|
||||
CVE-2025-26265,0,0,dc6169524b361ca35185d09a9fee076e263bc06d923c2410d4d58b5ca82c49d7,2025-04-11T17:24:17.313000
|
||||
CVE-2025-26268,0,1,d9529d610311faa964302e414b9b8c3db6a8500fffae51ef0e05c440ae1ecaef,2025-04-25T16:33:11.420000
|
||||
CVE-2025-26268,0,0,d9529d610311faa964302e414b9b8c3db6a8500fffae51ef0e05c440ae1ecaef,2025-04-25T16:33:11.420000
|
||||
CVE-2025-26269,0,0,bb600c62486afdc7cbc050aa0fe396bc9e9f2a71745a953b660a84e1dc3ae9a3,2025-04-23T16:15:35.960000
|
||||
CVE-2025-2627,0,0,2f3ad81f65de29cf1c1820e848f840cadf0a85c3d953dd25546251d732981bcd,2025-04-02T15:46:50.193000
|
||||
CVE-2025-2628,0,0,05d1547b9a4ba25743b9dcb0b6bd681f5330882c7d106990b2f631bde4178f60,2025-04-02T15:44:41.567000
|
||||
@ -288097,7 +288098,7 @@ CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d0
|
||||
CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000
|
||||
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28072,0,0,321583596f07ee7a11b5edcf4c985e43a00852706ec6a22ba926fc63543c9b04,2025-04-17T20:21:48.243000
|
||||
CVE-2025-28076,0,1,4b3ace752bd79aa40bed45b9f464f187bdbe196232dd42bfd5f98670192bb295,2025-04-25T17:15:18.327000
|
||||
CVE-2025-28076,0,0,4b3ace752bd79aa40bed45b9f464f187bdbe196232dd42bfd5f98670192bb295,2025-04-25T17:15:18.327000
|
||||
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
||||
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
||||
@ -288158,7 +288159,7 @@ CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed8583
|
||||
CVE-2025-2832,0,0,cb7d7ad79effe9b806885a95f2ec7289cdd7a0d7d71df2be39be5f751b3cbeb5,2025-04-11T16:25:55.093000
|
||||
CVE-2025-2833,0,0,9a52ee089c5cfe9509a1e8871d17816b70a7313c16002967d895358fd72885f7,2025-04-01T15:43:23.657000
|
||||
CVE-2025-2835,0,0,f8c0fd9595480681bd283ae5c205524a5787cd2cba5ce2f877a12280939c81a6,2025-04-01T15:43:38.550000
|
||||
CVE-2025-28354,0,1,b6aa0a965fe9c4a203857e7f2efbf65dc8683aa78dae9214638de87412f83337,2025-04-25T17:15:18.500000
|
||||
CVE-2025-28354,0,0,b6aa0a965fe9c4a203857e7f2efbf65dc8683aa78dae9214638de87412f83337,2025-04-25T17:15:18.500000
|
||||
CVE-2025-28355,0,0,bd8de930b23f6184ab39d0c81e4ee9cdd924adbcf0d121098e5d134a3a60799c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000
|
||||
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
|
||||
@ -288168,7 +288169,7 @@ CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4df
|
||||
CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000
|
||||
CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000
|
||||
CVE-2025-28398,0,0,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000
|
||||
CVE-2025-28399,0,1,2d6b381953f48724dc0561fd038050c0671224628a2339d8ae31ceea0f90e934,2025-04-25T16:53:50.600000
|
||||
CVE-2025-28399,0,0,2d6b381953f48724dc0561fd038050c0671224628a2339d8ae31ceea0f90e934,2025-04-25T16:53:50.600000
|
||||
CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000
|
||||
CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000
|
||||
CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000
|
||||
@ -288320,11 +288321,11 @@ CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bde
|
||||
CVE-2025-29032,0,0,12b1441dc9358c5c16def012730045c4192ae6bcec0473634ec29643cb1836c3,2025-04-03T15:46:23.280000
|
||||
CVE-2025-29033,0,0,5eca366ad2f6b7bc48c9c10555d9d4de9f98752ea608be3c325a7269b2a18fae,2025-04-04T21:15:44.653000
|
||||
CVE-2025-29036,0,0,1cfdba0275e788d67daeea9f29674422f2b95f026fe7bf91e23dbade8cbd52ae,2025-04-04T21:15:44.813000
|
||||
CVE-2025-29039,0,0,b32289642d071875cb3c13f9efdf28132906dfe69bb2dfbe7eeacd864c8c84db,2025-04-17T20:21:05.203000
|
||||
CVE-2025-29040,0,0,57625b5e42d00cbd04a5764e44d05539c18c290bc43520734a4d2e658571a595,2025-04-21T18:39:38.827000
|
||||
CVE-2025-29041,0,0,bd7db5b7de77a59647c97fdc9bc554313f26290ba15eee841ea20241c08134f1,2025-04-21T18:40:47.357000
|
||||
CVE-2025-29042,0,0,86e07079a3646e18dbe29a53dd411cab917eca3116e5185cdd453cd1e5bd9cbc,2025-04-18T15:15:58.490000
|
||||
CVE-2025-29043,0,0,b2badcd7ca4534f7daf133c1393a280c57ce6650ebbf8cb0f64a591389c969ae,2025-04-18T16:15:21.013000
|
||||
CVE-2025-29039,0,1,881da009fc6597d81f3f9f4cb283b05453c5021c8889e1146e84959f079014fa,2025-04-25T18:28:39.133000
|
||||
CVE-2025-29040,0,1,ba15783e261065c92d08b79425bfe770efe8d4ef8e75f1a4ddce4c1adb9632c2,2025-04-25T18:34:37.217000
|
||||
CVE-2025-29041,0,1,5ebc36aba69d028a8ef3c7cd54ba9294d08a0f3d80a0332a5ec684088ddb306c,2025-04-25T18:28:55.070000
|
||||
CVE-2025-29042,0,1,2d0230a4f27f8c90c859c9e34754c9a1e3a510ddc3e4f99c877efc19ebb8f376,2025-04-25T18:32:08.817000
|
||||
CVE-2025-29043,0,1,1cef223cd8fe283b6ca31c2b51ea32a91259cc12b1a64f8c47d9023c163fcf4b,2025-04-25T18:32:43.667000
|
||||
CVE-2025-29044,0,0,97c1f84201c58c1cd211c59dd61961380f9d3f314950e59244831d0ef457598e,2025-04-21T18:42:48.887000
|
||||
CVE-2025-29045,0,0,1963dc8d4038da2fbcb2fba081a2d74132412c687c5a7af4af339558b443c2d6,2025-04-21T18:47:56.740000
|
||||
CVE-2025-29046,0,0,b7ee5cb392ebd408b1b6286a1320dff309770773e41a50e962ca316924d92804,2025-04-18T13:15:57.827000
|
||||
@ -288367,7 +288368,7 @@ CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c5
|
||||
CVE-2025-29208,0,0,67e2605039ee3d1f3c5ea9f6fc4b9f6bb3ff72ecfc77443b4593d17db1d38ecf,2025-04-14T18:15:29.100000
|
||||
CVE-2025-29209,0,0,8175b6f6ee212daa9c738df874a32007f6007f655ced52de08397463cd1fe189,2025-04-22T15:16:12.130000
|
||||
CVE-2025-2921,0,0,9699494d9e2188360f8bb70978c1473b6fd42ed7b51cafd5be6de03ad5519768,2025-04-17T14:21:41.600000
|
||||
CVE-2025-29213,0,1,1fb62b4960ceee2f8323143f91cb017f8787c239acca9679cc330c7892094be7,2025-04-25T16:49:30.973000
|
||||
CVE-2025-29213,0,0,1fb62b4960ceee2f8323143f91cb017f8787c239acca9679cc330c7892094be7,2025-04-25T16:49:30.973000
|
||||
CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000
|
||||
CVE-2025-29215,0,0,96e2f565718ae35623a5dad2291d2bb27d05c2c10bebe7c06ba56599d76124a9,2025-03-25T17:38:20.710000
|
||||
CVE-2025-29217,0,0,e64e2910b1dc1b0effd2ebba9d04863326d941e1021d8d58ce80e3146dd4312c,2025-03-25T17:38:28.670000
|
||||
@ -288427,7 +288428,7 @@ CVE-2025-29429,0,0,70ed76e22abf856ea286be6fccfd66e6102b6f8a8d8567a46ea60e2a92631
|
||||
CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b283a,2025-03-25T18:44:43.817000
|
||||
CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade5e5,2025-04-02T12:30:59.763000
|
||||
CVE-2025-29446,0,0,21ef60637087f4496ffffebc4fc2b4422bb4fe4c5193bfdb06a1124ed8ed5076,2025-04-23T14:08:13.383000
|
||||
CVE-2025-29449,0,1,1c63852ecef2dbc2da812fd949e8ff942bebe5c5482e7cbe6370e892fc3d3c55,2025-04-25T16:28:28.240000
|
||||
CVE-2025-29449,0,0,1c63852ecef2dbc2da812fd949e8ff942bebe5c5482e7cbe6370e892fc3d3c55,2025-04-25T16:28:28.240000
|
||||
CVE-2025-2945,0,0,5701c477425c2a81bc66d944f3bb97a7255b4c935bf92c67bb01910b6829ab38,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29450,0,0,f34a5cdc8205f33cbdf0862b5cf2a87c8d745f937abf35e2012f9e6f793825a1,2025-04-23T18:09:36.620000
|
||||
CVE-2025-29451,0,0,c895f1b6d7e34a524d3202169800460fac6003cb64aa1105bb093920f442d6e0,2025-04-23T18:09:14.197000
|
||||
@ -288440,7 +288441,7 @@ CVE-2025-29457,0,0,8a23485043b3dbf7f31f598d733d28ffd4879b2d7b45d8b07f407ab70038a
|
||||
CVE-2025-29458,0,0,64053e1bc8dd708edf920853d772375164ee8c78f32be3e67d25fce4ac79f17b,2025-04-24T14:14:21.430000
|
||||
CVE-2025-29459,0,0,d4faa2b36f3d4360a8f4a4cd3bdc71712c85ea628a2b74f93135a14b40cd2944,2025-04-23T13:15:57.230000
|
||||
CVE-2025-2946,0,0,57048e6987aa91934f12caac8524ce46db72506a3b71f36fd88cffedcdd964cd,2025-04-23T22:24:39.353000
|
||||
CVE-2025-29460,0,1,78849095dae6e7a95d6012013131e0f0b4786ba7ffeb3342e29cc5d3a2db8483,2025-04-25T16:27:20.303000
|
||||
CVE-2025-29460,0,0,78849095dae6e7a95d6012013131e0f0b4786ba7ffeb3342e29cc5d3a2db8483,2025-04-25T16:27:20.303000
|
||||
CVE-2025-29461,0,0,a4f972c3e193eaa0854b2d502be249ee47ca972f1c4f3d9a07f9be52a163a125,2025-04-23T18:04:28.763000
|
||||
CVE-2025-29462,0,0,4e1eef515a396085748d177ee774edfa2abd4137fc1ddaad52874b39f20b653a,2025-04-22T16:33:41.237000
|
||||
CVE-2025-2947,0,0,7e354bbcc7dfac84c59a9258c55382cf9bea8911e8c88a5df5d0a946a8efa455,2025-04-17T20:21:05.203000
|
||||
@ -288473,7 +288474,7 @@ CVE-2025-29512,0,0,7a24b49357e993d066e7541e68d5d33f348f0415dd6261d0250325acd912b
|
||||
CVE-2025-29513,0,0,7d0f1f72880e870eacef76a17c17b7170ff1ac62f0b0a5c931318e34e80c75d1,2025-04-23T17:24:54.790000
|
||||
CVE-2025-2952,0,0,8e511f60053de6e98a0a0d7d1bc3adcad4b08b5c7d212898526204e3a8631438,2025-04-15T17:46:20.793000
|
||||
CVE-2025-29526,0,0,b4a57822c68fd70509a2c4e82089b767bcd66d5079ebe225fe4045e1aae61438,2025-04-23T19:16:24.920000
|
||||
CVE-2025-29529,0,1,d0d9fa2a5117ff7f783bf2983f0979aace93b701ed6e63fbd984104c8b0d4ad0,2025-04-25T17:15:18.677000
|
||||
CVE-2025-29529,0,0,d0d9fa2a5117ff7f783bf2983f0979aace93b701ed6e63fbd984104c8b0d4ad0,2025-04-25T17:15:18.677000
|
||||
CVE-2025-2953,0,0,63a058316a94f1860205db8db60c337f53057708ffe30b70ffabdee4df9a2fc5,2025-04-22T12:15:16.043000
|
||||
CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000
|
||||
CVE-2025-29547,0,0,416d4faa35b5cbf429d571eafda070339c54a6ada4b61df7e7c1270b4ca436dd,2025-04-23T14:08:13.383000
|
||||
@ -290690,7 +290691,7 @@ CVE-2025-32996,0,0,66cdefdd4ac5ef2c3d78ef7b0a3a801233b441eea948b7804c8316fb0d163
|
||||
CVE-2025-32997,0,0,585b29f934052489f32ea07f36835b226451d0492c02f05a8ece6f7bdf5daba5,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3300,0,0,7e276f02a73d782632d0724f5e5af8de5c7a3de05769a1e852c83769f9ad3b36,2025-04-24T09:15:31.203000
|
||||
CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0bef0f,2025-04-22T17:37:37.900000
|
||||
CVE-2025-33027,0,1,315132d50b588b2e2dcb36832e008e48471336783b88752c2b030500f9b618d4,2025-04-25T16:54:53.077000
|
||||
CVE-2025-33027,0,0,315132d50b588b2e2dcb36832e008e48471336783b88752c2b030500f9b618d4,2025-04-25T16:54:53.077000
|
||||
CVE-2025-33028,0,0,abe1ecf54490db7447f2cb4b6858d9b8e9d40393d98c0f7e51b205de8bc1fd46,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000
|
||||
CVE-2025-3304,0,0,2ec25b3b916c9e696963707dba4544ab011813ba6a5064128b7ade1c94bf65f1,2025-04-07T14:17:50.220000
|
||||
@ -290826,7 +290827,7 @@ CVE-2025-3489,0,0,59309d25f9f42981fc918bf9e175fc55c67d2cd139e3967ead123a01110b7a
|
||||
CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3509,0,0,578735ff0d7174d4283b552c1ccab9d92c1a2ab0ec5ddb56de1fee20129f4e8b,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3511,0,0,f6232a15e7fe0fff9f865b274a09997bbb0737422021abb70006df0e21e532b4,2025-04-25T06:15:45.753000
|
||||
CVE-2025-3512,0,0,df2cae04492d89c4b84e5a0fd1025055cbf21071217fd4f876d8ac094356d51d,2025-04-25T02:15:14.603000
|
||||
CVE-2025-3512,0,1,20d5b7a0c651482d59ceef752919a6e419c7dc684bf79b235343ded68357dd77,2025-04-25T18:15:26.103000
|
||||
CVE-2025-3518,0,0,7497563947f75b629887a4413d991889fb74f762947f73f77cc72069a35bed4e,2025-04-24T15:15:58.393000
|
||||
CVE-2025-3519,0,0,7a1e772e7e1a4f83fd384db353598690580e540b87458701710d69fa7ae08b1c,2025-04-23T14:08:13.383000
|
||||
CVE-2025-3520,0,0,be35fd038c4a5e22088fd0e9352f3a187df9abda8d0ecfa9c4571aec785dc913,2025-04-21T14:23:45.950000
|
||||
@ -290914,7 +290915,7 @@ CVE-2025-3634,0,0,c249616fcd5306954c7d56d551e8b0519a46a3d77d022c90495e60ea868758
|
||||
CVE-2025-3635,0,0,82bb269846d3df9accc7f03b877a95650ed9373767a5bc824156d089abecb1cd,2025-04-25T15:15:37.230000
|
||||
CVE-2025-3636,0,0,baa88194ce5460ba4031b3c76f0ad7b59d61d93b8db26be41142300f1e981740,2025-04-25T15:15:37.363000
|
||||
CVE-2025-3637,0,0,3c38d23c601d6f8f06e183f269a947596b2ff8a03965e630670af08150139833,2025-04-25T15:15:37.510000
|
||||
CVE-2025-3638,0,1,96228fa5840d543ffc12b5e297f11b0a836b5c411b4760721a5024a1cef7d685,2025-04-25T17:15:19.060000
|
||||
CVE-2025-3638,0,0,96228fa5840d543ffc12b5e297f11b0a836b5c411b4760721a5024a1cef7d685,2025-04-25T17:15:19.060000
|
||||
CVE-2025-3640,0,0,859eeb5ca538cc9609daa0f57bfb173c4c062bf5438e109a0572e4e175e312d2,2025-04-25T15:15:37.757000
|
||||
CVE-2025-3641,0,0,d7ced09d557988f3d03673d6158a9cba4ba2b4c8f6b5a36fd90c7068e9f39b3e,2025-04-25T15:15:37.887000
|
||||
CVE-2025-3642,0,0,b58524ae75fb0c1ea52ebe6efecec46a031660351cd24908bae81c30facc81be,2025-04-25T15:15:38.013000
|
||||
@ -290987,7 +290988,7 @@ CVE-2025-3775,0,0,16e8478151448d32ea3ecef550364f3909606c3573641ec825932b7de0e1fc
|
||||
CVE-2025-3776,0,0,cf81d0de1f8bc345c4abdbda2fd10df58ffa252c89f7ba1ddea13cef90f5d4da,2025-04-24T09:15:31.890000
|
||||
CVE-2025-37785,0,0,d1c64bd1cadcc5f51780313b6aae97c63b6e0722d1c5a54d61cc46c9690e399a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000
|
||||
CVE-2025-37838,0,0,34b866110a481f88ddb643755af79280103467b2b106118ed6c8b965b4af27fd,2025-04-25T11:15:45.993000
|
||||
CVE-2025-37838,0,1,968d59a8b1b7a4d9c59001f618e4d0716f7f54f25d8140bf09d7fc6cff47bedd,2025-04-25T18:40:30.147000
|
||||
CVE-2025-3785,0,0,bff9ab0e8b6a6a32cd5139ba0f7e4bd4305d4e6ab42c05e8cc90a3044ee64a2a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3786,0,0,ef1623c50d812a740179b99f61135828f9278cbc4c5320b64de7a7e4bc416e8d,2025-04-22T16:35:33.920000
|
||||
CVE-2025-37860,0,0,0c77e81593ef5482779e31740051c4064947edf1b07804581ac12225df1491b3,2025-04-21T14:23:45.950000
|
||||
@ -291068,7 +291069,8 @@ CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb9
|
||||
CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000
|
||||
CVE-2025-3912,0,0,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
|
||||
CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000
|
||||
CVE-2025-3928,1,1,e870c35611e7b1d1807cb2eec50ad071b526b7e8c62bcfec5741798436aae32c,2025-04-25T16:15:27.817000
|
||||
CVE-2025-3928,0,0,e870c35611e7b1d1807cb2eec50ad071b526b7e8c62bcfec5741798436aae32c,2025-04-25T16:15:27.817000
|
||||
CVE-2025-3935,1,1,500a5a2cb674692a79dbf70935dcc6fd5c3736229efb31678d5850fd6f88178d,2025-04-25T19:15:49.143000
|
||||
CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000
|
||||
CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000
|
||||
CVE-2025-39377,0,0,ea7d6bddc381e164167c2aa5b82850f857bb244f79243a634ea3725e69b06e2c,2025-04-24T16:15:31.013000
|
||||
@ -291237,7 +291239,7 @@ CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af
|
||||
CVE-2025-43012,0,0,18e1af789e53f96a6c881eae07096e79716556b48ee757b9a80a5d7ad315fdf0,2025-04-17T20:21:05.203000
|
||||
CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07c4b,2025-04-23T15:29:33.910000
|
||||
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
|
||||
CVE-2025-43015,0,1,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000
|
||||
CVE-2025-43015,0,0,e1099e2d690e6500afcce9f63f8d90a3ffca94e6d4b413f55df99246e9d63336,2025-04-25T16:30:24.887000
|
||||
CVE-2025-43016,0,0,d4e5ad3758c737aa4cd5c4bfda5a881ca8580212e69ffa040608a171f6d0e29c,2025-04-25T15:15:39.260000
|
||||
CVE-2025-43703,0,0,9ffdd9596bfa1e88ec9059e0286523ec84cddbc80b74fbe08d9a126526684bcf,2025-04-17T20:21:48.243000
|
||||
CVE-2025-43704,0,0,93215b502ded5b759f01e8bfd4bceefdbd3e881e2349bfb7d79f62333fd912ac,2025-04-17T20:21:48.243000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user