mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-30T23:00:33.211774+00:00
This commit is contained in:
parent
173be1a07b
commit
3463d248b7
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-41400",
|
"id": "CVE-2022-41400",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T13:15:13.560",
|
"published": "2023-04-28T13:15:13.560",
|
||||||
"lastModified": "2024-11-21T07:23:09.593",
|
"lastModified": "2025-01-30T21:15:09.157",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-798"
|
"value": "CWE-798"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-798"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-24269",
|
"id": "CVE-2023-24269",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T22:15:08.887",
|
"published": "2023-04-28T22:15:08.887",
|
||||||
"lastModified": "2024-11-21T07:47:38.710",
|
"lastModified": "2025-01-30T21:15:09.913",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-434"
|
"value": "CWE-434"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-27971",
|
"id": "CVE-2023-27971",
|
||||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||||
"published": "2023-04-28T16:15:09.840",
|
"published": "2023-04-28T16:15:09.840",
|
||||||
"lastModified": "2024-11-21T07:53:50.490",
|
"lastModified": "2025-01-30T21:15:10.260",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-120"
|
"value": "CWE-120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28821",
|
"id": "CVE-2023-28821",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T14:15:10.753",
|
"published": "2023-04-28T14:15:10.753",
|
||||||
"lastModified": "2024-11-21T07:56:04.903",
|
"lastModified": "2025-01-30T21:15:10.470",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -65,6 +65,16 @@
|
|||||||
"value": "CWE-640"
|
"value": "CWE-640"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-640"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28882",
|
"id": "CVE-2023-28882",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T04:15:38.017",
|
"published": "2023-04-28T04:15:38.017",
|
||||||
"lastModified": "2024-11-21T07:56:13.220",
|
"lastModified": "2025-01-30T21:15:10.640",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-400"
|
"value": "CWE-400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-29268",
|
"id": "CVE-2023-29268",
|
||||||
"sourceIdentifier": "security@tibco.com",
|
"sourceIdentifier": "security@tibco.com",
|
||||||
"published": "2023-04-26T18:15:09.160",
|
"published": "2023-04-26T18:15:09.160",
|
||||||
"lastModified": "2024-11-21T07:56:46.553",
|
"lastModified": "2025-01-30T22:15:07.977",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -65,6 +65,16 @@
|
|||||||
"value": "CWE-434"
|
"value": "CWE-434"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-29815",
|
"id": "CVE-2023-29815",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T15:15:10.737",
|
"published": "2023-04-28T15:15:10.737",
|
||||||
"lastModified": "2024-11-21T07:57:32.690",
|
"lastModified": "2025-01-30T21:15:10.877",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-352"
|
"value": "CWE-352"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30204",
|
"id": "CVE-2023-30204",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-05-03T21:15:23.643",
|
"published": "2023-05-03T21:15:23.643",
|
||||||
"lastModified": "2024-11-21T07:59:54.240",
|
"lastModified": "2025-01-30T21:15:11.507",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30205",
|
"id": "CVE-2023-30205",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-05-03T21:15:24.230",
|
"published": "2023-05-03T21:15:24.230",
|
||||||
"lastModified": "2024-11-21T07:59:54.377",
|
"lastModified": "2025-01-30T21:15:11.693",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.7,
|
"exploitabilityScore": 1.7,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30300",
|
"id": "CVE-2023-30300",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-05-03T20:15:10.327",
|
"published": "2023-05-03T20:15:10.327",
|
||||||
"lastModified": "2024-11-21T07:59:59.290",
|
"lastModified": "2025-01-30T21:15:11.870",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-835"
|
"value": "CWE-835"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-835"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30405",
|
"id": "CVE-2023-30405",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T21:15:09.083",
|
"published": "2023-04-28T21:15:09.083",
|
||||||
"lastModified": "2024-11-21T08:00:08.217",
|
"lastModified": "2025-01-30T21:15:12.067",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30454",
|
"id": "CVE-2023-30454",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T19:15:16.993",
|
"published": "2023-04-28T19:15:16.993",
|
||||||
"lastModified": "2024-11-21T08:00:13.123",
|
"lastModified": "2025-01-30T21:15:12.300",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-30455",
|
"id": "CVE-2023-30455",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-28T18:15:26.680",
|
"published": "2023-04-28T18:15:26.680",
|
||||||
"lastModified": "2024-11-21T08:00:13.273",
|
"lastModified": "2025-01-30T21:15:12.490",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-31290",
|
"id": "CVE-2023-31290",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-27T05:15:08.807",
|
"published": "2023-04-27T05:15:08.807",
|
||||||
"lastModified": "2024-11-21T08:01:44.153",
|
"lastModified": "2025-01-30T21:15:12.700",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.2,
|
"exploitabilityScore": 2.2,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-338"
|
"value": "CWE-338"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-338"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
60
CVE-2024/CVE-2024-116xx/CVE-2024-11609.json
Normal file
60
CVE-2024/CVE-2024-116xx/CVE-2024-11609.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11609",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.163",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.163",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24772."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1673/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-116xx/CVE-2024-11610.json
Normal file
60
CVE-2024/CVE-2024-116xx/CVE-2024-11610.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11610",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.303",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.303",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24773."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1674/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-116xx/CVE-2024-11611.json
Normal file
60
CVE-2024/CVE-2024-116xx/CVE-2024-11611.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11611",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.450",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.450",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1675/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-12085",
|
"id": "CVE-2024-12085",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2025-01-14T18:15:25.123",
|
"published": "2025-01-14T18:15:25.123",
|
||||||
"lastModified": "2025-01-30T17:15:17.527",
|
"lastModified": "2025-01-30T22:15:08.410",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -84,6 +84,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2025:0790",
|
"url": "https://access.redhat.com/errata/RHSA-2025:0790",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:0849",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-12085",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-12085",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-13269",
|
"id": "CVE-2024-13269",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T20:15:35.687",
|
"published": "2025-01-09T20:15:35.687",
|
||||||
"lastModified": "2025-01-09T20:15:35.687",
|
"lastModified": "2025-01-30T22:15:08.550",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11."
|
"value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "mlhess@drupal.org",
|
"source": "mlhess@drupal.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-13308",
|
"id": "CVE-2024-13308",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T21:15:28.623",
|
"published": "2025-01-09T21:15:28.623",
|
||||||
"lastModified": "2025-01-09T21:15:28.623",
|
"lastModified": "2025-01-30T22:15:08.723",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2."
|
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 3.8,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "mlhess@drupal.org",
|
"source": "mlhess@drupal.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-13309",
|
"id": "CVE-2024-13309",
|
||||||
"sourceIdentifier": "mlhess@drupal.org",
|
"sourceIdentifier": "mlhess@drupal.org",
|
||||||
"published": "2025-01-09T21:15:28.740",
|
"published": "2025-01-09T21:15:28.740",
|
||||||
"lastModified": "2025-01-09T21:15:28.740",
|
"lastModified": "2025-01-30T22:15:08.880",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1."
|
"value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "mlhess@drupal.org",
|
"source": "mlhess@drupal.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-1488",
|
"id": "CVE-2024-1488",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2024-02-15T05:15:10.257",
|
"published": "2024-02-15T05:15:10.257",
|
||||||
"lastModified": "2025-01-24T06:15:26.913",
|
"lastModified": "2025-01-30T22:15:09.037",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -62,7 +62,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -416,6 +416,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:0837",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1488",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-1488",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54156",
|
"id": "CVE-2024-54156",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-12-04T12:15:20.340",
|
"published": "2024-12-04T12:15:20.340",
|
||||||
"lastModified": "2024-12-04T12:15:20.340",
|
"lastModified": "2025-01-30T21:46:25.813",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.6,
|
"exploitabilityScore": 1.6,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.52635",
|
||||||
|
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54157",
|
"id": "CVE-2024-54157",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-12-04T12:15:20.473",
|
"published": "2024-12-04T12:15:20.473",
|
||||||
"lastModified": "2024-12-04T12:15:20.473",
|
"lastModified": "2025-01-30T21:47:10.683",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.52635",
|
||||||
|
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54158",
|
"id": "CVE-2024-54158",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-12-04T12:15:20.623",
|
"published": "2024-12-04T12:15:20.623",
|
||||||
"lastModified": "2024-12-04T12:15:20.623",
|
"lastModified": "2025-01-30T21:50:32.770",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,25 +36,76 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-173"
|
"value": "CWE-173"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-290"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.52635",
|
||||||
|
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2024-57276",
|
"id": "CVE-2024-57276",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-27T17:15:16.827",
|
"published": "2025-01-27T17:15:16.827",
|
||||||
"lastModified": "2025-01-27T17:15:16.827",
|
"lastModified": "2025-01-30T22:15:09.297",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path."
|
"value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En Electronic Arts Dragon Age Origins 1.05, el servicio DAUpdaterSVC contiene una vulnerabilidad de ruta de servicio sin comillas. Este servicio est\u00e1 configurado con permisos inseguros, lo que permite a los usuarios modificar la ruta del archivo ejecutable que utiliza el servicio. El servicio se ejecuta con privilegios NT AUTHORITY\\sistema, lo que permite a los atacantes aumentar los privilegios reemplazando o colocando un ejecutable malicioso en la ruta del servicio."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-428"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md",
|
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-0241",
|
"id": "CVE-2025-0241",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2025-01-07T16:15:38.767",
|
"published": "2025-01-07T16:15:38.767",
|
||||||
"lastModified": "2025-01-13T22:15:15.330",
|
"lastModified": "2025-01-30T22:15:09.700",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6."
|
"value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023",
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023",
|
||||||
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0568.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0568.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0568",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.587",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.587",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-049/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0569.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0569.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0569",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.710",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.710",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-052/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0570.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0570.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0570",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.830",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.830",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-050/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0571.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0571.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0571",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:13.960",
|
||||||
|
"lastModified": "2025-01-30T21:15:13.960",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-051/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0572.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0572.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0572",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:14.093",
|
||||||
|
"lastModified": "2025-01-30T21:15:14.093",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server Web Portal DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25308."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-054/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0573.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0573.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0573",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:14.227",
|
||||||
|
"lastModified": "2025-01-30T21:15:14.227",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-053/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-05xx/CVE-2025-0574.json
Normal file
56
CVE-2025/CVE-2025-05xx/CVE-2025-0574.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0574",
|
||||||
|
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||||
|
"published": "2025-01-30T21:15:14.357",
|
||||||
|
"lastModified": "2025-01-30T21:15:14.357",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||||
|
"baseScore": 8.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "zdi-disclosures@trendmicro.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-055/",
|
||||||
|
"source": "zdi-disclosures@trendmicro.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2025/CVE-2025-08xx/CVE-2025-0880.json
Normal file
141
CVE-2025/CVE-2025-08xx/CVE-2025-0880.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0880",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-01-30T21:15:14.487",
|
||||||
|
"lastModified": "2025-01-30T21:15:14.487",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/updateplan.php. The manipulation of the argument planid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.294125",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.294125",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.488716",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/u21735104/brookes/za83ilxr9g2fkv8b",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-08xx/CVE-2025-0881.json
Normal file
145
CVE-2025/CVE-2025-08xx/CVE-2025-0881.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0881",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-01-30T21:15:14.650",
|
||||||
|
"lastModified": "2025-01-30T22:15:09.950",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/saveroutine.php. The manipulation of the argument rname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wizdzz/CVE/issues/1",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.294126",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.294126",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.489192",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wizdzz/CVE/issues/1",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-08xx/CVE-2025-0882.json
Normal file
145
CVE-2025/CVE-2025-08xx/CVE-2025-0882.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0882",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-01-30T21:15:14.820",
|
||||||
|
"lastModified": "2025-01-30T21:15:14.820",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://code-projects.org/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/LamentXU123/cve/blob/main/sql_injection3.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.294127",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.294127",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.491463",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-24099",
|
"id": "CVE-2025-24099",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-01-30T17:15:18.473",
|
"published": "2025-01-30T17:15:18.473",
|
||||||
"lastModified": "2025-01-30T17:15:18.473",
|
"lastModified": "2025-01-30T22:15:10.160",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges."
|
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.5,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/122068",
|
"url": "https://support.apple.com/en-us/122068",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24456",
|
"id": "CVE-2025-24456",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:18.320",
|
"published": "2025-01-21T18:15:18.320",
|
||||||
"lastModified": "2025-01-21T18:15:18.320",
|
"lastModified": "2025-01-30T21:28:52.003",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,25 +36,76 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.5
|
"impactScore": 5.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-288"
|
"value": "CWE-288"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.55417",
|
||||||
|
"matchCriteriaId": "7C6F9298-B076-46A1-BBF5-92D75CCD7F9A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24457",
|
"id": "CVE-2025-24457",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:18.520",
|
"published": "2025-01-21T18:15:18.520",
|
||||||
"lastModified": "2025-01-21T18:15:18.520",
|
"lastModified": "2025-01-30T21:31:24.150",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.55417",
|
||||||
|
"matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24458",
|
"id": "CVE-2025-24458",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:18.697",
|
"published": "2025-01-21T18:15:18.697",
|
||||||
"lastModified": "2025-01-21T18:15:18.697",
|
"lastModified": "2025-01-30T21:35:05.127",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.3.55417",
|
||||||
|
"matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24459",
|
"id": "CVE-2025-24459",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:18.890",
|
"published": "2025-01-21T18:15:18.890",
|
||||||
"lastModified": "2025-01-21T18:15:18.890",
|
"lastModified": "2025-01-30T21:22:22.917",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.1,
|
"exploitabilityScore": 2.1,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.12.1",
|
||||||
|
"matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24460",
|
"id": "CVE-2025-24460",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:19.067",
|
"published": "2025-01-21T18:15:19.067",
|
||||||
"lastModified": "2025-01-21T18:15:19.067",
|
"lastModified": "2025-01-30T21:25:18.337",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.12.1",
|
||||||
|
"matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24461",
|
"id": "CVE-2025-24461",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2025-01-21T18:15:19.260",
|
"published": "2025-01-21T18:15:19.260",
|
||||||
"lastModified": "2025-01-21T18:15:19.260",
|
"lastModified": "2025-01-30T21:26:17.583",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:teamcity:2024.12.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F0E73863-CD45-441D-8935-DEEBF201E302"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
85
README.md
85
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-01-30T21:00:30.606915+00:00
|
2025-01-30T23:00:33.211774+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-01-30T20:15:51.010000+00:00
|
2025-01-30T22:15:10.160000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,56 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
279541
|
279554
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `24`
|
Recently added CVEs: `13`
|
||||||
|
|
||||||
- [CVE-2024-10026](CVE-2024/CVE-2024-100xx/CVE-2024-10026.json) (`2025-01-30T20:15:32.600`)
|
- [CVE-2024-11609](CVE-2024/CVE-2024-116xx/CVE-2024-11609.json) (`2025-01-30T21:15:13.163`)
|
||||||
- [CVE-2024-10603](CVE-2024/CVE-2024-106xx/CVE-2024-10603.json) (`2025-01-30T20:15:32.803`)
|
- [CVE-2024-11610](CVE-2024/CVE-2024-116xx/CVE-2024-11610.json) (`2025-01-30T21:15:13.303`)
|
||||||
- [CVE-2024-10604](CVE-2024/CVE-2024-106xx/CVE-2024-10604.json) (`2025-01-30T20:15:33.003`)
|
- [CVE-2024-11611](CVE-2024/CVE-2024-116xx/CVE-2024-11611.json) (`2025-01-30T21:15:13.450`)
|
||||||
- [CVE-2024-12248](CVE-2024/CVE-2024-122xx/CVE-2024-12248.json) (`2025-01-30T19:15:13.390`)
|
- [CVE-2025-0568](CVE-2025/CVE-2025-05xx/CVE-2025-0568.json) (`2025-01-30T21:15:13.587`)
|
||||||
- [CVE-2024-44142](CVE-2024/CVE-2024-441xx/CVE-2024-44142.json) (`2025-01-30T19:15:13.910`)
|
- [CVE-2025-0569](CVE-2025/CVE-2025-05xx/CVE-2025-0569.json) (`2025-01-30T21:15:13.710`)
|
||||||
- [CVE-2025-0142](CVE-2025/CVE-2025-01xx/CVE-2025-0142.json) (`2025-01-30T20:15:33.853`)
|
- [CVE-2025-0570](CVE-2025/CVE-2025-05xx/CVE-2025-0570.json) (`2025-01-30T21:15:13.830`)
|
||||||
- [CVE-2025-0143](CVE-2025/CVE-2025-01xx/CVE-2025-0143.json) (`2025-01-30T20:15:34.050`)
|
- [CVE-2025-0571](CVE-2025/CVE-2025-05xx/CVE-2025-0571.json) (`2025-01-30T21:15:13.960`)
|
||||||
- [CVE-2025-0144](CVE-2025/CVE-2025-01xx/CVE-2025-0144.json) (`2025-01-30T20:15:34.210`)
|
- [CVE-2025-0572](CVE-2025/CVE-2025-05xx/CVE-2025-0572.json) (`2025-01-30T21:15:14.093`)
|
||||||
- [CVE-2025-0145](CVE-2025/CVE-2025-01xx/CVE-2025-0145.json) (`2025-01-30T20:15:34.547`)
|
- [CVE-2025-0573](CVE-2025/CVE-2025-05xx/CVE-2025-0573.json) (`2025-01-30T21:15:14.227`)
|
||||||
- [CVE-2025-0146](CVE-2025/CVE-2025-01xx/CVE-2025-0146.json) (`2025-01-30T20:15:34.907`)
|
- [CVE-2025-0574](CVE-2025/CVE-2025-05xx/CVE-2025-0574.json) (`2025-01-30T21:15:14.357`)
|
||||||
- [CVE-2025-0147](CVE-2025/CVE-2025-01xx/CVE-2025-0147.json) (`2025-01-30T20:15:35.253`)
|
- [CVE-2025-0880](CVE-2025/CVE-2025-08xx/CVE-2025-0880.json) (`2025-01-30T21:15:14.487`)
|
||||||
- [CVE-2025-0626](CVE-2025/CVE-2025-06xx/CVE-2025-0626.json) (`2025-01-30T19:15:14.010`)
|
- [CVE-2025-0881](CVE-2025/CVE-2025-08xx/CVE-2025-0881.json) (`2025-01-30T21:15:14.650`)
|
||||||
- [CVE-2025-0680](CVE-2025/CVE-2025-06xx/CVE-2025-0680.json) (`2025-01-30T19:15:14.147`)
|
- [CVE-2025-0882](CVE-2025/CVE-2025-08xx/CVE-2025-0882.json) (`2025-01-30T21:15:14.820`)
|
||||||
- [CVE-2025-0681](CVE-2025/CVE-2025-06xx/CVE-2025-0681.json) (`2025-01-30T19:15:14.300`)
|
|
||||||
- [CVE-2025-0683](CVE-2025/CVE-2025-06xx/CVE-2025-0683.json) (`2025-01-30T19:15:14.460`)
|
|
||||||
- [CVE-2025-24500](CVE-2025/CVE-2025-245xx/CVE-2025-24500.json) (`2025-01-30T19:15:14.600`)
|
|
||||||
- [CVE-2025-24501](CVE-2025/CVE-2025-245xx/CVE-2025-24501.json) (`2025-01-30T19:15:14.723`)
|
|
||||||
- [CVE-2025-24502](CVE-2025/CVE-2025-245xx/CVE-2025-24502.json) (`2025-01-30T19:15:14.863`)
|
|
||||||
- [CVE-2025-24503](CVE-2025/CVE-2025-245xx/CVE-2025-24503.json) (`2025-01-30T19:15:16.453`)
|
|
||||||
- [CVE-2025-24504](CVE-2025/CVE-2025-245xx/CVE-2025-24504.json) (`2025-01-30T19:15:16.967`)
|
|
||||||
- [CVE-2025-24505](CVE-2025/CVE-2025-245xx/CVE-2025-24505.json) (`2025-01-30T19:15:17.210`)
|
|
||||||
- [CVE-2025-24506](CVE-2025/CVE-2025-245xx/CVE-2025-24506.json) (`2025-01-30T19:15:17.590`)
|
|
||||||
- [CVE-2025-24507](CVE-2025/CVE-2025-245xx/CVE-2025-24507.json) (`2025-01-30T19:15:17.920`)
|
|
||||||
- [CVE-2025-24802](CVE-2025/CVE-2025-248xx/CVE-2025-24802.json) (`2025-01-30T20:15:51.010`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `13`
|
Recently modified CVEs: `31`
|
||||||
|
|
||||||
- [CVE-2023-1526](CVE-2023/CVE-2023-15xx/CVE-2023-1526.json) (`2025-01-30T20:15:30.230`)
|
- [CVE-2023-29815](CVE-2023/CVE-2023-298xx/CVE-2023-29815.json) (`2025-01-30T21:15:10.877`)
|
||||||
- [CVE-2023-27972](CVE-2023/CVE-2023-279xx/CVE-2023-27972.json) (`2025-01-30T20:15:31.307`)
|
- [CVE-2023-30204](CVE-2023/CVE-2023-302xx/CVE-2023-30204.json) (`2025-01-30T21:15:11.507`)
|
||||||
- [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2025-01-30T19:15:09.283`)
|
- [CVE-2023-30205](CVE-2023/CVE-2023-302xx/CVE-2023-30205.json) (`2025-01-30T21:15:11.693`)
|
||||||
- [CVE-2023-29639](CVE-2023/CVE-2023-296xx/CVE-2023-29639.json) (`2025-01-30T19:15:11.527`)
|
- [CVE-2023-30300](CVE-2023/CVE-2023-303xx/CVE-2023-30300.json) (`2025-01-30T21:15:11.870`)
|
||||||
- [CVE-2023-29641](CVE-2023/CVE-2023-296xx/CVE-2023-29641.json) (`2025-01-30T19:15:12.073`)
|
- [CVE-2023-30405](CVE-2023/CVE-2023-304xx/CVE-2023-30405.json) (`2025-01-30T21:15:12.067`)
|
||||||
- [CVE-2023-29643](CVE-2023/CVE-2023-296xx/CVE-2023-29643.json) (`2025-01-30T19:15:12.503`)
|
- [CVE-2023-30454](CVE-2023/CVE-2023-304xx/CVE-2023-30454.json) (`2025-01-30T21:15:12.300`)
|
||||||
- [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2025-01-30T19:15:12.690`)
|
- [CVE-2023-30455](CVE-2023/CVE-2023-304xx/CVE-2023-30455.json) (`2025-01-30T21:15:12.490`)
|
||||||
- [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2025-01-30T19:15:12.900`)
|
- [CVE-2023-31290](CVE-2023/CVE-2023-312xx/CVE-2023-31290.json) (`2025-01-30T21:15:12.700`)
|
||||||
- [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2025-01-30T20:15:31.857`)
|
- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-01-30T22:15:08.410`)
|
||||||
- [CVE-2023-31486](CVE-2023/CVE-2023-314xx/CVE-2023-31486.json) (`2025-01-30T20:15:32.297`)
|
- [CVE-2024-13269](CVE-2024/CVE-2024-132xx/CVE-2024-13269.json) (`2025-01-30T22:15:08.550`)
|
||||||
- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2025-01-30T19:52:10.193`)
|
- [CVE-2024-13308](CVE-2024/CVE-2024-133xx/CVE-2024-13308.json) (`2025-01-30T22:15:08.723`)
|
||||||
- [CVE-2024-4697](CVE-2024/CVE-2024-46xx/CVE-2024-4697.json) (`2025-01-30T19:43:10.207`)
|
- [CVE-2024-13309](CVE-2024/CVE-2024-133xx/CVE-2024-13309.json) (`2025-01-30T22:15:08.880`)
|
||||||
- [CVE-2025-24113](CVE-2025/CVE-2025-241xx/CVE-2025-24113.json) (`2025-01-30T19:10:53.077`)
|
- [CVE-2024-1488](CVE-2024/CVE-2024-14xx/CVE-2024-1488.json) (`2025-01-30T22:15:09.037`)
|
||||||
|
- [CVE-2024-54156](CVE-2024/CVE-2024-541xx/CVE-2024-54156.json) (`2025-01-30T21:46:25.813`)
|
||||||
|
- [CVE-2024-54157](CVE-2024/CVE-2024-541xx/CVE-2024-54157.json) (`2025-01-30T21:47:10.683`)
|
||||||
|
- [CVE-2024-54158](CVE-2024/CVE-2024-541xx/CVE-2024-54158.json) (`2025-01-30T21:50:32.770`)
|
||||||
|
- [CVE-2024-57276](CVE-2024/CVE-2024-572xx/CVE-2024-57276.json) (`2025-01-30T22:15:09.297`)
|
||||||
|
- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-01-30T22:15:09.700`)
|
||||||
|
- [CVE-2025-24099](CVE-2025/CVE-2025-240xx/CVE-2025-24099.json) (`2025-01-30T22:15:10.160`)
|
||||||
|
- [CVE-2025-24456](CVE-2025/CVE-2025-244xx/CVE-2025-24456.json) (`2025-01-30T21:28:52.003`)
|
||||||
|
- [CVE-2025-24457](CVE-2025/CVE-2025-244xx/CVE-2025-24457.json) (`2025-01-30T21:31:24.150`)
|
||||||
|
- [CVE-2025-24458](CVE-2025/CVE-2025-244xx/CVE-2025-24458.json) (`2025-01-30T21:35:05.127`)
|
||||||
|
- [CVE-2025-24459](CVE-2025/CVE-2025-244xx/CVE-2025-24459.json) (`2025-01-30T21:22:22.917`)
|
||||||
|
- [CVE-2025-24460](CVE-2025/CVE-2025-244xx/CVE-2025-24460.json) (`2025-01-30T21:25:18.337`)
|
||||||
|
- [CVE-2025-24461](CVE-2025/CVE-2025-244xx/CVE-2025-24461.json) (`2025-01-30T21:26:17.583`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
149
_state.csv
149
_state.csv
@ -207471,7 +207471,7 @@ CVE-2022-41397,0,0,e550e999db9fb97f17a47593dc51cf6c030770f72f449972298740d3093e2
|
|||||||
CVE-2022-41398,0,0,c17218acd420ff655b26811137f78a5661b0edf354c55ad9ff3d225542cc956e,2024-11-21T07:23:09.297000
|
CVE-2022-41398,0,0,c17218acd420ff655b26811137f78a5661b0edf354c55ad9ff3d225542cc956e,2024-11-21T07:23:09.297000
|
||||||
CVE-2022-41399,0,0,fcc852656cb71fcabc26dc07cae79fcdb4063aa98e94541d9d75741dded7cecf,2024-11-21T07:23:09.440000
|
CVE-2022-41399,0,0,fcc852656cb71fcabc26dc07cae79fcdb4063aa98e94541d9d75741dded7cecf,2024-11-21T07:23:09.440000
|
||||||
CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000
|
CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000
|
||||||
CVE-2022-41400,0,0,e66ae562bf6f123d22a26c5862571d1ba6606e3e2d4692e9c9e43aca10aacfc8,2024-11-21T07:23:09.593000
|
CVE-2022-41400,0,1,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000
|
||||||
CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000
|
CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000
|
||||||
CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000
|
CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000
|
||||||
CVE-2022-41404,0,0,a5cb6dc1041f1669e9e1adb6dd7a90b0e9e235a9fc2ddaa84ffd2c30379279a5,2024-11-21T07:23:10.010000
|
CVE-2022-41404,0,0,a5cb6dc1041f1669e9e1adb6dd7a90b0e9e235a9fc2ddaa84ffd2c30379279a5,2024-11-21T07:23:10.010000
|
||||||
@ -214619,7 +214619,7 @@ CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33
|
|||||||
CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000
|
CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000
|
||||||
CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000
|
CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000
|
||||||
CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000
|
CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000
|
||||||
CVE-2023-1526,0,1,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000
|
CVE-2023-1526,0,0,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000
|
||||||
CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000
|
CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000
|
||||||
CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000
|
CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000
|
||||||
CVE-2023-1529,0,0,2487285e765808b0f7ba1f72e36427b931583b7d2d6f3e08e8c267fcf3f4be2a,2024-11-21T07:39:22.407000
|
CVE-2023-1529,0,0,2487285e765808b0f7ba1f72e36427b931583b7d2d6f3e08e8c267fcf3f4be2a,2024-11-21T07:39:22.407000
|
||||||
@ -218701,7 +218701,7 @@ CVE-2023-24256,0,0,ab94b83dee58fd204888899d968128cc2e8cfb1fe9d90e9913108287ee7d6
|
|||||||
CVE-2023-24258,0,0,c560e94249e7effb2fba83ba9a90735af30e031ae8bca37a27f2e5c6457522ef,2024-11-21T07:47:38.410000
|
CVE-2023-24258,0,0,c560e94249e7effb2fba83ba9a90735af30e031ae8bca37a27f2e5c6457522ef,2024-11-21T07:47:38.410000
|
||||||
CVE-2023-2426,0,0,ef02528cf3f86e2dade0f21ec20e5bc5ef91f7d9f0dafb0b0a6d4993b908e464,2024-11-21T07:58:35.860000
|
CVE-2023-2426,0,0,ef02528cf3f86e2dade0f21ec20e5bc5ef91f7d9f0dafb0b0a6d4993b908e464,2024-11-21T07:58:35.860000
|
||||||
CVE-2023-24261,0,0,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000
|
CVE-2023-24261,0,0,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000
|
||||||
CVE-2023-24269,0,0,f48af64cfd982b88f7a378571f946d21d8722e142349c9b7ae16fcb1b805aa2e,2024-11-21T07:47:38.710000
|
CVE-2023-24269,0,1,cad8a6e2e2ae03275129640ff93a4a599628066511c1c528afaca1d9bef90fe9,2025-01-30T21:15:09.913000
|
||||||
CVE-2023-2427,0,0,cc7634109d3dc8efda5374a98b8468e9436866ef3fb52d0740fea4b0f208142c,2024-11-21T07:58:35.980000
|
CVE-2023-2427,0,0,cc7634109d3dc8efda5374a98b8468e9436866ef3fb52d0740fea4b0f208142c,2024-11-21T07:58:35.980000
|
||||||
CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd1418543cb,2024-11-21T07:47:38.850000
|
CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd1418543cb,2024-11-21T07:47:38.850000
|
||||||
CVE-2023-24278,0,0,ea2aba4c7ef6892eaabe0ca8ca8a379b85908d877edfb3c6028c5a568eb0a3f0,2024-11-21T07:47:38.993000
|
CVE-2023-24278,0,0,ea2aba4c7ef6892eaabe0ca8ca8a379b85908d877edfb3c6028c5a568eb0a3f0,2024-11-21T07:47:38.993000
|
||||||
@ -221660,9 +221660,9 @@ CVE-2023-27968,0,0,d4ae6b7569d5b9f939ef1dc58eac523afec32ff9892f263680ad6667e5edd
|
|||||||
CVE-2023-27969,0,0,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000
|
CVE-2023-27969,0,0,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000
|
||||||
CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000
|
CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000
|
||||||
CVE-2023-27970,0,0,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000
|
CVE-2023-27970,0,0,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000
|
||||||
CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000
|
CVE-2023-27971,0,1,f3547f8f1fc06fdd31c84236d22098a7b906bb7ffd0e1b4e6ad04ca2e328e5d7,2025-01-30T21:15:10.260000
|
||||||
CVE-2023-27972,0,1,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000
|
CVE-2023-27972,0,0,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000
|
||||||
CVE-2023-27973,0,1,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000
|
CVE-2023-27973,0,0,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000
|
||||||
CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000
|
CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000
|
||||||
CVE-2023-27975,0,0,cad6a6a46caf1f602a761162c88f04c91eb374d47dcef656f5e96ae11a1132f6,2024-12-11T19:33:27.327000
|
CVE-2023-27975,0,0,cad6a6a46caf1f602a761162c88f04c91eb374d47dcef656f5e96ae11a1132f6,2024-12-11T19:33:27.327000
|
||||||
CVE-2023-27976,0,0,c9e7b6414182280b5321204dda9a565d1b11b5480c1526060214744a17382832,2024-11-21T07:53:51.340000
|
CVE-2023-27976,0,0,c9e7b6414182280b5321204dda9a565d1b11b5480c1526060214744a17382832,2024-11-21T07:53:51.340000
|
||||||
@ -222504,7 +222504,7 @@ CVE-2023-28818,0,0,79d36f0c7cbe3e9da98253142830e529bc5af2bf12294a4aeadb32b61c200
|
|||||||
CVE-2023-28819,0,0,bf58c4e71ab50881bb2ffbc84d1c7fa3a8784d89494821093a5ed0aaa8ee47b9,2024-11-21T07:56:04.597000
|
CVE-2023-28819,0,0,bf58c4e71ab50881bb2ffbc84d1c7fa3a8784d89494821093a5ed0aaa8ee47b9,2024-11-21T07:56:04.597000
|
||||||
CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b80700,2024-11-21T07:59:29.350000
|
CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b80700,2024-11-21T07:59:29.350000
|
||||||
CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000
|
CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000
|
||||||
CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000
|
CVE-2023-28821,0,1,afa76c8a009539aae0198682bc90e862e42f3a76d4259436095052fa1a40e0cc,2025-01-30T21:15:10.470000
|
||||||
CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000
|
CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000
|
||||||
CVE-2023-28824,0,0,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000
|
CVE-2023-28824,0,0,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000
|
||||||
CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000
|
CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000
|
||||||
@ -222564,7 +222564,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c
|
|||||||
CVE-2023-28877,0,0,627be02d2c5299af68f11f8c96f6b7aada4171df85e2baa2b1f21f3a8ad679d4,2024-11-21T07:56:12.927000
|
CVE-2023-28877,0,0,627be02d2c5299af68f11f8c96f6b7aada4171df85e2baa2b1f21f3a8ad679d4,2024-11-21T07:56:12.927000
|
||||||
CVE-2023-28879,0,0,60cfcaff1525c3d961f9d460730fe7f9b4cdfbbd84fe1d0f2487d7d6fb6987b6,2024-11-21T07:56:13.057000
|
CVE-2023-28879,0,0,60cfcaff1525c3d961f9d460730fe7f9b4cdfbbd84fe1d0f2487d7d6fb6987b6,2024-11-21T07:56:13.057000
|
||||||
CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000
|
CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000
|
||||||
CVE-2023-28882,0,0,c5bdbfa5e7447d196129d5a1545ef5d61fea128b86b10c66c438ea6977ab503d,2024-11-21T07:56:13.220000
|
CVE-2023-28882,0,1,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000
|
||||||
CVE-2023-28883,0,0,13fb4d539b10aabd1da3181f43ed36ef1e089eb05afaff3d3ea2e3bab420b8e6,2024-11-21T07:56:13.360000
|
CVE-2023-28883,0,0,13fb4d539b10aabd1da3181f43ed36ef1e089eb05afaff3d3ea2e3bab420b8e6,2024-11-21T07:56:13.360000
|
||||||
CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000
|
CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000
|
||||||
CVE-2023-28885,0,0,1bfa45a7cd263e2b756f199a2cb3130bf8cccc6aef28faf9f20192196ba060d3,2024-11-21T07:56:13.647000
|
CVE-2023-28885,0,0,1bfa45a7cd263e2b756f199a2cb3130bf8cccc6aef28faf9f20192196ba060d3,2024-11-21T07:56:13.647000
|
||||||
@ -222881,7 +222881,7 @@ CVE-2023-2926,0,0,e170779cbdb918f6b82fda64b55ac82af1d75547be3a52cc9653ae8c1e1011
|
|||||||
CVE-2023-29260,0,0,5408599e6cd86b2024a7083620ca9e1157b82ab64940c6b91e6344545ff43157,2024-11-21T07:56:46.190000
|
CVE-2023-29260,0,0,5408599e6cd86b2024a7083620ca9e1157b82ab64940c6b91e6344545ff43157,2024-11-21T07:56:46.190000
|
||||||
CVE-2023-29261,0,0,000cb61df9c131f78dc46594dae178995161d7f97bedafeb6092b59e914e453a,2024-11-21T07:56:46.300000
|
CVE-2023-29261,0,0,000cb61df9c131f78dc46594dae178995161d7f97bedafeb6092b59e914e453a,2024-11-21T07:56:46.300000
|
||||||
CVE-2023-29267,0,0,f1d5e4709b78cdc02762d88ffdde6af1b8b3c8f402c90acb9448493f3d4a9426,2024-11-21T07:56:46.417000
|
CVE-2023-29267,0,0,f1d5e4709b78cdc02762d88ffdde6af1b8b3c8f402c90acb9448493f3d4a9426,2024-11-21T07:56:46.417000
|
||||||
CVE-2023-29268,0,0,1fefceb330f7b63e4a39a102ebde4873626aa6b341fa88e9a8393e3f0ed1912f,2024-11-21T07:56:46.553000
|
CVE-2023-29268,0,1,a7d326511142a04650060778e408b03f298f713386898c6fb0b233b9b2dafebf,2025-01-30T22:15:07.977000
|
||||||
CVE-2023-2927,0,0,f90bf785db0896781f165401b7930a7505d713ae2a675c0fc18800b00f36de39,2024-11-21T07:59:34.940000
|
CVE-2023-2927,0,0,f90bf785db0896781f165401b7930a7505d713ae2a675c0fc18800b00f36de39,2024-11-21T07:59:34.940000
|
||||||
CVE-2023-29273,0,0,3500ec904dda178d9f2b96c75ba1aa9e15356cce2d5939ccbde1d811b000d8b0,2024-11-21T07:56:46.677000
|
CVE-2023-29273,0,0,3500ec904dda178d9f2b96c75ba1aa9e15356cce2d5939ccbde1d811b000d8b0,2024-11-21T07:56:46.677000
|
||||||
CVE-2023-29274,0,0,674c4f2006d12755378e1ad4454840e82cbf88b3d7ac122ced0d5e22dc37afad,2024-11-21T07:56:46.780000
|
CVE-2023-29274,0,0,674c4f2006d12755378e1ad4454840e82cbf88b3d7ac122ced0d5e22dc37afad,2024-11-21T07:56:46.780000
|
||||||
@ -223203,18 +223203,18 @@ CVE-2023-29635,0,0,7b7e122f0d8c9b413f472665250e3516b44a5ecfd295ecf840be5aaed663e
|
|||||||
CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000
|
CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000
|
||||||
CVE-2023-29637,0,0,c1e444d3c369fd37ce81c4fe1917992d80cada9fcd11c4f6d20198373be12d0c,2025-01-30T17:15:14.483000
|
CVE-2023-29637,0,0,c1e444d3c369fd37ce81c4fe1917992d80cada9fcd11c4f6d20198373be12d0c,2025-01-30T17:15:14.483000
|
||||||
CVE-2023-29638,0,0,e50ce1c402f4f8b6e90b82f00d1b01d2f40bb391b5df29154b81d06ca1e488d3,2025-01-30T17:15:14.640000
|
CVE-2023-29638,0,0,e50ce1c402f4f8b6e90b82f00d1b01d2f40bb391b5df29154b81d06ca1e488d3,2025-01-30T17:15:14.640000
|
||||||
CVE-2023-29639,0,1,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000
|
CVE-2023-29639,0,0,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000
|
||||||
CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b2f,2024-11-21T07:59:39.620000
|
CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b2f,2024-11-21T07:59:39.620000
|
||||||
CVE-2023-29641,0,1,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000
|
CVE-2023-29641,0,0,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000
|
||||||
CVE-2023-29643,0,1,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000
|
CVE-2023-29643,0,0,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000
|
||||||
CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000
|
CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000
|
||||||
CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000
|
CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000
|
||||||
CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000
|
CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000
|
||||||
CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000
|
CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000
|
||||||
CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000
|
CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000
|
||||||
CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000
|
CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000
|
||||||
CVE-2023-29680,0,1,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000
|
CVE-2023-29680,0,0,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000
|
||||||
CVE-2023-29681,0,1,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000
|
CVE-2023-29681,0,0,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000
|
||||||
CVE-2023-29689,0,0,962e47d4421172abd4f6a1330537e1d28be98a1502580c517300e3c2b2ee7d61,2024-11-21T07:57:23.383000
|
CVE-2023-29689,0,0,962e47d4421172abd4f6a1330537e1d28be98a1502580c517300e3c2b2ee7d61,2024-11-21T07:57:23.383000
|
||||||
CVE-2023-29693,0,0,709f39f2818705690323691653131c15063e3d7ec3771ad2324a6717c9d9590f,2025-01-29T19:15:16.267000
|
CVE-2023-29693,0,0,709f39f2818705690323691653131c15063e3d7ec3771ad2324a6717c9d9590f,2025-01-29T19:15:16.267000
|
||||||
CVE-2023-29696,0,0,eca44308ce4c869f65e5e1aa1a665534ee73c24004fe10991f0dfa64898fe4e0,2025-01-29T19:15:16.473000
|
CVE-2023-29696,0,0,eca44308ce4c869f65e5e1aa1a665534ee73c24004fe10991f0dfa64898fe4e0,2025-01-29T19:15:16.473000
|
||||||
@ -223293,7 +223293,7 @@ CVE-2023-29805,0,0,eab8f6c7a340db7effd1da4e68fd842071ac192aa93dc09c9185af7e7d598
|
|||||||
CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000
|
CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000
|
||||||
CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000
|
CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000
|
||||||
CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000
|
CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000
|
||||||
CVE-2023-29815,0,0,b2eae5a9d28b68d854f53e61f1466bb75eb7be05b1159364fb38e6c41e10819f,2024-11-21T07:57:32.690000
|
CVE-2023-29815,0,1,54dad311a1ec1a264294e3060385a6f5077ffc3a2954ca147f88d5436f80b641,2025-01-30T21:15:10.877000
|
||||||
CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000
|
CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000
|
||||||
CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000
|
CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000
|
||||||
CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000
|
CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000
|
||||||
@ -223434,7 +223434,7 @@ CVE-2023-30111,0,0,ae639ee4dbb45cc529dd569295ef6283beb3098da5dab82c355bdd3331498
|
|||||||
CVE-2023-30112,0,0,eb88d49610e14bb452be0cdc8abb09b062387d49578867ecc9f658123761c3a4,2024-11-21T07:59:48.637000
|
CVE-2023-30112,0,0,eb88d49610e14bb452be0cdc8abb09b062387d49578867ecc9f658123761c3a4,2024-11-21T07:59:48.637000
|
||||||
CVE-2023-3012,0,0,9b668710106159ca738a322b3cf3ca60bc39f1660572ac1a75fa4a3a7a6c2b75,2024-11-21T08:16:14.317000
|
CVE-2023-3012,0,0,9b668710106159ca738a322b3cf3ca60bc39f1660572ac1a75fa4a3a7a6c2b75,2024-11-21T08:16:14.317000
|
||||||
CVE-2023-30122,0,0,cf1197ad825b0483d6b8203bdfaf9c646b0bc2395f7c3bbd304572d272957e5e,2025-01-29T17:15:24.350000
|
CVE-2023-30122,0,0,cf1197ad825b0483d6b8203bdfaf9c646b0bc2395f7c3bbd304572d272957e5e,2025-01-29T17:15:24.350000
|
||||||
CVE-2023-30123,0,1,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000
|
CVE-2023-30123,0,0,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000
|
||||||
CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000
|
CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000
|
||||||
CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000
|
CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000
|
||||||
CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000
|
CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000
|
||||||
@ -223477,8 +223477,8 @@ CVE-2023-30199,0,0,f29f761dc02750e028aca8343aa3ac92342336f18e6c3f4c4724ff2bb8be3
|
|||||||
CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000
|
CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000
|
||||||
CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000
|
CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000
|
||||||
CVE-2023-30203,0,0,db5e5cb3e727c16ca621fa367686a24b4a325fdb3b5ae291e095fa72773bca43,2025-01-29T21:15:19.083000
|
CVE-2023-30203,0,0,db5e5cb3e727c16ca621fa367686a24b4a325fdb3b5ae291e095fa72773bca43,2025-01-29T21:15:19.083000
|
||||||
CVE-2023-30204,0,0,84b81496405155a1e4b270d2b3945fb8f6cff24839d57d0372100bc234eda985,2024-11-21T07:59:54.240000
|
CVE-2023-30204,0,1,d5ffcadcb8d15bfedbfb38f6fe262b7f90dac86d61a95305b0ddef65b3dbaa6f,2025-01-30T21:15:11.507000
|
||||||
CVE-2023-30205,0,0,94411d8885974287d109e5df893a6ff626175a36b0253832b634b59018d3dbe4,2024-11-21T07:59:54.377000
|
CVE-2023-30205,0,1,614d6f5b15d2f822c49fe7e35216e74c845bf51fc1f6080fd96b781b69d54905,2025-01-30T21:15:11.693000
|
||||||
CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000
|
CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000
|
||||||
CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000
|
CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000
|
||||||
CVE-2023-30210,0,0,6c1b077c53cde49a468f6661ba3c7e006d0afd4e39b08c3e1f95f6a495153e87,2024-11-21T07:59:54.673000
|
CVE-2023-30210,0,0,6c1b077c53cde49a468f6661ba3c7e006d0afd4e39b08c3e1f95f6a495153e87,2024-11-21T07:59:54.673000
|
||||||
@ -223521,7 +223521,7 @@ CVE-2023-30282,0,0,6199bbb0fff6b877509d0886de3b68999859c9b5ce34636b44c7531255493
|
|||||||
CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000
|
CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000
|
||||||
CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000
|
CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000
|
||||||
CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000
|
CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000
|
||||||
CVE-2023-30300,0,0,e890e3ff6b42d2de8311bc8ad45d62bfa494e2f3577279edea119d2328c81f79,2024-11-21T07:59:59.290000
|
CVE-2023-30300,0,1,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593772,2025-01-30T21:15:11.870000
|
||||||
CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000
|
CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000
|
||||||
CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000
|
CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000
|
||||||
CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000
|
CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000
|
||||||
@ -223584,7 +223584,7 @@ CVE-2023-30400,0,0,12950301b15d2ff0df9404bed25a6b84a57d9a17ff834ac2eba356cba5785
|
|||||||
CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000
|
CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000
|
||||||
CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000
|
CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000
|
||||||
CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000
|
CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000
|
||||||
CVE-2023-30405,0,0,d308e1f015f226b1b626f7ff94eb00262640e4a5bad27494fff1cd9fe9039a81,2024-11-21T08:00:08.217000
|
CVE-2023-30405,0,1,f7e4fa427c57bcf1c9c6861612ffcad1ae14994e8d0a25ac5c7acb06b73af467,2025-01-30T21:15:12.067000
|
||||||
CVE-2023-30406,0,0,fa9afd5bd076e3e8831acab2919a774ba44387bc923f37b2837294e8b8e09705,2024-11-21T08:00:08.373000
|
CVE-2023-30406,0,0,fa9afd5bd076e3e8831acab2919a774ba44387bc923f37b2837294e8b8e09705,2024-11-21T08:00:08.373000
|
||||||
CVE-2023-30408,0,0,9c809e244a2ceda8f32503a1ce049bf7b134ed789f943a21ba335089c084de1f,2024-11-21T08:00:08.533000
|
CVE-2023-30408,0,0,9c809e244a2ceda8f32503a1ce049bf7b134ed789f943a21ba335089c084de1f,2024-11-21T08:00:08.533000
|
||||||
CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000
|
CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000
|
||||||
@ -223620,8 +223620,8 @@ CVE-2023-30450,0,0,e8abf2288be578f9aba31e86a7a71291da0ebac6855ef6c8dd30603a62411
|
|||||||
CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000
|
CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000
|
||||||
CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000
|
CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000
|
||||||
CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000
|
CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000
|
||||||
CVE-2023-30454,0,0,c6fadb94020df9aaf92dc893b8ce24b95889eb58aec92ff2ca0bcf4372297d2d,2024-11-21T08:00:13.123000
|
CVE-2023-30454,0,1,3fafbb3121fab4c133d0302016abe464ea1509fe7e4e59f512a22beb3dc1babd,2025-01-30T21:15:12.300000
|
||||||
CVE-2023-30455,0,0,67590854388925a6ee11408360c4660ec765b5d5fb3440442ef818dd0e0bb85d,2024-11-21T08:00:13.273000
|
CVE-2023-30455,0,1,bb2ed26b995f4c7e22c1b6b92d8ddb92da99a13a854f4762cea43640b004fd91,2025-01-30T21:15:12.490000
|
||||||
CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87cb4,2024-11-21T08:00:13.423000
|
CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87cb4,2024-11-21T08:00:13.423000
|
||||||
CVE-2023-30458,0,0,09555f36350c1c2d55bf95b2d5ae168b57fbc294feac451796d2b438bf429edb,2024-11-21T08:00:13.580000
|
CVE-2023-30458,0,0,09555f36350c1c2d55bf95b2d5ae168b57fbc294feac451796d2b438bf429edb,2024-11-21T08:00:13.580000
|
||||||
CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000
|
CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000
|
||||||
@ -224375,7 +224375,7 @@ CVE-2023-31286,0,0,78567364971f63d5dc94c49ad0a4cb4faacaab1686439f1a823e21f28b851
|
|||||||
CVE-2023-31287,0,0,3a03f62439a882d85b9a72ca261c059079bfd17741e815c49d4465abc1960857,2024-11-21T08:01:43.890000
|
CVE-2023-31287,0,0,3a03f62439a882d85b9a72ca261c059079bfd17741e815c49d4465abc1960857,2024-11-21T08:01:43.890000
|
||||||
CVE-2023-31289,0,0,b5289b010564c962b69e25a674ef9122b77cd431f84040e8589168ff372131e4,2024-11-21T08:01:44.020000
|
CVE-2023-31289,0,0,b5289b010564c962b69e25a674ef9122b77cd431f84040e8589168ff372131e4,2024-11-21T08:01:44.020000
|
||||||
CVE-2023-3129,0,0,d664dde9f63c31c193279cc3e3c97a69882c532883740cc20c888b8e54853ef5,2024-11-21T08:16:31.393000
|
CVE-2023-3129,0,0,d664dde9f63c31c193279cc3e3c97a69882c532883740cc20c888b8e54853ef5,2024-11-21T08:16:31.393000
|
||||||
CVE-2023-31290,0,0,cffcf74ec2fdf8c5b7fa9cc68f3500d69bea2adaf30ff3e096343990ee34cd3d,2024-11-21T08:01:44.153000
|
CVE-2023-31290,0,1,54d0c58d31ebc2dfa3a1bae530350c0c41097e12539308fff3fde2e94b846481,2025-01-30T21:15:12.700000
|
||||||
CVE-2023-31292,0,0,1d2a6f0e823d77efda2534865fa074b4a97ddd71fe364113839cf71749e04d69,2024-11-21T08:01:44.307000
|
CVE-2023-31292,0,0,1d2a6f0e823d77efda2534865fa074b4a97ddd71fe364113839cf71749e04d69,2024-11-21T08:01:44.307000
|
||||||
CVE-2023-31293,0,0,069c09646788d69fb7802dd78607017cdd7ec1d48e58ef379945478c23567200,2024-11-21T08:01:44.443000
|
CVE-2023-31293,0,0,069c09646788d69fb7802dd78607017cdd7ec1d48e58ef379945478c23567200,2024-11-21T08:01:44.443000
|
||||||
CVE-2023-31294,0,0,6ba11e240ce7af8f8728e2ecc2c891acf96c500b00abbf0921cb215dfb990c90,2024-11-21T08:01:44.580000
|
CVE-2023-31294,0,0,6ba11e240ce7af8f8728e2ecc2c891acf96c500b00abbf0921cb215dfb990c90,2024-11-21T08:01:44.580000
|
||||||
@ -224492,7 +224492,7 @@ CVE-2023-3148,0,0,9236ef71fc0458d505ab03b01d49be5b44ba8909a5ef5119004368313b8abe
|
|||||||
CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000
|
CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000
|
||||||
CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000
|
CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000
|
||||||
CVE-2023-31485,0,0,d8b205f112088ed074b7d15996adcda6d085f8c031d20bf59e2e472a4c3a13c5,2024-11-21T08:01:57.940000
|
CVE-2023-31485,0,0,d8b205f112088ed074b7d15996adcda6d085f8c031d20bf59e2e472a4c3a13c5,2024-11-21T08:01:57.940000
|
||||||
CVE-2023-31486,0,1,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000
|
CVE-2023-31486,0,0,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000
|
||||||
CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000
|
CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000
|
||||||
CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000
|
CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000
|
||||||
CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000
|
CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000
|
||||||
@ -243388,7 +243388,7 @@ CVE-2024-10022,0,0,ab83f849a016205a813821491cb51c85544a67e413305379de2e1bfd4a31c
|
|||||||
CVE-2024-10023,0,0,5b8d8edf9a844b7972623fe44d4aea076d5b42f40a729205390dae97ed207470,2024-10-21T13:14:37.300000
|
CVE-2024-10023,0,0,5b8d8edf9a844b7972623fe44d4aea076d5b42f40a729205390dae97ed207470,2024-10-21T13:14:37.300000
|
||||||
CVE-2024-10024,0,0,a2e50c196836e2a02faf1b4faaee4d9b40ca67c3c882116658a7e4828f4ee1ee,2024-10-21T13:15:01.730000
|
CVE-2024-10024,0,0,a2e50c196836e2a02faf1b4faaee4d9b40ca67c3c882116658a7e4828f4ee1ee,2024-10-21T13:15:01.730000
|
||||||
CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349ce8,2024-10-18T12:52:33.507000
|
CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349ce8,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-10026,1,1,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000
|
CVE-2024-10026,0,0,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000
|
||||||
CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000
|
CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000
|
CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000
|
||||||
CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000
|
CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000
|
||||||
@ -243879,8 +243879,8 @@ CVE-2024-1060,0,0,30e8ae85c484341766ca7dee2c575cc98f2671a1165107d5d27a56d9672b13
|
|||||||
CVE-2024-10600,0,0,1588f7b76a375177b6b8778e578d8222171a047be7e445b41697af92165f60b0,2024-11-04T19:45:26.723000
|
CVE-2024-10600,0,0,1588f7b76a375177b6b8778e578d8222171a047be7e445b41697af92165f60b0,2024-11-04T19:45:26.723000
|
||||||
CVE-2024-10601,0,0,2969748da0f7cf7d0d9603a0488fb632296f873a3a0b7ab6085037cc5349f21c,2024-11-04T19:45:45.603000
|
CVE-2024-10601,0,0,2969748da0f7cf7d0d9603a0488fb632296f873a3a0b7ab6085037cc5349f21c,2024-11-04T19:45:45.603000
|
||||||
CVE-2024-10602,0,0,c915109d93366e27d5d2725dd7110022f25bb25a357ea875612a439aa00aa3b1,2024-11-04T19:46:22.830000
|
CVE-2024-10602,0,0,c915109d93366e27d5d2725dd7110022f25bb25a357ea875612a439aa00aa3b1,2024-11-04T19:46:22.830000
|
||||||
CVE-2024-10603,1,1,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000
|
CVE-2024-10603,0,0,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000
|
||||||
CVE-2024-10604,1,1,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000
|
CVE-2024-10604,0,0,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000
|
||||||
CVE-2024-10605,0,0,9c4d2b3f5c9573445354fad5cf617a36da10f12735dc4eac88cc4ea22a030d7b,2024-11-05T16:22:08.017000
|
CVE-2024-10605,0,0,9c4d2b3f5c9573445354fad5cf617a36da10f12735dc4eac88cc4ea22a030d7b,2024-11-05T16:22:08.017000
|
||||||
CVE-2024-10606,0,0,6b8aa1c124a8bd07d97b00841d43181d26fed96fe4b97b24267bdccee0185633,2024-11-23T05:15:05.223000
|
CVE-2024-10606,0,0,6b8aa1c124a8bd07d97b00841d43181d26fed96fe4b97b24267bdccee0185633,2024-11-23T05:15:05.223000
|
||||||
CVE-2024-10607,0,0,250026f787272e38f4463c472ef3fa91de5074ff5ae4f5010bbfc430ceadc741,2024-11-05T16:21:46.193000
|
CVE-2024-10607,0,0,250026f787272e38f4463c472ef3fa91de5074ff5ae4f5010bbfc430ceadc741,2024-11-05T16:21:46.193000
|
||||||
@ -244767,7 +244767,10 @@ CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d
|
|||||||
CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000
|
CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000
|
||||||
CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000
|
CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000
|
||||||
CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000
|
CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000
|
||||||
|
CVE-2024-11609,1,1,54c05120181bbe5d026c1e91c4165767bdcaedcf5abe5cce3aa41c3ff6aeacdd,2025-01-30T21:15:13.163000
|
||||||
CVE-2024-1161,0,0,59404f907ebea7b8dd839befaa6ff35913219617a7e1db7c77652ef34247d4c1,2025-01-16T15:08:00.773000
|
CVE-2024-1161,0,0,59404f907ebea7b8dd839befaa6ff35913219617a7e1db7c77652ef34247d4c1,2025-01-16T15:08:00.773000
|
||||||
|
CVE-2024-11610,1,1,c802b71d58309a60621c4ba5c15f67dfafda5bd5bf39db94219018744e2dbed1,2025-01-30T21:15:13.303000
|
||||||
|
CVE-2024-11611,1,1,b1272e810d8d420c6fae20c5fe47ecc25db508a92cd4fb3a203c9d8933606621,2025-01-30T21:15:13.450000
|
||||||
CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000
|
CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000
|
||||||
CVE-2024-11613,0,0,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000
|
CVE-2024-11613,0,0,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000
|
||||||
CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000
|
CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000
|
||||||
@ -245196,7 +245199,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
|
|||||||
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
||||||
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
|
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
|
||||||
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
|
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
|
||||||
CVE-2024-12085,0,0,a0d98fb431979f376125472a60db274f19d60a6b64ff4ab0286409d32e7ba632,2025-01-30T17:15:17.527000
|
CVE-2024-12085,0,1,788c3ec9423047f08ea5b66503ee10816232f6b232d17e66884fde630208fb19,2025-01-30T22:15:08.410000
|
||||||
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
|
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
|
||||||
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
|
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
|
||||||
CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000
|
CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000
|
||||||
@ -245332,7 +245335,7 @@ CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d
|
|||||||
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
|
||||||
CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000
|
CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000
|
||||||
CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000
|
CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000
|
||||||
CVE-2024-12248,1,1,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000
|
CVE-2024-12248,0,0,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000
|
||||||
CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000
|
CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000
|
||||||
CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000
|
CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000
|
||||||
CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000
|
CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000
|
||||||
@ -246139,7 +246142,7 @@ CVE-2024-13265,0,0,b50153d1795e3b59befc7c1df0d2d6441a951e42ef1ce3b27ccdff78e9e67
|
|||||||
CVE-2024-13266,0,0,ae9ed5d6d4efb501aacb0e2cf1c7295f9e10ccdad8130d6b12c89c95eed905c0,2025-01-14T17:15:14.753000
|
CVE-2024-13266,0,0,ae9ed5d6d4efb501aacb0e2cf1c7295f9e10ccdad8130d6b12c89c95eed905c0,2025-01-14T17:15:14.753000
|
||||||
CVE-2024-13267,0,0,15108bd27c21eab0c2a7ce0b2e4a90abbe641b3902c75a0df20fec2e532b85e3,2025-01-14T17:15:14.903000
|
CVE-2024-13267,0,0,15108bd27c21eab0c2a7ce0b2e4a90abbe641b3902c75a0df20fec2e532b85e3,2025-01-14T17:15:14.903000
|
||||||
CVE-2024-13268,0,0,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000
|
CVE-2024-13268,0,0,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000
|
||||||
CVE-2024-13269,0,0,15b723abdab3cac8f057c2a93357bfc122f6550e17e83fbff1dade6d5652d0de,2025-01-09T20:15:35.687000
|
CVE-2024-13269,0,1,a0c61ccab76d132efe513a5a4a456b1965f80d3971b03da92de2924fedeeb544,2025-01-30T22:15:08.550000
|
||||||
CVE-2024-1327,0,0,33c0adc6d164d2527ed98cdbc1917c4fbc66104aec7ae664b0eb02e15371b5a7,2025-01-15T18:08:20.797000
|
CVE-2024-1327,0,0,33c0adc6d164d2527ed98cdbc1917c4fbc66104aec7ae664b0eb02e15371b5a7,2025-01-15T18:08:20.797000
|
||||||
CVE-2024-13270,0,0,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000
|
CVE-2024-13270,0,0,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000
|
||||||
CVE-2024-13271,0,0,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000
|
CVE-2024-13271,0,0,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000
|
||||||
@ -246180,8 +246183,8 @@ CVE-2024-13302,0,0,c2e2f829e272ce3710b30cde276e1b51b430dd27cc63cc0d3e8565746bc82
|
|||||||
CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000
|
CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000
|
||||||
CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000
|
CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000
|
||||||
CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000
|
CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000
|
||||||
CVE-2024-13308,0,0,628dfc7afada6f39009e3075b904110e0898bfe72715ceaf39a1a966cfc45777,2025-01-09T21:15:28.623000
|
CVE-2024-13308,0,1,5a7c5de49dea6dce6146be04ca3299c64c19e3ab1de1461d50a35b802bb7ee20,2025-01-30T22:15:08.723000
|
||||||
CVE-2024-13309,0,0,7804e59975687c811f41086ccb055124503b48f1f5cb86a86be5d217498799ec,2025-01-09T21:15:28.740000
|
CVE-2024-13309,0,1,0b3b8b334a1de7768f2a2e87180e2cff3c33f0ede7bad89f9b0bac93a7d10749,2025-01-30T22:15:08.880000
|
||||||
CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000
|
CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000
|
||||||
CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000
|
CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000
|
||||||
CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000
|
CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000
|
||||||
@ -246457,7 +246460,7 @@ CVE-2024-1484,0,0,9a32df126759987e5250b83dcafa91beffdf56c507b193272d399891f10765
|
|||||||
CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000
|
CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000
|
||||||
CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000
|
CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000
|
||||||
CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000
|
CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000
|
||||||
CVE-2024-1488,0,0,05fd1f5b51446658fa063dfafdb885da66cb82f65503a858653fb976e97b16a3,2025-01-24T06:15:26.913000
|
CVE-2024-1488,0,1,bdde88c2dae24117dcff9e354ec8b5114157ed5561cc258eab2815d179ac3088,2025-01-30T22:15:09.037000
|
||||||
CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000
|
CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000
|
||||||
CVE-2024-1491,0,0,f8c906d36296d24716d3f1699c8be966291b4ddbcb9b5f082cca20cf66fb517b,2024-11-21T08:50:41.773000
|
CVE-2024-1491,0,0,f8c906d36296d24716d3f1699c8be966291b4ddbcb9b5f082cca20cf66fb517b,2024-11-21T08:50:41.773000
|
||||||
CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7b2,2024-11-21T08:50:41.923000
|
CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7b2,2024-11-21T08:50:41.923000
|
||||||
@ -258836,7 +258839,7 @@ CVE-2024-3563,0,0,adbe59bd1d49de614b2ea4a992cfe827d7a619deaf1bf1464db4b2b89b108b
|
|||||||
CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000
|
CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000
|
||||||
CVE-2024-35631,0,0,b2bbd1735567440b9b14ad520f237690a3057c6ed397900c04e1d91f83019b5f,2024-11-21T09:20:32.397000
|
CVE-2024-35631,0,0,b2bbd1735567440b9b14ad520f237690a3057c6ed397900c04e1d91f83019b5f,2024-11-21T09:20:32.397000
|
||||||
CVE-2024-35632,0,0,8ac93b6b70685393e559dcc17c63c410cb875b3ae02f4c6fbe77b112a65c27ea,2024-11-21T09:20:32.550000
|
CVE-2024-35632,0,0,8ac93b6b70685393e559dcc17c63c410cb875b3ae02f4c6fbe77b112a65c27ea,2024-11-21T09:20:32.550000
|
||||||
CVE-2024-35633,0,1,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000
|
CVE-2024-35633,0,0,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000
|
||||||
CVE-2024-35634,0,0,25c1cdf095c30445149b468d7e95e6aed7e59b2a3eec6f8e0b3fe71e56cf4891,2024-11-21T09:20:32.793000
|
CVE-2024-35634,0,0,25c1cdf095c30445149b468d7e95e6aed7e59b2a3eec6f8e0b3fe71e56cf4891,2024-11-21T09:20:32.793000
|
||||||
CVE-2024-35635,0,0,2ac54f88aa487a3c53c8e85ca3b7adc88898cc1636e05afea4e762250a08503a,2024-11-21T09:20:32.940000
|
CVE-2024-35635,0,0,2ac54f88aa487a3c53c8e85ca3b7adc88898cc1636e05afea4e762250a08503a,2024-11-21T09:20:32.940000
|
||||||
CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615d5b,2024-11-21T09:20:33.070000
|
CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615d5b,2024-11-21T09:20:33.070000
|
||||||
@ -265531,7 +265534,7 @@ CVE-2024-44136,0,0,6f174c4211aefd4ed089ffc5069f9b8c0ec85bf908cf7d127360d8595626b
|
|||||||
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
||||||
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
|
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
|
||||||
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
||||||
CVE-2024-44142,1,1,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000
|
CVE-2024-44142,0,0,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000
|
||||||
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
|
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
|
||||||
CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000
|
CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000
|
||||||
CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000
|
CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000
|
||||||
@ -267256,7 +267259,7 @@ CVE-2024-46963,0,0,a859b9e5f6b3e0fb9a390e0ac1d69993a48f6c4330c0e3f29a577b8ffe400
|
|||||||
CVE-2024-46964,0,0,516d10df6478d71d107821ead9437fd7d5dc5eb20d9662b114242f44f50941fc,2024-11-12T16:35:19.933000
|
CVE-2024-46964,0,0,516d10df6478d71d107821ead9437fd7d5dc5eb20d9662b114242f44f50941fc,2024-11-12T16:35:19.933000
|
||||||
CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0df5,2024-11-12T17:35:09.427000
|
CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0df5,2024-11-12T17:35:09.427000
|
||||||
CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000
|
CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000
|
||||||
CVE-2024-4697,0,1,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000
|
CVE-2024-4697,0,0,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000
|
||||||
CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000
|
CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000
|
||||||
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
|
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
|
||||||
CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000
|
CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000
|
||||||
@ -272288,9 +272291,9 @@ CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9
|
|||||||
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
|
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
|
||||||
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
|
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
|
||||||
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
|
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
|
||||||
CVE-2024-54156,0,0,1521b1a0fd39f5583feeda1b5748dd8268c43a64aeaf9d7cd843e09343fde576,2024-12-04T12:15:20.340000
|
CVE-2024-54156,0,1,81c21f4d51f2ebbd7641443638ae29350bc0d803dc7655de8082c14d2dcfa440,2025-01-30T21:46:25.813000
|
||||||
CVE-2024-54157,0,0,7977a0376cc458678287d7bc0e3bd127d398f022dc92eb660ddab27ca55beca1,2024-12-04T12:15:20.473000
|
CVE-2024-54157,0,1,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e217ee,2025-01-30T21:47:10.683000
|
||||||
CVE-2024-54158,0,0,99ca6004d0064eb33285ff878f08d19b9a0bd1469f489ae6980279eee93eafce,2024-12-04T12:15:20.623000
|
CVE-2024-54158,0,1,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000
|
||||||
CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000
|
CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000
|
||||||
CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000
|
CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000
|
||||||
CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000
|
CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000
|
||||||
@ -273831,7 +273834,7 @@ CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050
|
|||||||
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
|
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
|
||||||
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
|
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
|
||||||
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
|
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
|
||||||
CVE-2024-57276,0,0,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000
|
CVE-2024-57276,0,1,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000
|
||||||
CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000
|
CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000
|
||||||
CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000
|
CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000
|
||||||
CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000
|
CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000
|
||||||
@ -277776,12 +277779,12 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743
|
|||||||
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
|
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
|
||||||
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
|
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
|
||||||
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
|
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
|
||||||
CVE-2025-0142,1,1,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000
|
CVE-2025-0142,0,0,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000
|
||||||
CVE-2025-0143,1,1,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000
|
CVE-2025-0143,0,0,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000
|
||||||
CVE-2025-0144,1,1,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000
|
CVE-2025-0144,0,0,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000
|
||||||
CVE-2025-0145,1,1,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000
|
CVE-2025-0145,0,0,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000
|
||||||
CVE-2025-0146,1,1,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000
|
CVE-2025-0146,0,0,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000
|
||||||
CVE-2025-0147,1,1,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000
|
CVE-2025-0147,0,0,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000
|
||||||
CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000
|
CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000
|
||||||
CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000
|
CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000
|
||||||
CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000
|
CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000
|
||||||
@ -277832,7 +277835,7 @@ CVE-2025-0237,0,0,726b9fd4a1cc35feeb251f210c4adbb8387d0cfa8a7807bfe531c06c5d5e23
|
|||||||
CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000
|
CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000
|
||||||
CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000
|
CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000
|
||||||
CVE-2025-0240,0,0,ef3a6d8c0e079e8738470ebcc85f8c6810fc9d47e51bebee036347d11413c427,2025-01-13T22:15:15.190000
|
CVE-2025-0240,0,0,ef3a6d8c0e079e8738470ebcc85f8c6810fc9d47e51bebee036347d11413c427,2025-01-13T22:15:15.190000
|
||||||
CVE-2025-0241,0,0,f609fcea9ea7559d4c69256019cabe3315eee4193ade298c5176418a8d1b2cf1,2025-01-13T22:15:15.330000
|
CVE-2025-0241,0,1,a0bdcf70fd4da55c1667c939c86352d55f81eaf4e4e33ce9139ad56bc1c71ee5,2025-01-30T22:15:09.700000
|
||||||
CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000
|
CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000
|
||||||
CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000
|
CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000
|
||||||
CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000
|
CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000
|
||||||
@ -277993,6 +277996,13 @@ CVE-2025-0564,0,0,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec95
|
|||||||
CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000
|
CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000
|
||||||
CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000
|
CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000
|
||||||
CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000
|
CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000
|
||||||
|
CVE-2025-0568,1,1,8d0a05c8043bee98423ba6864a9bab1dd2831ab16af703e3c47395d083efbcb6,2025-01-30T21:15:13.587000
|
||||||
|
CVE-2025-0569,1,1,6aa361cd183208e6f48d0af7ae70f952114c8b890907ec8fcbe80c72fbf6381b,2025-01-30T21:15:13.710000
|
||||||
|
CVE-2025-0570,1,1,2f71d7720e6c338ca428f1b0f16342bc64b3d89cdaf10a0ad12618a14f673407,2025-01-30T21:15:13.830000
|
||||||
|
CVE-2025-0571,1,1,5d206173b5fa262732ea2fca9cfca58cefc24b524f6ee30aeaf8ca6b0949fb5d,2025-01-30T21:15:13.960000
|
||||||
|
CVE-2025-0572,1,1,1e050d3dc3737c3f353cd212470d11d19d2ca27c2b96469c09a08960b37a5471,2025-01-30T21:15:14.093000
|
||||||
|
CVE-2025-0573,1,1,8b2b5adb09f895ff991fed750b57e2959c03ca9d9a490dc916c95f354740ed0f,2025-01-30T21:15:14.227000
|
||||||
|
CVE-2025-0574,1,1,ce0c94ad105196a95d4a85b805b59b4914ea27c1e277b12dda1daa397236726b,2025-01-30T21:15:14.357000
|
||||||
CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000
|
CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000
|
||||||
CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000
|
CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000
|
||||||
CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000
|
CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000
|
||||||
@ -278014,7 +278024,7 @@ CVE-2025-0617,0,0,85ac8b1513a28e4252ed84928ab0ab641a8952008a852587e89f1b03f01e6a
|
|||||||
CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000
|
CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000
|
||||||
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
||||||
CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000
|
CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000
|
||||||
CVE-2025-0626,1,1,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000
|
CVE-2025-0626,0,0,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000
|
||||||
CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000
|
CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000
|
||||||
CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000
|
CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000
|
||||||
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
|
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
|
||||||
@ -278024,10 +278034,10 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf
|
|||||||
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
|
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
|
||||||
CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
|
CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
|
||||||
CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000
|
CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000
|
||||||
CVE-2025-0680,1,1,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000
|
CVE-2025-0680,0,0,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000
|
||||||
CVE-2025-0681,1,1,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000
|
CVE-2025-0681,0,0,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000
|
||||||
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
|
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
|
||||||
CVE-2025-0683,1,1,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000
|
CVE-2025-0683,0,0,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000
|
||||||
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
|
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
|
||||||
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
|
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
|
||||||
CVE-2025-0696,0,0,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000
|
CVE-2025-0696,0,0,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000
|
||||||
@ -278109,6 +278119,9 @@ CVE-2025-0871,0,0,24dddddb7292c73ee5114bcb016776d1fe668a27680ab7f838511f0d646009
|
|||||||
CVE-2025-0872,0,0,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000
|
CVE-2025-0872,0,0,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000
|
||||||
CVE-2025-0873,0,0,f96722cf650d777df13efd7b0f61fc08757016f39189f71415796b266e7ec0a6,2025-01-30T17:15:18.293000
|
CVE-2025-0873,0,0,f96722cf650d777df13efd7b0f61fc08757016f39189f71415796b266e7ec0a6,2025-01-30T17:15:18.293000
|
||||||
CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7da,2025-01-30T18:15:33.753000
|
CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7da,2025-01-30T18:15:33.753000
|
||||||
|
CVE-2025-0880,1,1,7ab5ca29a799a8fac267066c2eb589d01834fa921e902d70d4517ec3592f8581,2025-01-30T21:15:14.487000
|
||||||
|
CVE-2025-0881,1,1,f6d8aeab8275692b8ab74f77e788a17bc4f5e9922e816ca6e72b12616473f8e1,2025-01-30T22:15:09.950000
|
||||||
|
CVE-2025-0882,1,1,a4fc441f84f917a5c60004573d3c20412d06b968e92fa39cb0a0be846d1c9a39,2025-01-30T21:15:14.820000
|
||||||
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
|
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
|
||||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||||
@ -279278,7 +279291,7 @@ CVE-2025-24092,0,0,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65c
|
|||||||
CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000
|
CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000
|
||||||
CVE-2025-24094,0,0,9752c4fcf0542c9a14c29e1c06a8a87f40d0c52a3267427d743fb5e9dc5aef3d,2025-01-30T18:17:08.090000
|
CVE-2025-24094,0,0,9752c4fcf0542c9a14c29e1c06a8a87f40d0c52a3267427d743fb5e9dc5aef3d,2025-01-30T18:17:08.090000
|
||||||
CVE-2025-24096,0,0,bc6af13ce18ffbaee061a39b643a737430849df914344499b977f4fe1613eb41,2025-01-30T18:16:40.440000
|
CVE-2025-24096,0,0,bc6af13ce18ffbaee061a39b643a737430849df914344499b977f4fe1613eb41,2025-01-30T18:16:40.440000
|
||||||
CVE-2025-24099,0,0,20f7dc916a389edc92101fc45e85459d6fd6b507a4303a4de3fe6f8ee24eb249,2025-01-30T17:15:18.473000
|
CVE-2025-24099,0,1,ae84459fb59861397fcfa19fe58321bea97795e963bc811d2e971534f0407179,2025-01-30T22:15:10.160000
|
||||||
CVE-2025-24100,0,0,d35ad28704e6b165a7814523e9ddab98d243bbac9edf72e469cfe41a8f6cfb09,2025-01-30T18:16:04.177000
|
CVE-2025-24100,0,0,d35ad28704e6b165a7814523e9ddab98d243bbac9edf72e469cfe41a8f6cfb09,2025-01-30T18:16:04.177000
|
||||||
CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000
|
CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000
|
||||||
CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
|
CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
|
||||||
@ -279289,7 +279302,7 @@ CVE-2025-24107,0,0,a6cfe430786da61a82799ac1488a919055b479fc4fe81ab16f82560299f05
|
|||||||
CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000
|
CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000
|
||||||
CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000
|
CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000
|
||||||
CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000
|
CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000
|
||||||
CVE-2025-24113,0,1,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000
|
CVE-2025-24113,0,0,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000
|
||||||
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
|
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
|
||||||
CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
|
CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
|
||||||
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
|
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
|
||||||
@ -279362,25 +279375,25 @@ CVE-2025-24400,0,0,d4e33d3f64ab5857e07ca7edc1c70e091d835e180e9973f0447b96fc45e31
|
|||||||
CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000
|
CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000
|
||||||
CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000
|
CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000
|
||||||
CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000
|
CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000
|
||||||
CVE-2025-24456,0,0,6523f3c101f4627bc76fe98572471b61eebbe2b2db1478b5e2b49419a77df538,2025-01-21T18:15:18.320000
|
CVE-2025-24456,0,1,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000
|
||||||
CVE-2025-24457,0,0,8215739f2c45f2f128765b5c9586342100742ab36e76214e9002205ed3878a50,2025-01-21T18:15:18.520000
|
CVE-2025-24457,0,1,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000
|
||||||
CVE-2025-24458,0,0,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87ddc54,2025-01-21T18:15:18.697000
|
CVE-2025-24458,0,1,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000
|
||||||
CVE-2025-24459,0,0,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000
|
CVE-2025-24459,0,1,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87c39,2025-01-30T21:22:22.917000
|
||||||
CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000
|
CVE-2025-24460,0,1,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000
|
||||||
CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000
|
CVE-2025-24461,0,1,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000
|
||||||
CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000
|
CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000
|
||||||
CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000
|
CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000
|
||||||
CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000
|
CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000
|
||||||
CVE-2025-24481,0,0,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000
|
CVE-2025-24481,0,0,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000
|
||||||
CVE-2025-24482,0,0,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000
|
CVE-2025-24482,0,0,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000
|
||||||
CVE-2025-24500,1,1,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000
|
CVE-2025-24500,0,0,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000
|
||||||
CVE-2025-24501,1,1,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000
|
CVE-2025-24501,0,0,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000
|
||||||
CVE-2025-24502,1,1,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000
|
CVE-2025-24502,0,0,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000
|
||||||
CVE-2025-24503,1,1,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000
|
CVE-2025-24503,0,0,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000
|
||||||
CVE-2025-24504,1,1,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000
|
CVE-2025-24504,0,0,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000
|
||||||
CVE-2025-24505,1,1,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000
|
CVE-2025-24505,0,0,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000
|
||||||
CVE-2025-24506,1,1,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000
|
CVE-2025-24506,0,0,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000
|
||||||
CVE-2025-24507,1,1,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000
|
CVE-2025-24507,0,0,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000
|
||||||
CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211f10,2025-01-29T17:15:29.873000
|
CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211f10,2025-01-29T17:15:29.873000
|
||||||
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
|
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
|
||||||
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
|
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
|
||||||
@ -279532,7 +279545,7 @@ CVE-2025-24793,0,0,d4e07940239b9e00a0a69537d9f171e93d29bd100812c005125832500a710
|
|||||||
CVE-2025-24794,0,0,2f11cb6d90041da254b8f99c352894c2b43558b53ed02d7114c4604602ab34d0,2025-01-29T21:15:21.397000
|
CVE-2025-24794,0,0,2f11cb6d90041da254b8f99c352894c2b43558b53ed02d7114c4604602ab34d0,2025-01-29T21:15:21.397000
|
||||||
CVE-2025-24795,0,0,02b3fee7a40cc82ee8b1315243aa5224def5b0913e0f89e5c85904feb21dfca6,2025-01-29T21:15:21.533000
|
CVE-2025-24795,0,0,02b3fee7a40cc82ee8b1315243aa5224def5b0913e0f89e5c85904feb21dfca6,2025-01-29T21:15:21.533000
|
||||||
CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000
|
CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000
|
||||||
CVE-2025-24802,1,1,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000
|
CVE-2025-24802,0,0,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000
|
||||||
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
|
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
|
||||||
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
|
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
|
||||||
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000
|
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user