mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-18T17:01:33.653463+00:00
This commit is contained in:
parent
f8f767ade5
commit
415fae944f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-19692",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-04T15:15:07.653",
|
||||
"lastModified": "2024-11-21T05:09:19.700",
|
||||
"lastModified": "2025-02-18T15:15:11.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-19693",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-04T15:15:07.697",
|
||||
"lastModified": "2024-11-21T05:09:19.843",
|
||||
"lastModified": "2025-02-18T15:15:12.407",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2560",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.447",
|
||||
"lastModified": "2024-11-21T07:01:15.113",
|
||||
"lastModified": "2025-02-18T16:15:10.817",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -60,7 +80,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,6 +90,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2561",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.517",
|
||||
"lastModified": "2024-11-21T07:01:15.230",
|
||||
"lastModified": "2025-02-18T16:15:11.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-27493",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2022-08-18T21:15:08.407",
|
||||
"lastModified": "2024-11-21T06:55:50.167",
|
||||
"lastModified": "2025-02-18T16:15:09.020",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-665"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28685",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.127",
|
||||
"lastModified": "2024-11-21T06:57:44.447",
|
||||
"lastModified": "2025-02-18T16:15:09.603",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28686",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.217",
|
||||
"lastModified": "2024-11-21T06:57:44.560",
|
||||
"lastModified": "2025-02-18T16:15:09.843",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28687",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.303",
|
||||
"lastModified": "2024-11-21T06:57:44.670",
|
||||
"lastModified": "2025-02-18T16:15:10.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28688",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.380",
|
||||
"lastModified": "2024-11-21T06:57:44.780",
|
||||
"lastModified": "2025-02-18T16:15:10.237",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-28858",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2022-08-18T21:15:08.513",
|
||||
"lastModified": "2024-11-21T06:58:04.450",
|
||||
"lastModified": "2025-02-18T16:15:10.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2825",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.610",
|
||||
"lastModified": "2024-11-21T07:01:45.653",
|
||||
"lastModified": "2025-02-18T16:15:11.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2848",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.680",
|
||||
"lastModified": "2024-11-21T07:01:48.140",
|
||||
"lastModified": "2025-02-18T16:15:11.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -60,7 +80,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,13 +90,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29507",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2022-08-18T20:15:11.313",
|
||||
"lastModified": "2024-11-21T06:59:13.363",
|
||||
"lastModified": "2025-02-18T16:15:10.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-33209",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2022-08-18T21:15:08.687",
|
||||
"lastModified": "2024-11-21T07:07:43.390",
|
||||
"lastModified": "2025-02-18T16:15:11.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34488",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2022-08-18T21:15:08.773",
|
||||
"lastModified": "2024-11-21T07:09:40.533",
|
||||
"lastModified": "2025-02-18T16:15:11.813",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34713",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.487",
|
||||
"lastModified": "2024-11-21T07:10:02.083",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T15:06:15.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36969",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:11.753",
|
||||
"lastModified": "2024-11-21T07:14:10.820",
|
||||
"lastModified": "2025-02-18T16:15:11.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37351",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.200",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:12.197",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37352",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.293",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:12.407",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -60,7 +80,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,6 +90,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37353",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.373",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:12.613",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37354",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.500",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:12.807",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37355",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.593",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -60,7 +80,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37356",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.683",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37357",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.760",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.383",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37358",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.833",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37359",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:13.917",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37360",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-29T19:15:14.010",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-18T16:15:13.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
@ -67,6 +87,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-37969",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:12.323",
|
||||
"lastModified": "2024-11-21T07:15:28.000",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T15:05:07.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38922",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-03T15:15:18.777",
|
||||
"lastModified": "2024-11-21T07:17:15.550",
|
||||
"lastModified": "2025-02-18T16:15:14.143",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41049",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-11-09T22:15:19.567",
|
||||
"lastModified": "2024-11-21T07:22:31.177",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T15:02:20.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41080",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-11-09T22:15:21.550",
|
||||
"lastModified": "2024-11-21T07:22:34.373",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T15:01:39.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48221",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-04T15:15:08.717",
|
||||
"lastModified": "2024-11-21T07:32:59.250",
|
||||
"lastModified": "2025-02-18T15:15:12.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48222",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-04T16:15:07.143",
|
||||
"lastModified": "2024-11-21T07:32:59.403",
|
||||
"lastModified": "2025-02-18T15:15:12.803",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0225",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-04-03T23:15:06.907",
|
||||
"lastModified": "2024-11-21T07:36:46.750",
|
||||
"lastModified": "2025-02-18T16:15:14.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -52,6 +72,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-03T22:15:07.023",
|
||||
"lastModified": "2024-11-21T07:48:19.893",
|
||||
"lastModified": "2025-02-18T15:15:13.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26830",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T16:15:07.507",
|
||||
"lastModified": "2024-11-21T07:51:59.023",
|
||||
"lastModified": "2025-02-18T15:15:13.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26858",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T20:15:07.397",
|
||||
"lastModified": "2024-11-21T07:52:00.960",
|
||||
"lastModified": "2025-02-18T15:15:13.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26916",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-03T22:15:07.060",
|
||||
"lastModified": "2024-11-21T07:52:03.453",
|
||||
"lastModified": "2025-02-18T15:15:13.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26925",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T19:15:07.230",
|
||||
"lastModified": "2024-11-21T07:52:04.800",
|
||||
"lastModified": "2025-02-18T16:15:14.530",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27025",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-02T01:15:07.400",
|
||||
"lastModified": "2024-11-21T07:52:12.293",
|
||||
"lastModified": "2025-02-18T16:15:14.717",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27159",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T19:15:07.273",
|
||||
"lastModified": "2024-11-21T07:52:23.917",
|
||||
"lastModified": "2025-02-18T15:15:13.813",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T20:15:07.477",
|
||||
"lastModified": "2024-11-21T07:52:24.517",
|
||||
"lastModified": "2025-02-18T16:15:14.970",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28503",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.123",
|
||||
"lastModified": "2024-11-21T07:55:14.880",
|
||||
"lastModified": "2025-02-18T16:15:15.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28504",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.170",
|
||||
"lastModified": "2024-11-21T07:55:15.007",
|
||||
"lastModified": "2025-02-18T16:15:15.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28505",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.217",
|
||||
"lastModified": "2024-11-21T07:55:15.137",
|
||||
"lastModified": "2025-02-18T16:15:15.550",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +75,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28506",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.263",
|
||||
"lastModified": "2024-11-21T07:55:15.257",
|
||||
"lastModified": "2025-02-18T16:15:15.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +75,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28507",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.307",
|
||||
"lastModified": "2024-11-21T07:55:15.387",
|
||||
"lastModified": "2025-02-18T15:15:14.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +75,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28508",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-03-29T21:15:08.353",
|
||||
"lastModified": "2024-11-21T07:55:15.517",
|
||||
"lastModified": "2025-02-18T15:15:14.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +75,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29140",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T19:15:07.503",
|
||||
"lastModified": "2024-11-21T07:56:36.620",
|
||||
"lastModified": "2025-02-18T16:15:15.893",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29141",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-31T19:15:07.540",
|
||||
"lastModified": "2024-11-21T07:56:36.747",
|
||||
"lastModified": "2025-02-18T16:15:16.077",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -156,6 +186,14 @@
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5447",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T285159",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29218",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-03T21:15:07.237",
|
||||
"lastModified": "2024-11-21T07:56:44.130",
|
||||
"lastModified": "2025-02-18T15:15:14.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -39,6 +39,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -52,6 +72,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-12314",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T05:15:09.987",
|
||||
"lastModified": "2025-02-18T05:15:09.987",
|
||||
"lastModified": "2025-02-18T15:15:14.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Rapid Cache para WordPress es vulnerable al envenenamiento de cach\u00e9 en todas las versiones hasta 1.2.3 incluida. Esto se debe al complemento que almacena los encabezados HTTP en los datos en cach\u00e9. Esto hace posible que los atacantes no autenticados envenenen el cach\u00e9 con encabezados HTTP personalizados que pueden ser no depurados, lo que puede conducir a Cross-Site Scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -45,6 +69,16 @@
|
||||
"value": "CWE-524"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-524"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
60
CVE-2024/CVE-2024-136xx/CVE-2024-13689.json
Normal file
60
CVE-2024/CVE-2024-136xx/CVE-2024-13689.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13689",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T15:15:15.547",
|
||||
"lastModified": "2025-02-18T15:15:15.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0a61e11-1137-4da0-8580-0a44300b1542?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2168",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-04T21:15:07.137",
|
||||
"lastModified": "2024-11-21T09:09:10.260",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:14:41.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034678D5-42ED-4076-964F-D89620540E75"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255678",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255678",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.255678",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.255678",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2332",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-09T14:15:51.433",
|
||||
"lastModified": "2024-11-21T09:09:31.410",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:17:02.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256283",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256283",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256283",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256283",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2393",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-12T13:15:50.023",
|
||||
"lastModified": "2024-11-21T09:09:39.413",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:20:38.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:remyandrade:crud_without_page_reload\\/refresh:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72AD257E-3756-476B-A44E-9596D320CAC7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256453",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256453",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256453",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256453",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2418",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-13T18:15:07.990",
|
||||
"lastModified": "2024-11-21T09:09:42.670",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:22:50.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:best_pos_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A86D4E42-CD06-4E87-A2FE-378E9BABE3A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256705",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256705",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256705",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256705",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2553",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T04:15:07.073",
|
||||
"lastModified": "2024-11-21T09:09:59.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:24:04.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,46 +96,101 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:remyandrade:product_review\\/rating_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "154BF390-7979-405B-B58E-6FEFEDBED9A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257052",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257052",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.298886",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257052",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257052",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.298886",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2555",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T07:15:05.803",
|
||||
"lastModified": "2024-11-21T09:10:00.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T16:52:50.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257054",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257054",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2556",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T08:15:05.997",
|
||||
"lastModified": "2024-11-21T09:10:00.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T16:50:19.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2690",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-20T10:15:11.250",
|
||||
"lastModified": "2024-11-21T09:10:18.073",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:54:08.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257388",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257388",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/issues/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257388",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257388",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2754",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T07:15:47.193",
|
||||
"lastModified": "2024-11-21T09:10:26.530",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:56:54.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257544",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257544",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wkeyi0x1/vul-report/issues/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257544",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257544",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2849",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-23T18:15:07.770",
|
||||
"lastModified": "2024-11-21T09:10:40.303",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T16:57:52.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CveSecLook/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257770",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257770",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.303123",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CveSecLook/cve/issues/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257770",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257770",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.303123",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2930",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T00:15:07.870",
|
||||
"lastModified": "2024-11-21T09:10:51.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T17:00:05.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:music_gallery_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60452D80-76E0-47AB-99D9-9CC1853CBCB2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258001",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258001",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304234",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258001",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258001",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304234",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-31144",
|
||||
"sourceIdentifier": "security@xen.org",
|
||||
"published": "2025-02-14T21:15:15.107",
|
||||
"lastModified": "2025-02-14T21:15:15.107",
|
||||
"lastModified": "2025-02-18T15:15:16.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "For a brief summary of Xapi terminology, see:\n\n https://xapi-project.github.io/xen-api/overview.html#object-model-overview \n\nXapi contains functionality to backup and restore metadata about Virtual\nMachines and Storage Repositories (SRs).\n\nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an\nSR. This is used for two purposes; a general backup of metadata\n(e.g. to recover from a host failure if the filer is still good), and\nPortable SRs (e.g. using an external hard drive to move VMs to another\nhost).\n\nMetadata is only restored as an explicit administrator action, but\noccurs in cases where the host has no information about the SR, and must\nlocate the metadata VDI in order to retrieve the metadata.\n\nThe metadata VDI is located by searching (in UUID alphanumeric order)\neach VDI, mounting it, and seeing if there is a suitable metadata file\npresent. The first matching VDI is deemed to be the metadata VDI, and\nis restored from.\n\nIn the general case, the content of VDIs are controlled by the VM owner,\nand should not be trusted by the host administrator.\n\nA malicious guest can manipulate its disk to appear to be a metadata\nbackup.\n\nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk\nhas a 50% chance of sorting ahead of the legitimate metadata backup. A\nguest with two disks has a 75% chance, etc."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Para obtener un breve resumen de la terminolog\u00eda de Xapi, consulte: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contiene funcionalidad para realizar copias de seguridad y restaurar metadatos sobre m\u00e1quinas virtuales y repositorios de almacenamiento (SR). Los metadatos en s\u00ed se almacenan en una imagen de disco virtual (VDI) dentro de un SR. Esto se utiliza para dos prop\u00f3sitos: una copia de seguridad general de metadatos (por ejemplo, para recuperarse de una falla del host si el archivador a\u00fan est\u00e1 en buen estado) y SR port\u00e1tiles (por ejemplo, usar un disco duro externo para mover m\u00e1quinas virtuales a otro host). Los metadatos solo se restauran como una acci\u00f3n expl\u00edcita del administrador, pero ocurre en los casos en que el host no tiene informaci\u00f3n sobre el SR y debe ubicar el VDI de metadatos para recuperar los metadatos. El VDI de metadatos se ubica buscando (en orden alfanum\u00e9rico UUID) cada VDI, mont\u00e1ndolo y viendo si hay un archivo de metadatos adecuado presente. El primer VDI coincidente se considera el VDI de metadatos y se restaura desde \u00e9l. En general, el propietario de la m\u00e1quina virtual controla el contenido de las VDI y el administrador del host no deber\u00eda confiar en ellas. Un invitado malintencionado puede manipular su disco para que parezca una copia de seguridad de metadatos. Un invitado no puede elegir los UUID de sus VDI, pero un invitado con un disco tiene un 50 % de posibilidades de clasificarse antes que la copia de seguridad de metadatos leg\u00edtima. Un invitado con dos discos tiene un 75 % de posibilidades, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://xenbits.xen.org/xsa/advisory-459.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41710",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T19:15:16.850",
|
||||
"lastModified": "2025-02-13T02:00:01.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T15:28:00.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Mitel SIP Phones Argument Injection Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-88"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,18 +85,450 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6970_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "D391B6ED-2FEF-43A3-8ECE-F42B79E1F9CD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6970:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "651C4A02-AE83-4D6E-B49F-D756DF8032F3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "1BD5BE48-120F-4A09-96C8-1095E04C8D69"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6940w_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0BB4B3A-65F9-4726-938D-71B686BC13E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "D1E36148-4C07-46E4-B99C-FD3D8EBF48F8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6930w_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5230BCB-800F-434D-9AAB-A35A7F87D356"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "6DE5CF0D-7BF3-468E-9809-6A1417C6989F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6920w_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "663416FA-7F4F-45CA-A28F-3FF20214F20B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "E1D8483A-A448-416F-9918-B1D995616553"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6920_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8084E6D-1382-4785-9D01-0111A04B233A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "A04266DF-3E78-47DB-BAA5-E79FCB38974B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6915_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3F279F8-83D8-4EEC-AA99-5EED398653E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "91BCABB3-BA8D-41B8-953B-A33C7BFB332C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "412A5856-40B0-4633-B0F6-D87D3DB85BE5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "7B379EEB-2927-4A36-83A1-E7B4CB88F3E4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97CB43CD-3B53-4839-9AE4-67024A276305"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6940_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "1A3ED2A5-977E-4743-838F-62EE2A7A6837"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6940_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05422EAF-9528-48CE-972C-9DF111F91570"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6930_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "4ECFE164-B4A2-44DC-B603-EF7C4E6F68F4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6930_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1837336E-7A1D-414C-B888-56350AF6C32A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6873i_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "66B0069E-B089-46B0-B1D7-C560A15FC26E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C298A98-C6CE-4AEB-AD9F-FFCFA1E865F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "4415660E-385F-43DC-9F37-4C06AC7F052F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "654554ED-253C-4928-92D0-92EADF5F4768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6867i_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "645135A3-362E-4DBB-805C-49A6B21EB4C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4942E820-8103-4763-8715-F1301F233B05"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6865i_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "91CC349C-AFB9-418F-9425-0038E91EF7BC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AAFF6ED-44F6-4D3B-99EA-0F8FE58EC34B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.4.0.136",
|
||||
"matchCriteriaId": "10E7483A-BFB0-4F2A-B5DF-43AD0A308F7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D7C6275-6DA1-4768-A331-5290E8CB64D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kwburns/CVE/blob/main/Mitel/6.3.0.1020/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0019",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46740",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-18T08:15:03.377",
|
||||
"lastModified": "2024-09-20T18:34:08.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-18T16:15:17.540",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50090",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-05T17:15:06.477",
|
||||
"lastModified": "2024-11-12T21:41:16.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-18T16:15:17.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50282",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T02:16:30.540",
|
||||
"lastModified": "2025-01-24T16:15:37.570",
|
||||
"lastModified": "2025-02-18T16:15:17.927",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53061",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T18:15:25.997",
|
||||
"lastModified": "2024-11-22T17:51:45.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-18T16:15:18.113",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53192",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:26.780",
|
||||
"lastModified": "2024-12-27T14:15:26.780",
|
||||
"lastModified": "2025-02-18T16:15:18.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: clk-loongson2: Se corrige un desbordamiento de b\u00fafer potencial en el acceso a miembros de la matriz flexible El miembro de la matriz flexible `hws` en `struct clk_hw_onecell_data` est\u00e1 anotado con el atributo `counted_by()`. Esto significa que cuando se asigna memoria para esta matriz, el _contador_, que en este caso es el miembro `num` en la estructura flexible, se debe establecer en el n\u00famero m\u00e1ximo de elementos que la matriz flexible puede contener, o menos. En este caso, el n\u00famero total de elementos para la matriz flexible se determina mediante la variable `clks_num` al asignar espacio de mont\u00f3n a trav\u00e9s de `devm_kzalloc()`, como se muestra a continuaci\u00f3n: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); Por lo tanto, `clp->clk_data.num` debe establecerse en `clks_num` o menos, y no superar `clks_num`, como es el caso actualmente. De lo contrario, si los datos se escriben en `clp->clk_data.hws[clks_num]`, la instrumentaci\u00f3n proporcionada por el compilador no detectar\u00e1 el desbordamiento, lo que provocar\u00e1 un error de corrupci\u00f3n de memoria en tiempo de ejecuci\u00f3n. Solucione este problema estableciendo `clp->clk_data.num` en `clks_num`."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/02fb4f0084331ef72c28d0c70fcb15d1bea369ec",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53704",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2025-01-09T07:15:27.203",
|
||||
"lastModified": "2025-01-09T15:15:18.640",
|
||||
"lastModified": "2025-02-18T15:15:16.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-56180",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-02-14T14:15:32.267",
|
||||
"lastModified": "2025-02-14T17:15:16.317",
|
||||
"lastModified": "2025-02-18T15:15:16.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft\u00a0plugin\u00a0module in Apache EventMesh master branch without release version on windows\\linux\\mac os e.g. platforms allows attackers to send controlled message and remote code execute\u00a0via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CWE-502 La deserializaci\u00f3n de datos no confiables en el m\u00f3dulo de complemento eventmesh-meta-raft en la rama maestra Apache EventMesh sin versi\u00f3n de lanzamiento en plataformas Windows\\Linux\\Mac OS, por ejemplo, permite a los atacantes enviar mensajes controlados y ejecutar c\u00f3digo remoto a trav\u00e9s del protocolo RPC de deserializaci\u00f3n hessiana. Los usuarios pueden usar el c\u00f3digo en la rama maestra en el repositorio del proyecto o la versi\u00f3n 1.11.0 para solucionar este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56557",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:14.520",
|
||||
"lastModified": "2024-12-27T15:15:14.520",
|
||||
"lastModified": "2025-02-18T16:15:18.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ad7923: Se corrige el desbordamiento de b\u00fafer para tx_buf y ring_xfer El AD7923 se actualiz\u00f3 para soportar dispositivos con 8 canales, pero el tama\u00f1o de tx_buf y ring_xfer no se increment\u00f3 en consecuencia, lo que provoc\u00f3 un posible desbordamiento de b\u00fafer en ad7923_update_scan_mode()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00663d3e000c31d0d49ef86a809f5c107c2d09cd",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-56642",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:23.930",
|
||||
"lastModified": "2025-02-11T16:15:46.650",
|
||||
"lastModified": "2025-02-18T16:15:18.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_net_stop() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer"
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_exit_net() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
25
CVE-2024/CVE-2024-570xx/CVE-2024-57045.json
Normal file
25
CVE-2024/CVE-2024-570xx/CVE-2024-57045.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.677",
|
||||
"lastModified": "2025-02-18T15:15:16.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/D-Link/DIR-859/ACL%20bypass%20Vulnerability%20in%20D-Link%20DIR-859.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-570xx/CVE-2024-57046.json
Normal file
25
CVE-2024/CVE-2024-570xx/CVE-2024-57046.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.783",
|
||||
"lastModified": "2025-02-18T15:15:16.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding \"?x=1.gif\" to the the requested url, it will be recognized as passing the authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/DGN2200/ACL%20bypass%20Vulnerability%20in%20Netgear%20DGN2200.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.netgear.com/about/security/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-570xx/CVE-2024-57049.json
Normal file
21
CVE-2024/CVE-2024-570xx/CVE-2024-57049.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57049",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.890",
|
||||
"lastModified": "2025-02-18T15:15:16.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-570xx/CVE-2024-57050.json
Normal file
21
CVE-2024/CVE-2024-570xx/CVE-2024-57050.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57050",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.977",
|
||||
"lastModified": "2025-02-18T15:15:16.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-57725",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T16:15:34.360",
|
||||
"lastModified": "2025-02-14T21:15:16.033",
|
||||
"lastModified": "2025-02-18T15:15:17.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the Arcadyan Livebox Fibra PRV3399B_B_LT allows a remote or local attacker to modify the GPON link value without authentication, causing an internet service disruption via the /firstconnection.cgi endpoint."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Arcadyan Livebox Fibra PRV3399B_B_LT permite que un atacante remoto o local modifique el valor del enlace GPON sin autenticaci\u00f3n, lo que provoca una interrupci\u00f3n del servicio de Internet a trav\u00e9s del endpoint /firstconnection.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-57778",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T16:15:34.453",
|
||||
"lastModified": "2025-02-14T21:15:16.373",
|
||||
"lastModified": "2025-02-18T15:15:17.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Orbe ONetView Roeador Onet-1200 Orbe 1680210096 allows a remote attacker to escalate privileges via the servers response from status code 500 to status code 200."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Orbe ONetView Roeador Onet-1200 Orbe 1680210096 permite a un atacante remoto escalar privilegios a trav\u00e9s de la respuesta del servidor del c\u00f3digo de estado 500 al c\u00f3digo de estado 200."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-57970",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-16T04:15:21.843",
|
||||
"lastModified": "2025-02-16T04:15:21.843",
|
||||
"lastModified": "2025-02-18T15:15:17.343",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "libarchive hasta 3.7.7 tiene una sobrelectura de b\u00fafer basada en mont\u00f3n en header_gnu_longlink en archive_read_support_format_tar.c a trav\u00e9s de un archivo TAR porque gestiona incorrectamente el truncamiento en el medio de un nombre de enlace largo GNU."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +69,16 @@
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7591",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-09-05T18:15:06.480",
|
||||
"lastModified": "2025-02-17T17:15:09.300",
|
||||
"lastModified": "2025-02-18T16:15:19.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -108,6 +108,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591",
|
||||
"source": "security@progress.com",
|
||||
@ -115,10 +119,6 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://url.us.m.mimecastprotect.com/s/m_v3CkRgEgSz2vDGUQi8HGPtBQ?domain=insinuator.net",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-1298",
|
||||
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
"published": "2025-02-14T08:15:30.877",
|
||||
"lastModified": "2025-02-14T08:15:30.877",
|
||||
"lastModified": "2025-02-18T15:15:18.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad l\u00f3gica en la aplicaci\u00f3n m\u00f3vil (com.transsion.carlcare) podr\u00eda generar riesgo de apropiaci\u00f3n de cuenta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1358",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-16T20:15:07.990",
|
||||
"lastModified": "2025-02-16T20:15:07.990",
|
||||
"lastModified": "2025-02-18T15:15:18.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Pix Software Vivaz 6.0.10. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Pix Software Vivaz 6.0.10. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,27 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -118,6 +142,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2025-21401",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-15T00:15:27.163",
|
||||
"lastModified": "2025-02-15T00:15:27.163",
|
||||
"lastModified": "2025-02-18T15:15:18.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad en Microsoft Edge (basado en Chromium)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
@ -45,6 +69,16 @@
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
29
CVE-2025/CVE-2025-217xx/CVE-2025-21702.json
Normal file
29
CVE-2025/CVE-2025-217xx/CVE-2025-21702.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-21702",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-18T15:15:18.530",
|
||||
"lastModified": "2025-02-18T15:15:18.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/647cef20e649c576dff271e018d5d15d998b629d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b6a079c3b6f95378f26e2aeda520cb3176f7067b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e40cb34b7f247fe2e366fd192700d1b4f38196ca",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-217xx/CVE-2025-21703.json
Normal file
68
CVE-2025/CVE-2025-217xx/CVE-2025-21703.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-21703",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-18T15:15:18.633",
|
||||
"lastModified": "2025-02-18T16:15:20.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f8e3f4a4b8b90ad274dfbc66fc7d55cb582f4d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6312555249082d6d8cc5321ff725df05482d8b83",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/638ba5089324796c2ee49af10427459c2de35f71",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/839ecc583fa00fab785fde1c85a326743657fd32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-222xx/CVE-2025-22207.json
Normal file
78
CVE-2025/CVE-2025-222xx/CVE-2025-22207.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-22207",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2025-02-18T16:15:20.467",
|
||||
"lastModified": "2025-02-18T16:15:20.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NO",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.joomla.org/security-centre/958-20250201-core-sql-injection-vulnerability-in-scheduled-tasks-component.html",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25530",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-11T20:15:39.327",
|
||||
"lastModified": "2025-02-11T20:15:39.327",
|
||||
"lastModified": "2025-02-18T16:15:20.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en Digital China DCBI-Netlog-LAB Gateway 1.0 debido a la falta de verificaci\u00f3n de longitud, que est\u00e1 relacionada con el almacenamiento de informaci\u00f3n de configuraci\u00f3n de control parental. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/XiaoCurry/570a765f6812b8c53d35f623ee701b19",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25897",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T16:16:49.790",
|
||||
"lastModified": "2025-02-13T16:16:49.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T15:00:36.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,79 @@
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro 'ip' en /userRpm/WanStaticIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_3.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-25990",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T17:15:21.320",
|
||||
"lastModified": "2025-02-14T21:15:16.913",
|
||||
"lastModified": "2025-02-18T15:15:18.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross Site Scripting en hooskcms v.1.7.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /install/index.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-25994",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T17:15:21.953",
|
||||
"lastModified": "2025-02-14T20:15:37.390",
|
||||
"lastModified": "2025-02-18T15:15:18.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameters date1, date2, id."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de inyecci\u00f3n SQL en FeMiner wms wms 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros date1, date2, id."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-25997",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T17:15:22.117",
|
||||
"lastModified": "2025-02-14T19:15:14.903",
|
||||
"lastModified": "2025-02-18T15:15:19.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Directory Traversal en FeMiner wms v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente databak.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.7
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
70
README.md
70
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-18T15:01:16.063065+00:00
|
||||
2025-02-18T17:01:33.653463+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-18T14:59:38.510000+00:00
|
||||
2025-02-18T17:00:05.117000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281636
|
||||
281644
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2025-1269](CVE-2025/CVE-2025-12xx/CVE-2025-1269.json) (`2025-02-18T14:15:28.513`)
|
||||
- [CVE-2025-1414](CVE-2025/CVE-2025-14xx/CVE-2025-1414.json) (`2025-02-18T14:15:28.670`)
|
||||
- [CVE-2024-13689](CVE-2024/CVE-2024-136xx/CVE-2024-13689.json) (`2025-02-18T15:15:15.547`)
|
||||
- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-18T15:15:16.677`)
|
||||
- [CVE-2024-57046](CVE-2024/CVE-2024-570xx/CVE-2024-57046.json) (`2025-02-18T15:15:16.783`)
|
||||
- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-18T15:15:16.890`)
|
||||
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-18T15:15:16.977`)
|
||||
- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-02-18T15:15:18.530`)
|
||||
- [CVE-2025-21703](CVE-2025/CVE-2025-217xx/CVE-2025-21703.json) (`2025-02-18T15:15:18.633`)
|
||||
- [CVE-2025-22207](CVE-2025/CVE-2025-222xx/CVE-2025-22207.json) (`2025-02-18T16:15:20.467`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `33`
|
||||
Recently modified CVEs: `87`
|
||||
|
||||
- [CVE-2022-46169](CVE-2022/CVE-2022-461xx/CVE-2022-46169.json) (`2025-02-18T14:51:04.277`)
|
||||
- [CVE-2023-50167](CVE-2023/CVE-2023-501xx/CVE-2023-50167.json) (`2025-02-18T13:43:27.293`)
|
||||
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-18T14:15:27.107`)
|
||||
- [CVE-2024-1696](CVE-2024/CVE-2024-16xx/CVE-2024-1696.json) (`2025-02-18T13:43:18.590`)
|
||||
- [CVE-2024-22011](CVE-2024/CVE-2024-220xx/CVE-2024-22011.json) (`2025-02-18T13:42:57.540`)
|
||||
- [CVE-2024-24275](CVE-2024/CVE-2024-242xx/CVE-2024-24275.json) (`2025-02-18T13:44:28.043`)
|
||||
- [CVE-2024-24276](CVE-2024/CVE-2024-242xx/CVE-2024-24276.json) (`2025-02-18T13:44:14.953`)
|
||||
- [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2025-02-18T13:42:34.137`)
|
||||
- [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2025-02-18T13:42:12.110`)
|
||||
- [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2025-02-18T13:42:04.037`)
|
||||
- [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2025-02-18T13:41:56.553`)
|
||||
- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-18T14:15:27.900`)
|
||||
- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-18T14:15:28.070`)
|
||||
- [CVE-2024-57241](CVE-2024/CVE-2024-572xx/CVE-2024-57241.json) (`2025-02-18T14:15:28.237`)
|
||||
- [CVE-2024-57905](CVE-2024/CVE-2024-579xx/CVE-2024-57905.json) (`2025-02-18T13:40:32.897`)
|
||||
- [CVE-2024-57906](CVE-2024/CVE-2024-579xx/CVE-2024-57906.json) (`2025-02-18T13:40:18.470`)
|
||||
- [CVE-2024-57907](CVE-2024/CVE-2024-579xx/CVE-2024-57907.json) (`2025-02-18T13:40:05.290`)
|
||||
- [CVE-2024-57908](CVE-2024/CVE-2024-579xx/CVE-2024-57908.json) (`2025-02-18T13:39:42.783`)
|
||||
- [CVE-2024-57909](CVE-2024/CVE-2024-579xx/CVE-2024-57909.json) (`2025-02-18T13:39:06.190`)
|
||||
- [CVE-2024-57912](CVE-2024/CVE-2024-579xx/CVE-2024-57912.json) (`2025-02-18T13:38:39.953`)
|
||||
- [CVE-2024-57916](CVE-2024/CVE-2024-579xx/CVE-2024-57916.json) (`2025-02-18T13:38:31.347`)
|
||||
- [CVE-2024-57919](CVE-2024/CVE-2024-579xx/CVE-2024-57919.json) (`2025-02-18T13:38:22.377`)
|
||||
- [CVE-2025-24032](CVE-2025/CVE-2025-240xx/CVE-2025-24032.json) (`2025-02-18T14:15:28.770`)
|
||||
- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T14:59:38.510`)
|
||||
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-18T14:57:24.510`)
|
||||
- [CVE-2024-2849](CVE-2024/CVE-2024-28xx/CVE-2024-2849.json) (`2025-02-18T16:57:52.660`)
|
||||
- [CVE-2024-2930](CVE-2024/CVE-2024-29xx/CVE-2024-2930.json) (`2025-02-18T17:00:05.117`)
|
||||
- [CVE-2024-31144](CVE-2024/CVE-2024-311xx/CVE-2024-31144.json) (`2025-02-18T15:15:16.050`)
|
||||
- [CVE-2024-41710](CVE-2024/CVE-2024-417xx/CVE-2024-41710.json) (`2025-02-18T15:28:00.123`)
|
||||
- [CVE-2024-46740](CVE-2024/CVE-2024-467xx/CVE-2024-46740.json) (`2025-02-18T16:15:17.540`)
|
||||
- [CVE-2024-50090](CVE-2024/CVE-2024-500xx/CVE-2024-50090.json) (`2025-02-18T16:15:17.740`)
|
||||
- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-02-18T16:15:17.927`)
|
||||
- [CVE-2024-53061](CVE-2024/CVE-2024-530xx/CVE-2024-53061.json) (`2025-02-18T16:15:18.113`)
|
||||
- [CVE-2024-53192](CVE-2024/CVE-2024-531xx/CVE-2024-53192.json) (`2025-02-18T16:15:18.313`)
|
||||
- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-18T15:15:16.290`)
|
||||
- [CVE-2024-56180](CVE-2024/CVE-2024-561xx/CVE-2024-56180.json) (`2025-02-18T15:15:16.500`)
|
||||
- [CVE-2024-56557](CVE-2024/CVE-2024-565xx/CVE-2024-56557.json) (`2025-02-18T16:15:18.597`)
|
||||
- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-02-18T16:15:18.770`)
|
||||
- [CVE-2024-57725](CVE-2024/CVE-2024-577xx/CVE-2024-57725.json) (`2025-02-18T15:15:17.067`)
|
||||
- [CVE-2024-57778](CVE-2024/CVE-2024-577xx/CVE-2024-57778.json) (`2025-02-18T15:15:17.207`)
|
||||
- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-18T15:15:17.343`)
|
||||
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2025-02-18T16:15:19.110`)
|
||||
- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-18T15:15:18.007`)
|
||||
- [CVE-2025-1358](CVE-2025/CVE-2025-13xx/CVE-2025-1358.json) (`2025-02-18T15:15:18.157`)
|
||||
- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-02-18T15:15:18.357`)
|
||||
- [CVE-2025-25530](CVE-2025/CVE-2025-255xx/CVE-2025-25530.json) (`2025-02-18T16:15:20.723`)
|
||||
- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-02-18T15:00:36.487`)
|
||||
- [CVE-2025-25990](CVE-2025/CVE-2025-259xx/CVE-2025-25990.json) (`2025-02-18T15:15:18.790`)
|
||||
- [CVE-2025-25994](CVE-2025/CVE-2025-259xx/CVE-2025-25994.json) (`2025-02-18T15:15:18.923`)
|
||||
- [CVE-2025-25997](CVE-2025/CVE-2025-259xx/CVE-2025-25997.json) (`2025-02-18T15:15:19.063`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
252
_state.csv
252
_state.csv
@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486
|
||||
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
|
||||
CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000
|
||||
CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000
|
||||
CVE-2020-1631,0,1,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
|
||||
CVE-2020-1631,0,0,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
|
||||
CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000
|
||||
CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000
|
||||
CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000
|
||||
@ -152555,8 +152555,8 @@ CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817f
|
||||
CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000
|
||||
CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000
|
||||
CVE-2020-1969,0,0,bd9f49a98ad543d77a8214d913e1ed1b4f56591bd018723df14a8a068726c075,2023-11-07T03:19:39.247000
|
||||
CVE-2020-19692,0,0,7ee790d853fb0759f8d6d656fa7b5c311f39ebde27c2bdeff11b7958e0f8af43,2024-11-21T05:09:19.700000
|
||||
CVE-2020-19693,0,0,857ecae3028e4bfb3989cece11683e673294d2da88b958689f6dbb2231dd4d61,2024-11-21T05:09:19.843000
|
||||
CVE-2020-19692,0,1,7f260c96d75c5b443b8b872dec4e302f255477d0bc310cff7fb517ff9145de12,2025-02-18T15:15:11.590000
|
||||
CVE-2020-19693,0,1,b5d87c0147e22c028906f5d67dcc40149f4eb9751f0a63d25b7fdebd9080d03d,2025-02-18T15:15:12.407000
|
||||
CVE-2020-19695,0,0,6115879a09e501e85f4fc63634f821fab295f3df0873d88cdc944342d793ab21,2025-02-14T20:15:31.860000
|
||||
CVE-2020-19697,0,0,90559cd46229e821328de13f626f88775e66d3af88432331bf51bc30bdc19a21,2025-02-14T20:15:32.023000
|
||||
CVE-2020-19698,0,0,9d802db7209a05d363679e7d8885308fb5c287656ebeae027c922fbbca980adf,2025-02-14T19:15:11.397000
|
||||
@ -166537,7 +166537,7 @@ CVE-2021-1901,0,0,b4e439599e636bd2af3f4917af437f418f3102e0c7a63069310a81adcf8a4e
|
||||
CVE-2021-1903,0,0,d39f8f46801673020c5fbf3ea01fae62f95ab502fce8796c85a54991fed2fd38,2024-11-21T05:45:22.487000
|
||||
CVE-2021-1904,0,0,736c70e50ad0301f8658a558129e85f2c3820d51a12d0cb07c0e689d67b51d07,2024-11-21T05:45:22.860000
|
||||
CVE-2021-1905,0,0,372125f83a874275be00c1ffa8da76d54507cb820495157f0730c4f460e930e9,2025-01-29T20:15:27.953000
|
||||
CVE-2021-1906,0,1,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
|
||||
CVE-2021-1906,0,0,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
|
||||
CVE-2021-1907,0,0,8faafa9970a3672f067ece059b551bd2adc47cbf8ba4f75421ae6f6b8c30f6d5,2024-11-21T05:45:24.550000
|
||||
CVE-2021-1909,0,0,09b73ecdef2f380acd80f25a5da214cc33c77d1e8af71d49aad377ad62e8a0d2,2024-11-21T05:45:24.763000
|
||||
CVE-2021-1910,0,0,a6374620334700cdcae2f54d499d65ec2bbdf4b8d8dd71d334a216c6c2c176fe,2024-11-21T05:45:25.270000
|
||||
@ -168097,7 +168097,7 @@ CVE-2021-21548,0,0,e80187ad2950a294a09661ea49be95505d3f571dbd9ab97003d898e1d0358
|
||||
CVE-2021-21549,0,0,5a72c9373b5f3678521b4794d922020eae70ef71ec64d4a07514540bc3837529,2024-11-21T05:48:34.457000
|
||||
CVE-2021-2155,0,0,eb4c03a926d31556ec740f7b42e3a4a271a44933a2669c0de73d97afb2830623,2024-11-21T06:02:29.657000
|
||||
CVE-2021-21550,0,0,7b689bab33a09088da87dc915a31847831a8baf8d2382c09a29233f12dce427b,2024-11-21T05:48:34.590000
|
||||
CVE-2021-21551,0,0,0eaf22df3069b557a145e0bf22ceae51d7293de54f89854908f0541af0fed9c7,2024-11-21T05:48:34.733000
|
||||
CVE-2021-21551,0,1,b45157399bbce6f0b6f63538ebd2b85806e1b1b0d0faf9004d161d9f773c7558,2025-02-18T15:46:11.177000
|
||||
CVE-2021-21552,0,0,f6ecc9c2646156934a1124feca474788bf8777a4ccb7dc9918b5dcb68da8dbf7,2024-11-21T05:48:34.887000
|
||||
CVE-2021-21553,0,0,767ebd1895f45e230d4b3fbd59734888f2385fa2c2212ab406a048c3362d69f4,2024-11-21T05:48:35.023000
|
||||
CVE-2021-21554,0,0,46e432f9c20f997faef495d3f022ea7b2c24aa5b671ef6c0fc7280bc0f7d926d,2024-11-21T05:48:35.170000
|
||||
@ -176565,7 +176565,7 @@ CVE-2021-32644,0,0,48326864e3c31b32f0a2a40c894f4c5b136a56d07940984e0dd5cc5d1fc98
|
||||
CVE-2021-32645,0,0,9ccb448ef4de54166b4a9bb78f7bf78b88ec7ed02e5d39b6aaf9d53721c1c7e6,2024-11-21T06:07:26.863000
|
||||
CVE-2021-32646,0,0,8b20a03ce7ae582704f08e6c885ebaac0c533a1c8e4c47c8c7120f9c4abe2385,2024-11-21T06:07:26.993000
|
||||
CVE-2021-32647,0,0,c99a9247f5a69d1d18fc3868b9feddd2d5c1cfa057b7d5e9eeb861f20cdb1970,2024-11-21T06:07:27.147000
|
||||
CVE-2021-32648,0,1,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
|
||||
CVE-2021-32648,0,0,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
|
||||
CVE-2021-32649,0,0,ec6446253c3390080ce76cfe06ab7e81e042190c48d349c3bbe41d3582775742,2024-11-21T06:07:27.430000
|
||||
CVE-2021-32650,0,0,d5f4ce6dfd3368853beb539f2091f1046487c5cbc12b94f90a4301791365a1eb,2024-11-21T06:07:27.550000
|
||||
CVE-2021-32651,0,0,cbadacd8e821828cc3ee8a01abf2792bbd8d05e094c35e440cf4cdd8ff657d70,2024-11-21T06:07:27.657000
|
||||
@ -181494,7 +181494,7 @@ CVE-2021-3914,0,0,587d3c5496a3894f3bee9050cac22e88e23c870c5f08774001d16b01d73514
|
||||
CVE-2021-39140,0,0,0d9122e27f2e8ed15d337a2299d703bde300b1bfc5641e6a2d94398671530bde,2024-11-21T06:18:40.777000
|
||||
CVE-2021-39141,0,0,308173be0e42d3b05e3159d40259ea4c33203fe28aebec15c3e70290187fba0a,2024-11-21T06:18:41.053000
|
||||
CVE-2021-39143,0,0,ffd9d8fa28b7e55b36ad11f211caff12c1dd3699acec6a9366db77a7d01be1df,2024-11-21T06:18:41.313000
|
||||
CVE-2021-39144,0,1,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
|
||||
CVE-2021-39144,0,0,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
|
||||
CVE-2021-39145,0,0,9062191979151d36b337ca921b5d90e49dc062b4974dde4e6e8076a6ae806f74,2024-11-21T06:18:41.880000
|
||||
CVE-2021-39146,0,0,a68f99bfb9c34ab239930244698e1dfe09b229ea585fcfca9e82690b53f706d2,2024-11-21T06:18:42.123000
|
||||
CVE-2021-39147,0,0,c59b801126c107f7229606315684ca5bddd626cafdf34772e7610770cf359be9,2024-11-21T06:18:42.353000
|
||||
@ -181583,7 +181583,7 @@ CVE-2021-39222,0,0,71610020ce9e67dc6940837aefe504acf8a8d9fdb64ff351427e97a92ab7a
|
||||
CVE-2021-39223,0,0,5c82a3350e48ddcff666b93be9d4046e000db4dacdb95c195e7d0a6ac4994a66,2024-11-21T06:18:56.700000
|
||||
CVE-2021-39224,0,0,0dbf7b0b7c0bfb5a2d9503d6d8b25452b69229fa68d356a1f3ea08c1eb5c6037,2024-11-21T06:18:56.860000
|
||||
CVE-2021-39225,0,0,0657e7f09b5d865111d8be38a777e243b614f6eb04392640f272b6c40ad1c8e4,2024-11-21T06:18:57.023000
|
||||
CVE-2021-39226,0,1,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
|
||||
CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
|
||||
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
|
||||
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
|
||||
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
|
||||
@ -183276,7 +183276,7 @@ CVE-2021-41273,0,0,99397a929c92479c9f01da437507d101a5bf50eb4f748f5c7c67a12a6baaa
|
||||
CVE-2021-41274,0,0,7158857e7d9becd3b84392aa0da7e34d2226b9ffe9aeee343c59c3868ee024e3,2024-11-21T06:25:56.540000
|
||||
CVE-2021-41275,0,0,3a49ec4bc6781140610890599c8c13b510fa22785ea728e600da8381edd2a293,2024-11-21T06:25:56.670000
|
||||
CVE-2021-41276,0,0,77b0bd73bf0cb70e85934ea984c04179674e78ac11807816d660704623492517,2024-11-21T06:25:56.823000
|
||||
CVE-2021-41277,0,1,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
|
||||
CVE-2021-41277,0,0,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
|
||||
CVE-2021-41278,0,0,12082549d8e21ddc5cfe62e6f0a9abd13e7d3cdf0888335bc0d75510b76033a0,2024-11-21T06:25:57.203000
|
||||
CVE-2021-41279,0,0,08dbaadaa38da000bb5a66fa4874a7c1582995ca6d179537b3e54f5f561379fd,2024-11-21T06:25:57.340000
|
||||
CVE-2021-4128,0,0,a7ff56c7d35e301b0a6c7f5571b37ed5026ab961314fd66e1ee36016b813b933,2024-11-21T06:36:57.697000
|
||||
@ -194265,7 +194265,7 @@ CVE-2022-24812,0,0,ba1810f3f8f684688400e185ebc7233835c3ff6495510564b8dac490202d0
|
||||
CVE-2022-24813,0,0,877de67ab2140b2965630d6b87135eaf6ace0d62798d255eaaad903269f6f716,2024-11-21T06:51:09.340000
|
||||
CVE-2022-24814,0,0,842db0f91ff63ac21bda327b9c3901d7b44f013aad2b3062d150a0c3eda475d7,2024-11-21T06:51:09.463000
|
||||
CVE-2022-24815,0,0,27e7266001f871c48274f931037b93d1533250e699e309d319783ba507b69571,2024-11-21T06:51:09.587000
|
||||
CVE-2022-24816,0,1,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
|
||||
CVE-2022-24816,0,0,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
|
||||
CVE-2022-24817,0,0,a9b66571183a48bb0e197f3de17073db6b3e8acb18975114b7691755a44c848d,2024-11-21T06:51:09.863000
|
||||
CVE-2022-24818,0,0,a1ec3bb9985bb733a04420f18fd769587d8bdd5026fd3de5f563672d821e2f49,2024-11-21T06:51:09.987000
|
||||
CVE-2022-24819,0,0,2c88a72c04bc40dc0e3ecd356f74d1b49fc751aa38ec58544ec9cfabe9b06b80,2024-11-21T06:51:10.110000
|
||||
@ -194906,7 +194906,7 @@ CVE-2022-25596,0,0,e20895499b50f257835b5cef4ccb445e059a896f4752a079569605fe5e1a9
|
||||
CVE-2022-25597,0,0,eaf37006afa9b701597a13e86a6a8b9dcd23db62b468f93a19bc35ac7c3bdc9a,2024-11-21T06:52:24.670000
|
||||
CVE-2022-25598,0,0,71bd9180efa2a8b6c83e3b611fbc1013a1ddce4691267feb04933d7262365773,2024-11-21T06:52:24.793000
|
||||
CVE-2022-25599,0,0,b2500cb798c90f66522b41c69e71517db2f6434ee5e39ea15b171e36b340a1fb,2024-11-21T06:52:24.917000
|
||||
CVE-2022-2560,0,0,1395889ddce333b10cee723a7ebfe84b1b4f3ba67cdf63ffb9404e0442b026ba,2024-11-21T07:01:15.113000
|
||||
CVE-2022-2560,0,1,76499e3463de56f9dfdde31f5da65b99e4e8dda3455c16cb790a47b23dffd960,2025-02-18T16:15:10.817000
|
||||
CVE-2022-25600,0,0,495b4f6c50a3d5cda10e78d5d8ebcc64b109954b157fc78da0e3a2ad57d29580,2024-11-21T06:52:25.050000
|
||||
CVE-2022-25601,0,0,3dbf007ef693de272e8034005f728c29b9ddfaba0684d5643181ce0cd9f79fb5,2024-11-21T06:52:25.193000
|
||||
CVE-2022-25602,0,0,42071c67cba7690029535ff818083bdd303016e39e645999fd4f9bcbe45b73f2,2024-11-21T06:52:25.333000
|
||||
@ -194917,7 +194917,7 @@ CVE-2022-25606,0,0,f88974541eb3aa3a839095fe8d26a0574cfc401492b671fc89527187563cd
|
||||
CVE-2022-25607,0,0,4315807fe55335037587ad4704a9d2df0c06852be854f37614ed33a9c7d8034e,2024-11-21T06:52:25.970000
|
||||
CVE-2022-25608,0,0,5a9acd8289576bd8a115f40e2c67e4376263bf0971af6ae43e6f89e05a419f1a,2024-11-21T06:52:26.110000
|
||||
CVE-2022-25609,0,0,599de89a5a011caeba847a172dec58ccd9b1ee3d45d7b41cf184df65b49da5e7,2024-11-21T06:52:26.233000
|
||||
CVE-2022-2561,0,0,96b65e85c790b29d4938c07cd065406f1ab3b5bc53fe483cf86a12fe38a6754b,2024-11-21T07:01:15.230000
|
||||
CVE-2022-2561,0,1,cf9fbb69422957338b663b01a457a426c4f28047f792f9304090478a6cd296f4,2025-02-18T16:15:11.030000
|
||||
CVE-2022-25610,0,0,63b2067f59f7d4a1932ce97af52643e33bc4cb7a351d7eead5f7bd19e7a96fd1,2024-11-21T06:52:26.353000
|
||||
CVE-2022-25611,0,0,642a5ed9c9d3e03bed247169366e2e3d0121a3af4fb9988816db035e26288f0d,2024-11-21T06:52:26.477000
|
||||
CVE-2022-25612,0,0,6585fbc0b1fc2637237fd46922b6d370aff096201ee86368ec9c334416ab691b,2024-11-21T06:52:26.593000
|
||||
@ -196438,7 +196438,7 @@ CVE-2022-2749,0,0,7aa26a0c23dc155071b3059a24689083204379ce2615654a58696d67869e26
|
||||
CVE-2022-27490,0,0,caa845b0bc3c21e72ec430c1bb91d0947629956b0eead13ce1096d9d7ae094cd,2024-11-21T06:55:49.757000
|
||||
CVE-2022-27491,0,0,8a7d2a569689762339050e1db2eba7ddc2305665c61fafc0e8565e91ee3fb10b,2024-11-21T06:55:49.903000
|
||||
CVE-2022-27492,0,0,ced91e0048ca7c83b66693a736c13d17d779d0f9b27c488111d6615fa1e551b6,2024-11-21T06:55:50.043000
|
||||
CVE-2022-27493,0,0,ac4b52c241a158cf2e1e484102384f85fb35c448f1c8cee955f31b0620840c35,2024-11-21T06:55:50.167000
|
||||
CVE-2022-27493,0,1,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000
|
||||
CVE-2022-27494,0,0,b5e4c7775e0d6176d23b0fb12b6a970b96dbce2c8884f72b3a008868b3622bc6,2024-11-21T06:55:50.290000
|
||||
CVE-2022-27495,0,0,71ecb2cc76801c85c8467f4395a420002118e2b27be3cfb1821a32679e396cc2,2024-11-21T06:55:50.420000
|
||||
CVE-2022-27496,0,0,525472f4d923f606f377ed6195861e6894790651b972bda97b2d24b4e96f84ab,2024-11-21T06:55:50.550000
|
||||
@ -197043,7 +197043,7 @@ CVE-2022-28246,0,0,42e72399563b8c397b24f5e80e1002917bc453725243f9a631a46b8760810
|
||||
CVE-2022-28247,0,0,d91e41860bc8e908ac7755fa918ae493c1b0e1029ea2b2056474b9de3bf43e07,2024-11-21T06:57:01.847000
|
||||
CVE-2022-28248,0,0,4c158f114b85533d8f8f6dbcc7d56eb3e048d749afb1c18f2771c4bc03f575d0,2024-11-21T06:57:01.967000
|
||||
CVE-2022-28249,0,0,a59055a5419ab6c55b17a30346ba204a34fc7fccc3398b4f67e692bb248781fe,2024-11-21T06:57:02.090000
|
||||
CVE-2022-2825,0,0,584e963cdfe23de28b0e2b3a20e87ba68cf56e0e1cb8bd0ed82ef7365edb8bc1,2024-11-21T07:01:45.653000
|
||||
CVE-2022-2825,0,1,40f70f6e9293a0a2adb70eb6f87e41444a7b7795afc5d1a781898b0c3c230f18,2025-02-18T16:15:11.223000
|
||||
CVE-2022-28250,0,0,283a2e1a389e53f2a177db94792d609666d9596289fd137bbe4f4bdbc75daba8,2024-11-21T06:57:02.223000
|
||||
CVE-2022-28251,0,0,32e68a13357ce7ffa3e0f8f15098c1b43fe63e6e04e7216ae09a4d7571dcb7bb,2024-11-21T06:57:02.350000
|
||||
CVE-2022-28252,0,0,c1c1a9374bea5d81dab884e8cfdf3684b057f64cc61c4a729c7d851db38a852a,2024-11-21T06:57:02.483000
|
||||
@ -197225,7 +197225,7 @@ CVE-2022-28471,0,0,22daddaeedef7bf9aab39f3549190b2978c74d629d8530f5d0fe76defac80
|
||||
CVE-2022-28477,0,0,e71a98c918c772ec3dfb27061456e47f05943a8f0537c4c7b6c2b43844e0347d,2024-11-21T06:57:24.360000
|
||||
CVE-2022-28478,0,0,8d9bda9a2e1a2e9d91bb3cc6c0b2ec7e8233af87753711810fc4eb8554a71ad1,2024-11-21T06:57:24.503000
|
||||
CVE-2022-28479,0,0,bf3ccfb37fd50246d1ee97aa4ea7efaf57fa4c4e5539490bf2c40fe8021ca895,2024-11-21T06:57:24.650000
|
||||
CVE-2022-2848,0,0,f58d1269d8a1dc55ebd4269c7f409207ae8d9a0cb217ff16ba4866d81df6b361,2024-11-21T07:01:48.140000
|
||||
CVE-2022-2848,0,1,15aac2bbc76a073ca891b3e3ba3f9fb9bf9e09c4d3707e4aa233f2752b51e5d3,2025-02-18T16:15:11.440000
|
||||
CVE-2022-28480,0,0,e54d1704695ba9f75944951bfd24a58836e23ddb8fee804a7b42639257c1adc9,2024-11-21T06:57:24.790000
|
||||
CVE-2022-28481,0,0,17953b88e80bda6244bb3c037dfcaee26ba958ace6634f14c6cd34c20e8e36e9,2024-11-21T06:57:24.937000
|
||||
CVE-2022-28487,0,0,adbca582fe216ceea0244fed85d992720694ffad6c331fdf3b6d541c21b44d1c,2024-11-21T06:57:25.087000
|
||||
@ -197267,7 +197267,7 @@ CVE-2022-28550,0,0,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131
|
||||
CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000
|
||||
CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000
|
||||
CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000
|
||||
CVE-2022-2856,0,1,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
|
||||
CVE-2022-2856,0,0,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
|
||||
CVE-2022-28560,0,0,e4b562b74d9cdbf01bd96ffaeba2fe191d5510688ed63ab34991480eb886b49c,2024-11-21T06:57:30.927000
|
||||
CVE-2022-28561,0,0,518c19fe66b4e09bc9800bc1acea302b3504c0f43ee73ab2e30472e903ec5797,2024-11-21T06:57:31.067000
|
||||
CVE-2022-28568,0,0,beb032e0c658d78fbcbcb904731866c4eac85eb53ad4d016a962c9ad42c8eec9,2024-11-21T06:57:31.207000
|
||||
@ -197379,10 +197379,10 @@ CVE-2022-28681,0,0,b8f43a20c2b57f6a0047369d1b230ed63c65321a6161ac4f8a31ae69a945d
|
||||
CVE-2022-28682,0,0,bcb0dd1ae49198f8c0556b2624b0e12d2675714cdc534d6a7c47a01283a9b4f7,2024-11-21T06:57:44.080000
|
||||
CVE-2022-28683,0,0,816d2a1520e8e5feb91adc57ce7b5e8c27cb3af115756c8d55ddd45d4976a7f8,2024-11-21T06:57:44.193000
|
||||
CVE-2022-28684,0,0,9dc7594b3784884140b568f0f3dc9b301f745444d48b4d2178b9170bf14bdfe3,2024-11-21T06:57:44.340000
|
||||
CVE-2022-28685,0,0,152fc0fbd8ee18c7230c5f3d5d704d88647ba8dbb768dee591dcc5b94526108f,2024-11-21T06:57:44.447000
|
||||
CVE-2022-28686,0,0,fc5a8d3981233b0aa83c78ccd20ad35a64d3a864fee4217312c9452af1d74508,2024-11-21T06:57:44.560000
|
||||
CVE-2022-28687,0,0,7e8679b0cab2bfb90c67e0195d85678c882fbade624a2fdf1685f8430d9cff7b,2024-11-21T06:57:44.670000
|
||||
CVE-2022-28688,0,0,83a2d67d6cbd25bab7067bc2117992af15ed92b2d338438f593120b785052340,2024-11-21T06:57:44.780000
|
||||
CVE-2022-28685,0,1,13fdb21feec95cfcf189f49dfca8222824884ec433e23637260407a27e43da2b,2025-02-18T16:15:09.603000
|
||||
CVE-2022-28686,0,1,cebc1c945513cb1513b6df344dcd83d493529699cb43e1a8063801dc36e15a7b,2025-02-18T16:15:09.843000
|
||||
CVE-2022-28687,0,1,cea133e37c0d577f02bf1101ea517f348ecd561600f39ac93e5ef05a72fe43d0,2025-02-18T16:15:10.037000
|
||||
CVE-2022-28688,0,1,55c73171fec355065b988971451e8c5b848b33b671f4f0c66ded8fff4eeeea1b,2025-02-18T16:15:10.237000
|
||||
CVE-2022-28689,0,0,4edf7f56430cc28a3558cb1cd6b706bef48e22bf9a07b07fb6c8e6a850c09772,2024-11-21T06:57:44.890000
|
||||
CVE-2022-2869,0,0,a6c41e2e21e8e9f4dc93eb0145cd5fd437c35477a6c25e9b79b4ec21715ae9b8,2024-11-21T07:01:50.573000
|
||||
CVE-2022-28690,0,0,4e56822b4ca0b82e0ba605af45b9bee55966330e5871f1dc9b7083b71a61e0d7,2024-11-21T06:57:45.003000
|
||||
@ -197546,7 +197546,7 @@ CVE-2022-28854,0,0,4d1c220322567ff9f4708969d7d10eb6959c2e153abb29c60fad9cd137da4
|
||||
CVE-2022-28855,0,0,bf12e5d75021f7d2d78ab47b552c3ab814362b0a565c0ae025e8b59ea8cc14af,2024-11-21T06:58:04.083000
|
||||
CVE-2022-28856,0,0,97b5cb854c42e2bba4bec2f848d8712db4c9642ef906b4e7ec288909a1b2f958,2024-11-21T06:58:04.200000
|
||||
CVE-2022-28857,0,0,5a8fdec603118a8974a915694450f8aa4b6b3ba53be0b982bbbdbf1bfe0eb3cb,2024-11-21T06:58:04.323000
|
||||
CVE-2022-28858,0,0,d23efb5965bfe49f553eb87aa86ee83508daff6ac4e655ac793d8b70ce1506a3,2024-11-21T06:58:04.450000
|
||||
CVE-2022-28858,0,1,9e7e73d449279aab38a9df1761b011f1b66cfa107d24ed8c9c98f0221de31ce3,2025-02-18T16:15:10.440000
|
||||
CVE-2022-28859,0,0,a02312803b54899a0654f8646f9d712bf9ef577e625f0fe5c5597df0c05b7184,2024-11-21T06:58:04.560000
|
||||
CVE-2022-2886,0,0,28abfd9bb6d6a1fe516db20229db64e5d00f417a56ab77e71cb1ddbabe24ffa6,2024-11-21T07:01:52.320000
|
||||
CVE-2022-28860,0,0,4d02378e35e0791603644de01c1793437119d0059fb13a48a51bed20a880b488,2024-11-21T06:58:04.703000
|
||||
@ -198099,7 +198099,7 @@ CVE-2022-29503,0,0,fe6627b1984ed177ece5e234f18079d6f3fc74ce3b11a4bd045d18a306497
|
||||
CVE-2022-29504,0,0,22a099b727838bb2a7351196b16a44e93ae2bd9429da35a97f193aa24f9c461f,2023-11-07T03:46:02.927000
|
||||
CVE-2022-29505,0,0,359fae353ad08726f4eb696e09d2ad139e0df88243f5d6fd78bf52cc106df861,2024-11-21T06:59:12.817000
|
||||
CVE-2022-29506,0,0,3962b51c5c27127830a629454b32828486786c50629dfc167ed1a3c071df6910,2024-11-21T06:59:12.933000
|
||||
CVE-2022-29507,0,0,27dd9000741eeff9b850bf513c99acf1a13f8ab0cd1f28379608570939c0aa0f,2024-11-21T06:59:13.363000
|
||||
CVE-2022-29507,0,1,945b58f924585e3341e2c3d1e885edf8373ff44b156db3427d9d9620e3f37437,2025-02-18T16:15:10.620000
|
||||
CVE-2022-29508,0,0,029dbe6b5c8453a90a1bede64abc7355dcd4eee2e86a4c637313c074f5e8cda3,2024-11-21T06:59:13.490000
|
||||
CVE-2022-29509,0,0,28be0bb8f6027f6a3f64d19fc3df6f9375536374635311b07102c0cc08182e76,2024-11-21T06:59:13.617000
|
||||
CVE-2022-2951,0,0,0a2ab5f8c78419f2afab990815bc7f66b5f4d6d9104075eb34ffa8066ce52a9b,2024-11-21T07:01:58.693000
|
||||
@ -201225,7 +201225,7 @@ CVE-2022-33205,0,0,ad8faf3876c0077e3cb7d3d6e29faf9b902785a9eceab895247358a4f738f
|
||||
CVE-2022-33206,0,0,e32e9be49b2eb2c4208bef01f53fd6d8a5f6271a592dbd0c7b2725f0c3f9d4ba,2024-11-21T07:07:42.970000
|
||||
CVE-2022-33207,0,0,e4e6e0d2c508d1fdcbf5089ac279cd3000758bacc2fa3199bf3036006f634fc2,2024-11-21T07:07:43.093000
|
||||
CVE-2022-33208,0,0,2a6f2df46feca332d01a82d64766bae5ecf7c98e1aa88ac96cab3c28dffdb603,2024-11-21T07:07:43.217000
|
||||
CVE-2022-33209,0,0,0ebe2a6927b6f5e61b49a2061f18eb644565905c802cd81be878ea0c883c4bef,2024-11-21T07:07:43.390000
|
||||
CVE-2022-33209,0,1,8ef77cad81932fd6188fdadf89d706a5a1ae5b860bd89c91721b6ba1ecb1e7b8,2025-02-18T16:15:11.617000
|
||||
CVE-2022-3321,0,0,0b6f40cf08d2d5ed5e532a099454d95b632accf8c53ec46ef50e3d2a8b5fa145,2024-11-21T07:19:17.507000
|
||||
CVE-2022-33210,0,0,2696f6298e82345893f2e01081ffb8df669d3082c9469855a36269a3df50848a,2024-11-21T07:07:43.520000
|
||||
CVE-2022-33211,0,0,827df58dbc8d588d3b82af3e9575085e665db249aae05c37ee62cd1a91ffe7c2,2024-11-21T07:07:43.700000
|
||||
@ -202092,7 +202092,7 @@ CVE-2022-34484,0,0,3f533b42daa5e7fd1f916268062039bde8318359b70f5d96545b1be970c41
|
||||
CVE-2022-34485,0,0,cf1c5fe8184d6bbd2a9c1cd4bc47ae63f9b901e1b67c37ad6be7e135040e3c02,2024-11-21T07:09:40.087000
|
||||
CVE-2022-34486,0,0,73a71e1f77d0db95faf44d581ebc7697f58e47daa52f286b1737b58b52030cc1,2024-11-21T07:09:40.210000
|
||||
CVE-2022-34487,0,0,6ce1ccea025a4a271a03bc9f211e020097976ad6b82aba7dc5230a69f3b14d2a,2024-11-21T07:09:40.343000
|
||||
CVE-2022-34488,0,0,df94e6a2937bc515a012a3a51a6b4d140e9fa6af146bcf4274b8888dd95ebce5,2024-11-21T07:09:40.533000
|
||||
CVE-2022-34488,0,1,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000
|
||||
CVE-2022-3449,0,0,0388ee85291cdb5d5e1be71b8006e97d902b56f4af3c11559fb4a756ab252692,2024-11-21T07:19:32.820000
|
||||
CVE-2022-34491,0,0,6187ed181d7b674a78943e3d774b41de94989ca40b50c2995c2fe8e77a783692,2023-11-07T03:48:43.663000
|
||||
CVE-2022-34494,0,0,8444dd94d30d9fcb0438cd24fba1ee60981ff98fc80786b17183be67509bd0c9,2024-11-21T07:09:40.703000
|
||||
@ -202257,7 +202257,7 @@ CVE-2022-3471,0,0,495d0e8dcc7168cf73d6752bd352dc355254512638404907315f8c8587cf20
|
||||
CVE-2022-34710,0,0,873660d048e28a149e24e157bf627764663cd5072c4620ae24c67a19668c7527,2024-11-21T07:10:01.627000
|
||||
CVE-2022-34711,0,0,c44da15e9a9f787ffdb3f343336e0d67972465f3cc3917d88950889394348c41,2024-11-21T07:10:01.790000
|
||||
CVE-2022-34712,0,0,b3b95e93f77b00695ba541618424625a617fac2c395c356b58b85959b0196871,2024-11-21T07:10:01.950000
|
||||
CVE-2022-34713,0,0,c213befcfa76bf61c530a8d956ecc8d9bc6f1dacfc62577512f94aa0ad7e8731,2024-11-21T07:10:02.083000
|
||||
CVE-2022-34713,0,1,2f94f2d82dff054953e34a660855d92ec8337c2f9a6efa036d564437fb454930,2025-02-18T15:06:15.647000
|
||||
CVE-2022-34714,0,0,cd7847bb81aa6cee536f4b993097e8160f3dd670d1c0e9f6376413be64c73e46,2024-11-21T07:10:02.283000
|
||||
CVE-2022-34715,0,0,1a6430359b7e294a3661adff75f8cbcd008524c0b3380f11bf12898f184ac7f2,2024-11-21T07:10:02.580000
|
||||
CVE-2022-34716,0,0,823de494d6afe6089e979b6e89b590f446004ca2a60a6ac4e68b91b576e3ce40,2024-11-21T07:10:02.710000
|
||||
@ -204223,7 +204223,7 @@ CVE-2022-36965,0,0,0ca23e8ac16cb88858e1fe0eb569827b54b6cfc7d3aeecce850c21cf96b18
|
||||
CVE-2022-36966,0,0,fccbf34c70f1f2f8ada911a76c54bfb7636a8f0bb16cef989a57c4cc9e296b6c,2024-11-21T07:14:10.403000
|
||||
CVE-2022-36967,0,0,3ece16c6a6e55181708868bbad5290d8849bd16a56f97d5755153213a266ceea,2024-11-21T07:14:10.527000
|
||||
CVE-2022-36968,0,0,f423ae7f2d865457f2551156d8fb7595788a1b7c0617aa72595eafd6ad4f563f,2024-11-21T07:14:10.677000
|
||||
CVE-2022-36969,0,0,0afc5bff7d868422a124dbab056241ca446f34a21466cf8be80c181b0c15e773,2024-11-21T07:14:10.820000
|
||||
CVE-2022-36969,0,1,f9de56edb316c33ae9002ada5cbf6c225a11c92e9932b9c8ffe5dbb24be9fcb2,2025-02-18T16:15:11.987000
|
||||
CVE-2022-3697,0,0,2f8b38c5a7b1843fbd9fd8a8a356e31179919e604675a74b4f7d9b071a38d1ee,2024-11-21T07:20:03.293000
|
||||
CVE-2022-36970,0,0,cb3c9c8a4054905fdd0c810ac8bf9d3add8718beb8c8c6fa550ec3a3d4370b03,2024-11-21T07:14:10.953000
|
||||
CVE-2022-36971,0,0,9a126f8836db514d07730137b1743a7c1da7b8e3225a7872e1dc3a89ae49569b,2024-11-21T07:14:11.087000
|
||||
@ -204513,17 +204513,17 @@ CVE-2022-37348,0,0,839121da509d7997c32a937a2927f2a149c85a419aa5334432df88972878e
|
||||
CVE-2022-37349,0,0,be4c38fe75bdf20aeed9cb31e90b4ed76bbc7c21e042d700d48481bc68a7343f,2024-11-27T20:11:45.410000
|
||||
CVE-2022-3735,0,0,6a3a0d98c65ef51e5e82db93717d565b35d58fd0d38d66a0856b2386409b0e4d,2024-11-21T07:20:08.103000
|
||||
CVE-2022-37350,0,0,2b8c3c24a3100b5d8e15e20e8e0d1fc730171430393e497c152d93645d5758fe,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37351,0,0,01046383c63ecf3dcc1b2b62eb931a1f970df41eff31fac963f42608f4cb1c03,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37352,0,0,29811d70e67480c5ae6a50339f8ef1bf240f637c50ac7705b92155c4af9bc847,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37353,0,0,d958d9c5f95a2d12b6554f350242c837b759201154e0df2070ac95e71520c8d8,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37354,0,0,8c5f73e4710d71187ccd4bb2f5e35a9d35fa3991ad2444f7906c5eeb2926a2d9,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37355,0,0,3f06165ac7692aa506dc379953c4d15c71f9fb28aeb9043edfccfb2990d973c1,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37356,0,0,ed207f6de49f0f97073773917886fafd7c7e26add21498c5a152314e65b3cbba,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37357,0,0,8f75ea8a83bcdcea506d766db7c6bf4a84f454444778e425a0ae209cbb47077d,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37358,0,0,14fc86776ec261982cd92d8f6f23258a89a481a4bdc8a1bf8dede56a6bcb2b7e,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37359,0,0,a20a29eab6e9d892f6e71ac600e5d128cf2387332a5597df1fe5874ab1dbd08c,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37351,0,1,d5b8044a97760d6c3234d0a8fd27735626dfde61898efd736ea6515abb08e21e,2025-02-18T16:15:12.197000
|
||||
CVE-2022-37352,0,1,f61c84cce450042b8c3be2e1dac417a8c1d9f399e47918172cadaab2818d7e42,2025-02-18T16:15:12.407000
|
||||
CVE-2022-37353,0,1,8a685d2101ee9c996c0441515374084c6315df48869471bc8b533638c837669b,2025-02-18T16:15:12.613000
|
||||
CVE-2022-37354,0,1,76831841e61d25ac28d8d2d714ad74be6c1f83759ad1c4fdd8f4a96b207cf21d,2025-02-18T16:15:12.807000
|
||||
CVE-2022-37355,0,1,aac48491f25019390b2ebcae75dd23911f9273182a607c612c75f13b1d8a9c53,2025-02-18T16:15:13
|
||||
CVE-2022-37356,0,1,f85d6dc20ac1d33a6f06b49f45e0e101ac386f9508c0a853de0ee1142b5987f4,2025-02-18T16:15:13.190000
|
||||
CVE-2022-37357,0,1,c6aa4356d882113ccf9068f91803a778fd76dc9bc9b24c6f11dc3eeeca46c767,2025-02-18T16:15:13.383000
|
||||
CVE-2022-37358,0,1,248c48d7aae1d619d41ba5f9aad6790a3a8578110c35c90b6c7480cdbec9b559,2025-02-18T16:15:13.563000
|
||||
CVE-2022-37359,0,1,8e1d405058a35dad2fc42f0173eb2d5d81acb1529bee17e71ece202f651d9586,2025-02-18T16:15:13.747000
|
||||
CVE-2022-3736,0,0,dd1289d0aeed63a5c6b3760a10b956fb9d3fddd85d529817d7d1f2e9a1ed6ea9,2024-11-21T07:20:08.243000
|
||||
CVE-2022-37360,0,0,fa0b960e795ad937f8501f34b4600d6c81a3181c1334aecb059bd02691b1a87c,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37360,0,1,90e9b2914e31243dff9f80f7d72ff9db2f0e855d0d259f42c3dd7f02da1e65f0,2025-02-18T16:15:13.940000
|
||||
CVE-2022-37361,0,0,3ba217ae52772213ee60da4f905ed8e862327f9b6db9244049f77d49ebc5aa06,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37362,0,0,c03ac04d696b68b10b811ec3825b2727875f9968ad246df0c4439e546ab54bdb,2024-11-27T20:11:45.410000
|
||||
CVE-2022-37363,0,0,e48d1b5269159bc30e4686ce829dddc03df755715a821c209d4f3f893da32be1,2024-11-27T20:11:45.410000
|
||||
@ -204856,7 +204856,7 @@ CVE-2022-37965,0,0,7382339f174de9fdc4b84849a25276f93f4cba28d66c4e02be65e6c4c9a26
|
||||
CVE-2022-37966,0,0,e7ca4037eaa67c01820375a90d40ed51c66c9acd2b7e40a9f1ea8dc246ba3edb,2025-01-02T22:15:09.867000
|
||||
CVE-2022-37967,0,0,f583f9211879c0c61033a7b05dcaffc689e2c7f204c11c47debf243169222056,2025-01-02T22:15:10.010000
|
||||
CVE-2022-37968,0,0,6a79a831585dfc274b8d06497d20b84f4f0f567a45a9c981f18e711d1714e0cd,2025-01-02T22:15:10.143000
|
||||
CVE-2022-37969,0,0,730c88e6266ce922e60fc7a16119f2527fd7c0c5bd8ada716eb5a9782c859004,2024-11-21T07:15:28
|
||||
CVE-2022-37969,0,1,9d1eadc38cb0600b3949309c7df5f942430e24319949aadeb5b16b38a5e317b3,2025-02-18T15:05:07.903000
|
||||
CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000
|
||||
CVE-2022-37970,0,0,e7f565127a61644046a05135c4956f50b7b6d230fb402b297bf3685c102bf1dc,2025-01-02T22:15:10.263000
|
||||
CVE-2022-37971,0,0,3eed1a5f28bd8db707e5862d22ffbad5d063c63f776130157ef9ee169fa1c3c9,2025-01-02T22:15:10.393000
|
||||
@ -205622,7 +205622,7 @@ CVE-2022-38902,0,0,0bd5ef2dfe8316484f8c6d7482b1c583413e4573c37fdf89a96403f325086
|
||||
CVE-2022-3891,0,0,2be78a92b98d47adb36fc65d0ff218706c484f069fbfa886887fecec474e9b83,2024-11-21T07:20:27.710000
|
||||
CVE-2022-38916,0,0,a11d9ae396e5442a1e1b83293983e520978271a6b8ff587580e4509a9a60d827,2024-11-21T07:17:15.400000
|
||||
CVE-2022-3892,0,0,d95718c65c426e5ff39e6f74427991f85da1cec4cb39d5907cab3ebcddf469de,2024-11-21T07:20:27.833000
|
||||
CVE-2022-38922,0,0,804a32ee2520431a69ab5983d5d036a74ac60d2b655bdb43d23b49f311cd8acb,2024-11-21T07:17:15.550000
|
||||
CVE-2022-38922,0,1,75f26da8291c19cb45af748b522f8547a93a4d05875ae6104d4bc55adad5e809,2025-02-18T16:15:14.143000
|
||||
CVE-2022-38923,0,0,49de48be827439aad30a1200f1f3b4997a55bea4b903a7990aec70cc1069ef83,2025-02-14T20:15:32.203000
|
||||
CVE-2022-38928,0,0,6b98a5bb7c0fa08033d7aaa0d401c575e5bf6c62505e34d5677b96483eb9fdf9,2024-11-21T07:17:15.873000
|
||||
CVE-2022-3893,0,0,169977ea85d0f87efc6cc15872f3136d1ff5790f1b49d91b9e93fa4cc18a8375,2024-11-21T07:20:27.953000
|
||||
@ -207183,7 +207183,7 @@ CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb
|
||||
CVE-2022-41045,0,0,2c7746ae8e1e932b2d88ac880d0098f2cc0f1b86f29deb55d7d9973c6c689257,2024-11-21T07:22:30.670000
|
||||
CVE-2022-41047,0,0,6a0ae7ce4562257b0d603bd01b91f8be796bd6f172a32ffa93b6cd11cdc35e85,2024-11-21T07:22:30.820000
|
||||
CVE-2022-41048,0,0,480414d14aca950b2941a5ecf68dabd47716cb3806071b62a04418f97fdf5db2,2024-11-21T07:22:30.990000
|
||||
CVE-2022-41049,0,0,27884c116a645ce71f62becbe9f35ff894f2a2ed0e0b2acece8df2240db3a921,2024-11-21T07:22:31.177000
|
||||
CVE-2022-41049,0,1,8ccee6a4917e04d77593cb07a5fd9144c6398eed50a20a486b4ea7c3222555d4,2025-02-18T15:02:20.783000
|
||||
CVE-2022-4105,0,0,cd1b56dce82e30d11c9a21d18fca44a3e88c77944c888fa8e763622943817a5d,2024-11-21T07:34:35.557000
|
||||
CVE-2022-41050,0,0,b9a7da6a62895ac068765a81a1753cf10ca24d8496ba063a3fb037f63af3ecb4,2024-11-21T07:22:31.310000
|
||||
CVE-2022-41051,0,0,91f5c37a632e3e8c803acf4d44cacf6e6914c78e08e48fffc960383c791cc77d,2024-11-21T07:22:31.457000
|
||||
@ -207209,7 +207209,7 @@ CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f
|
||||
CVE-2022-41078,0,0,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000
|
||||
CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000
|
||||
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
|
||||
CVE-2022-41080,0,0,118ce96839b1c410d17219d24a9d8f3d5178ee213eae751c931efd6882bfa0af,2024-11-21T07:22:34.373000
|
||||
CVE-2022-41080,0,1,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
|
||||
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
|
||||
CVE-2022-41082,0,0,b6b4e5125804eda18b18c5254fdf07d51e04e80e78d97f6677c805c3c481e123,2025-02-04T18:15:32.070000
|
||||
CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000
|
||||
@ -210983,7 +210983,7 @@ CVE-2022-46165,0,0,b52f4e59ab87d9ef826d1b1aa91e6a7d2ddf200190d4f26766b76124199a2
|
||||
CVE-2022-46166,0,0,12dbb8116693845af5bad0761e01ce8e5a1e7215ce1813d4f82e11aaf281dd95,2024-11-21T07:30:14.600000
|
||||
CVE-2022-46167,0,0,9fbc7368e3aa4e77dec66e0cd263dbe6cd1e49e34d7c4d09dd2bdc23ec0be5dd,2024-11-21T07:30:14.737000
|
||||
CVE-2022-46168,0,0,cfb90e24d3dcc101412afd836697be794033b1f4d9d566f7537a84c49dad0fbf,2024-11-21T07:30:14.850000
|
||||
CVE-2022-46169,0,1,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
|
||||
CVE-2022-46169,0,0,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
|
||||
CVE-2022-4617,0,0,8ebdc24048b2debd57a0848e54b1493c0fac1e5b4a06e75da5ac8ae75c06b81d,2024-11-21T07:35:36.497000
|
||||
CVE-2022-46170,0,0,7d0728aad33cc4004748812cc2b8df0d4850c877dc0ccd5269efed0d41cc4c76,2024-11-21T07:30:15.103000
|
||||
CVE-2022-46171,0,0,b44f4ea344bc0e6f16aab325e032b48c286c83d7bf551fdc6b86ced5865dcaba,2024-11-21T07:30:15.227000
|
||||
@ -212326,8 +212326,8 @@ CVE-2022-48217,0,0,2db66377450a2693874a7822c694ae856a4d238b3dbbf8a1729f58effc577
|
||||
CVE-2022-48219,0,0,1e0a9254f8a4ff75cfb5e8f8a9952b48af204b78dbe1ccd97aec4e82c9b9b99d,2024-11-21T07:32:58.903000
|
||||
CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bdae,2024-11-21T07:36:00.857000
|
||||
CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000
|
||||
CVE-2022-48221,0,0,e232e59ba0cd20bf6c005d06a45b36104abcb33181d532af807e9266804a61cd,2024-11-21T07:32:59.250000
|
||||
CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c35c,2024-11-21T07:32:59.403000
|
||||
CVE-2022-48221,0,1,8e2b6ae95b56c1ec354dd13a73e6f16c93f2d3bfd4f5ac2a77c5adbba4615406,2025-02-18T15:15:12.600000
|
||||
CVE-2022-48222,0,1,672326fbe2ac7aba88e52da31832fdd5a20e47d0b8342cf0cad6c4633e11be9b,2025-02-18T15:15:12.803000
|
||||
CVE-2022-48223,0,0,27d6b67daff3b23e83f3b18569807a955e5a339f08da09cf3478a30845e757f3,2025-02-14T18:15:22.503000
|
||||
CVE-2022-48224,0,0,94b36feb3339eccc317c82f96017e292429a84f2f92b12839aa24a95d48e2890,2025-02-14T18:15:22.703000
|
||||
CVE-2022-48225,0,0,70a21bc233df7974e16705f02ad67bbb6b9de8ee1683ad1cefccc4ef0a022d21,2025-02-14T18:15:22.903000
|
||||
@ -213404,7 +213404,7 @@ CVE-2023-0220,0,0,e05dc53e7df0257b386411675d30bf07fe2878de7c6c26b2206eb3f6c3f230
|
||||
CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000
|
||||
CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000
|
||||
CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000
|
||||
CVE-2023-0225,0,0,de83a7dc23a66cd5eda61299e05b2326fbf82eff1268c3e59540b7822737412e,2024-11-21T07:36:46.750000
|
||||
CVE-2023-0225,0,1,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e85,2025-02-18T16:15:14.343000
|
||||
CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000
|
||||
CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000
|
||||
CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000
|
||||
@ -219080,7 +219080,7 @@ CVE-2023-24709,0,0,95724b3cdd469490b5d656e22c325de29d60ac897a910128b841653f99d55
|
||||
CVE-2023-2472,0,0,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000
|
||||
CVE-2023-24720,0,0,6b8bed746e2c0ccf07d91fd8c0cf084ef06296dda35fea10ff93f652dde8ce24,2025-02-11T20:15:32.117000
|
||||
CVE-2023-24721,0,0,713c683cf74d5b07e827992264dc10f34b57246cabaf877eef720bd3ce53e5b3,2025-02-11T16:15:32.340000
|
||||
CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a64f,2024-11-21T07:48:19.893000
|
||||
CVE-2023-24724,0,1,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f84b,2025-02-18T15:15:13.037000
|
||||
CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000
|
||||
CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000
|
||||
CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000
|
||||
@ -220806,7 +220806,7 @@ CVE-2023-26822,0,0,962ffff9470d823e1ee37e85ddd889c14bbf8c919a0b61f3b268dbcf52cf8
|
||||
CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000
|
||||
CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000
|
||||
CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000
|
||||
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
|
||||
CVE-2023-26830,0,1,683ce7c3beff509b5543a502bd9fd65955fa34b1bc868ad726700b30fe133648,2025-02-18T15:15:13.227000
|
||||
CVE-2023-26839,0,0,e18b17b8b760de23c33835c07c5d11b0e19565942bcd80c3f25ae67fe72322fd,2025-02-04T15:15:16.863000
|
||||
CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
|
||||
CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
|
||||
@ -220822,7 +220822,7 @@ CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f369
|
||||
CVE-2023-26855,0,0,72a6531eb988dcf5d74667601b0db11debc7ecc9d10fec80ea6b5e15cf8baf25,2025-02-13T16:15:39.787000
|
||||
CVE-2023-26856,0,0,bdf472bd0bc53b7d5acfe01fdb6a149a576f0180ff8a4f241faf4d19028918fd,2025-02-13T16:15:39.953000
|
||||
CVE-2023-26857,0,0,e21e327f166ccc2afbd4492ef259c134b672585fcbee5ca9e205c0ce8e68a712,2025-02-13T16:15:40.150000
|
||||
CVE-2023-26858,0,0,f09034118f8dcaf7e10aa34738ff0e5feddaaa675e607be064cb131bbbadf4b2,2024-11-21T07:52:00.960000
|
||||
CVE-2023-26858,0,1,faf3b84a327b91b11bb5f976dc43b4d6846a8075d326d47528ed907e28e1cf49,2025-02-18T15:15:13.423000
|
||||
CVE-2023-26859,0,0,a179140c87ebd4b86459c9ecbb765889c33de21f0da40c45371354b42d1fc8ca,2024-11-21T07:52:01.090000
|
||||
CVE-2023-2686,0,0,b0249e40da84fca5e5393ccc5f3eb8ae24ec76d0f3735f9ce1e6cb23621be6b7,2024-11-21T07:59:05.023000
|
||||
CVE-2023-26860,0,0,e65324dc2f0817d7039700acdb97e67ce3e2cd765240c766ea61aa993b7bb5a5,2025-02-11T17:15:19.957000
|
||||
@ -220843,7 +220843,7 @@ CVE-2023-2691,0,0,cdad972a5b1dab057475eceea91b8b4e4026bc1b9e8ac8399b2c1d0f44fa14
|
||||
CVE-2023-26911,0,0,3c699ec1125fd44557b4cc318bbc724cc49305c037cd57a71dc1c77604421632,2024-11-21T07:52:02.973000
|
||||
CVE-2023-26912,0,0,cc82d907f2264644f2eb78c39d7d27bf176738b96b7b283566a267dc32dd9582,2024-11-21T07:52:03.133000
|
||||
CVE-2023-26913,0,0,daf6e3585a7ed0249ea37f260c167a69001cd51ef355afc64cddc00b14b53f37,2024-11-21T07:52:03.300000
|
||||
CVE-2023-26916,0,0,527513a0c9844af104e4d4417b495bc36f57a6328181592ae5b696e463e7568c,2024-11-21T07:52:03.453000
|
||||
CVE-2023-26916,0,1,52b077727d939243051208ac43aa37f3e6caa024c4d543367793dd5cb31c6890,2025-02-18T15:15:13.617000
|
||||
CVE-2023-26917,0,0,194a99a53507a39df42526194e8d2506a79a7f17d25af812d6883f6f110580ce,2025-02-11T16:15:36.753000
|
||||
CVE-2023-26918,0,0,d35475953c7452a05db300575f9a8df61ae7e6e990c6789633f144b55663e74c,2025-02-07T16:15:34.957000
|
||||
CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884d89,2025-02-11T18:15:25.377000
|
||||
@ -220853,7 +220853,7 @@ CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef6
|
||||
CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000
|
||||
CVE-2023-26923,0,0,a32f0d476b87c565247b808c5771feae62c9104227b5b4c6c5968c4b92a3a400,2024-11-21T07:52:04.503000
|
||||
CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000
|
||||
CVE-2023-26925,0,0,60cd794f6ec5fd430e9a06390ff60f215a425a8b1ed6c515e21ffcf1ee0e2aa0,2024-11-21T07:52:04.800000
|
||||
CVE-2023-26925,0,1,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000
|
||||
CVE-2023-2693,0,0,63e3f6a21dbf47f13e9b9a150880a4fe740c6c2f1f979959b365464cba000e79,2024-11-21T07:59:05.913000
|
||||
CVE-2023-26930,0,0,b2fbe64d3a5b0a40857304c5801b3c2cefb7ecf91b0c92157e84a0e74b934da4,2024-11-21T07:52:04.953000
|
||||
CVE-2023-26931,0,0,1f8040f802c66b9da260204c76dbdf8565875b00e25f3822fb6071b5f692c826,2023-11-07T04:09:44.150000
|
||||
@ -220918,7 +220918,7 @@ CVE-2023-27019,0,0,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2a
|
||||
CVE-2023-2702,0,0,89db1f202b02a106932fedf9649fa2fe945911614dd941a764165f7605194bcf,2024-11-21T07:59:07.040000
|
||||
CVE-2023-27020,0,0,2fd3363eea0280fba0331e4ff9991d28a4ed9e5bab08dd6ea65a0c6a12f1c3fa,2025-02-12T17:15:15.087000
|
||||
CVE-2023-27021,0,0,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02d6e,2025-02-12T17:15:15.277000
|
||||
CVE-2023-27025,0,0,df08cdd42c2b6826389279ebc90283d3ef76ee78cbcc3012cc6fc8e1b5db5686,2024-11-21T07:52:12.293000
|
||||
CVE-2023-27025,0,1,88a8b7825ec2badc1c3157c1cc019bd293aee046f60ee013450cfe3bc87d7baa,2025-02-18T16:15:14.717000
|
||||
CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000
|
||||
CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000
|
||||
CVE-2023-27033,0,0,563e9a589bd884d69713b9513c0ef1e92d34512120fc6cc7fb93b1c346976b4d,2025-02-12T17:15:15.500000
|
||||
@ -221002,12 +221002,12 @@ CVE-2023-2715,0,0,9fed0daeff41969bcf8004121ebe76307716264f4dbd86f501f34cf8e41f2a
|
||||
CVE-2023-27150,0,0,a7fb341ea935be349b83ec099c5ae048f809619dabe8dcfb854a9f1420730b42,2024-11-21T07:52:23.410000
|
||||
CVE-2023-27151,0,0,6ca0ff73b2619a50944c698fbea13cb7d8caa108a58ea5dea5afc824bff683f7,2024-11-21T07:52:23.580000
|
||||
CVE-2023-27152,0,0,b7060ca5f8d33052be20d58629e10c78d1ac35d9cb5c9bde5643340fccf09668,2024-11-21T07:52:23.777000
|
||||
CVE-2023-27159,0,0,ed3c8efb78f3f61973976ac04610d200354f14273f04b8df2acff972768a5b28,2024-11-21T07:52:23.917000
|
||||
CVE-2023-27159,0,1,8a3caa8c77d336a6494d769b7fc3c07c9e059e0a758d024941edd96385f97de6,2025-02-18T15:15:13.813000
|
||||
CVE-2023-2716,0,0,c75f06874d7c6c43f410fe356c1ef7bc0209b04427c5c0e8715f03873d4fb142,2024-11-21T07:59:09.430000
|
||||
CVE-2023-27160,0,0,122547e8abe049817524df44380b58496ff0f4900946923a4a9fcaa6baf0882b,2024-11-21T07:52:24.060000
|
||||
CVE-2023-27161,0,0,c1c225c9c880e409b8a8480b7b198b4a1a1c9251b029153c521538f7810295fc,2024-11-21T07:52:24.213000
|
||||
CVE-2023-27162,0,0,e4cb3c54985d114e1cae604477a240a9090b16c645a117ec58340d339263a972,2024-11-21T07:52:24.363000
|
||||
CVE-2023-27163,0,0,6d5a553efc2c4772c2731dbd7d4c3f96573ca7165ec12a29399961cd83791c24,2024-11-21T07:52:24.517000
|
||||
CVE-2023-27163,0,1,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000
|
||||
CVE-2023-27164,0,0,92ebbb8e2a47cbcbbfb56a213309c52630a9aa5e012b6519949b14cf38a80c99,2024-11-21T07:52:24.667000
|
||||
CVE-2023-27167,0,0,3ce9a2589b54172eace8e138ec0b8e990fb54060e9678beb0dda03b6727ed36e,2024-11-21T07:52:24.820000
|
||||
CVE-2023-27168,0,0,f5ed98440bf9c281464a4cf0da65aedc7cda805ca2bf7d5ca1abd326046c72cf,2024-11-21T07:52:24.970000
|
||||
@ -222224,12 +222224,12 @@ CVE-2023-2850,0,0,c555fba69c2f5ce171fcaefcbd101aa2733a50819ad9a4570d1194b3fa6064
|
||||
CVE-2023-28500,0,0,ef554dc6eafe9b1ca470603250cc7f8eed745ad3b97dafe91430386f3a7630aa,2024-11-21T07:55:14.447000
|
||||
CVE-2023-28501,0,0,915fb292fd9e9e841d488a9ff0fe13831c600d84db3c831b1a27305ff6fdf198,2024-11-21T07:55:14.620000
|
||||
CVE-2023-28502,0,0,933001f4d8faea1f30dedab9736e82dc5cddfa1df039fae2b2e18dba0615f73a,2024-11-21T07:55:14.753000
|
||||
CVE-2023-28503,0,0,a153edde766ab2aaaf086940269be326049896bfb8851fc97b89197844fd7807,2024-11-21T07:55:14.880000
|
||||
CVE-2023-28504,0,0,336fc14d831ebb5fc3d6a25d410331f167608e13edd24193bfa14a692876f46a,2024-11-21T07:55:15.007000
|
||||
CVE-2023-28505,0,0,110cdb8cd9aa97df861cde46631afed0090be8054dd0a61fea0232b31b7b2847,2024-11-21T07:55:15.137000
|
||||
CVE-2023-28506,0,0,74895b01b79845872de6371e2cfc0b390f8b252d345ff6aaa42207d24d9deaa1,2024-11-21T07:55:15.257000
|
||||
CVE-2023-28507,0,0,22a104259aca37459be6603394f9e2524454870e2f2422af5c456268ab7d045e,2024-11-21T07:55:15.387000
|
||||
CVE-2023-28508,0,0,c2e45e9f637d398bbf5369775f4ddab8686b240d35b965a8540d3402da80356d,2024-11-21T07:55:15.517000
|
||||
CVE-2023-28503,0,1,ff2bba0e5777e730f90ca8f0e544cf2c6d75016afc60de3ffdc18e9d2b007df8,2025-02-18T16:15:15.190000
|
||||
CVE-2023-28504,0,1,54b5a4a021f46a0551ce9880d88717dccae938637a077d64f2d63dad7b26b5da,2025-02-18T16:15:15.373000
|
||||
CVE-2023-28505,0,1,ecfef376552e2183b2a6f5ccfd9a97b196085414f8f6d785b7f4fb8c1bf70b30,2025-02-18T16:15:15.550000
|
||||
CVE-2023-28506,0,1,005acd927aca933902f81b5fa86d88a73ac9182ea956fd928728a7e41e2fed74,2025-02-18T16:15:15.727000
|
||||
CVE-2023-28507,0,1,e16a2c80507923fe6466b7e09864d6601b35d8e6ebecbd5619c8aa58b1953d59,2025-02-18T15:15:14.060000
|
||||
CVE-2023-28508,0,1,f897bf5ede43331bf490f3d7435ddb3131128bd40ce2e27290b464509aa2cee4,2025-02-18T15:15:14.280000
|
||||
CVE-2023-28509,0,0,d23369db7fab213305e6bcfd0b61e4ffebc8e0434cf6bcc1004e350f64272b38,2024-11-21T07:55:15.647000
|
||||
CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343ae7,2024-11-21T07:59:25.183000
|
||||
CVE-2023-28512,0,0,bc046f04a34eb8e9b06ac8b0a405f5510b39eacef271407f3f356b209b2ed0e4,2025-01-29T21:26:57.827000
|
||||
@ -222814,8 +222814,8 @@ CVE-2023-29134,0,0,397a9f3e630dbbabdab5793eee6ca6dd65adb77983cd6c4b14455eac5113f
|
||||
CVE-2023-29137,0,0,8076322fcc6d24a14b3a1dde3c14cbc7205520ab126c340729f53f8dfab2206a,2025-02-14T20:15:33.563000
|
||||
CVE-2023-29139,0,0,8549dc3f6f4453f97357e5aef512d14ab36f212b91bd2c5ca685ffb348e7ddcd,2025-02-14T20:15:33.733000
|
||||
CVE-2023-2914,0,0,b44613314f82717d0cb07c8662342f435f1919f2f997ab416019a0eadc037663,2024-11-21T07:59:33.587000
|
||||
CVE-2023-29140,0,0,e37b2af112e53eb00d357840dab905310269c4f245e078006ee7da3ccf653a8a,2024-11-21T07:56:36.620000
|
||||
CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3eb37,2024-11-21T07:56:36.747000
|
||||
CVE-2023-29140,0,1,f55a3fbd92333404306e7231f610a5637cfd0c078560aeff8973f3d1cf076b42,2025-02-18T16:15:15.893000
|
||||
CVE-2023-29141,0,1,5295db62e89c184f386036d95e68902d72b5432991a79960e34002d4d2572d06,2025-02-18T16:15:16.077000
|
||||
CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000
|
||||
CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
|
||||
CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000
|
||||
@ -222887,7 +222887,7 @@ CVE-2023-29213,0,0,0659d2886cd4363f793e4197b39a7b9d1e21e8f6c5ccf0df28d873a06e45c
|
||||
CVE-2023-29214,0,0,d695ebe20fd00d2f656f330ff8760ed69ae973785d1517327ff89cd4d04f9abc,2024-11-21T07:56:43.730000
|
||||
CVE-2023-29215,0,0,1c36bb444821ace92da838cb3ef17e921a87b502ec0676faabef0901c0dabc0a,2025-02-13T17:16:17.720000
|
||||
CVE-2023-29216,0,0,1e95092c16d53f0529738b1c70a171f74070a0c064e3c012922a63c29a4037fa,2025-02-13T17:16:17.877000
|
||||
CVE-2023-29218,0,0,16a49299f067929867c61ed96a879b1b62717ef738078058071c4b05f94e5421,2024-11-21T07:56:44.130000
|
||||
CVE-2023-29218,0,1,3652a7dff068d019905f63b4de3ade0f5e1e9781c786e870980f715d4361105f,2025-02-18T15:15:14.460000
|
||||
CVE-2023-2922,0,0,6b3cd96fa545989db321db97c7346e47d72663d6eea89a4b0a7fcb4be798cc72,2024-11-21T07:59:34.243000
|
||||
CVE-2023-2923,0,0,1785972f4d67cc8f83c3ca06db4e8914d84b21d5ccc07e0e55911e9b5fccfc46,2024-11-21T07:59:34.390000
|
||||
CVE-2023-29234,0,0,e385146e4d7c4c78d2e9cb7adbf33a377f9e20552e4901285521032e1cede747,2025-02-13T17:16:18.023000
|
||||
@ -238623,7 +238623,7 @@ CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c
|
||||
CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db123,2025-02-13T18:15:49.103000
|
||||
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
|
||||
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
|
||||
CVE-2023-50167,0,1,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
|
||||
CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
|
||||
CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000
|
||||
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
|
||||
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
|
||||
@ -245574,7 +245574,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f
|
||||
CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000
|
||||
CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000
|
||||
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
|
||||
CVE-2024-12314,0,0,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000
|
||||
CVE-2024-12314,0,1,c3752972466cca307bd35c84eef94c7242b54d78ea2bb12694801d320e65e43a,2025-02-18T15:15:14.687000
|
||||
CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000
|
||||
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
|
||||
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
|
||||
@ -245978,7 +245978,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
|
||||
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
|
||||
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
|
||||
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
|
||||
CVE-2024-12797,0,1,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
|
||||
CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
|
||||
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
|
||||
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
|
||||
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
|
||||
@ -246709,6 +246709,7 @@ CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be531
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
|
||||
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
|
||||
CVE-2024-13689,1,1,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000
|
||||
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
|
||||
CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
|
||||
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
|
||||
@ -247071,7 +247072,7 @@ CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7ac
|
||||
CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000
|
||||
CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
|
||||
CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000
|
||||
CVE-2024-1696,0,1,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
|
||||
CVE-2024-1696,0,0,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
|
||||
CVE-2024-1697,0,0,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000
|
||||
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
|
||||
CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000
|
||||
@ -248883,7 +248884,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
|
||||
CVE-2024-21677,0,0,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000
|
||||
CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000
|
||||
CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000
|
||||
CVE-2024-2168,0,0,3461f696aab79988d4e87234d76a778efc4506b3056dd37de5dffa764a6ba6a7,2024-11-21T09:09:10.260000
|
||||
CVE-2024-2168,0,1,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000
|
||||
CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000
|
||||
CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000
|
||||
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
|
||||
@ -249160,7 +249161,7 @@ CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c
|
||||
CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000
|
||||
CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000
|
||||
CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000
|
||||
CVE-2024-22011,0,1,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
|
||||
CVE-2024-22011,0,0,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
|
||||
CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000
|
||||
CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000
|
||||
CVE-2024-22014,0,0,4cfec9b3d2520e43390c367346e4fcec3fa28706e41a48543905fc5c1d8c3d45,2024-11-21T08:55:23.560000
|
||||
@ -250060,7 +250061,7 @@ CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa
|
||||
CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000
|
||||
CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000
|
||||
CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000
|
||||
CVE-2024-2332,0,0,304de721ecdbe8cab233056d0e153a006f00a79af5e1adc8c9aeb46c3b898c39,2024-11-21T09:09:31.410000
|
||||
CVE-2024-2332,0,1,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000
|
||||
CVE-2024-23320,0,0,5358fceafc65b7c895824a066eb3639945e8b03f1c69910f4d447f806474bf37,2025-02-13T18:17:01.897000
|
||||
CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000
|
||||
CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000
|
||||
@ -250642,7 +250643,7 @@ CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2c
|
||||
CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000
|
||||
CVE-2024-23928,0,0,aa893d0bd03b0fc4eec222c87d3670cc0bd053b0b68fc8887badbad0acd19fb1,2025-01-31T17:15:13.030000
|
||||
CVE-2024-23929,0,0,f24b814b1ed24e572e44263ae81453a6c749c950d9f79f981f97ff46f8081fe5,2025-01-31T17:15:13.177000
|
||||
CVE-2024-2393,0,0,0458f4543c8a844640151e34e9bc015928e878b95038e499e97f09aef67aa751,2024-11-21T09:09:39.413000
|
||||
CVE-2024-2393,0,1,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000
|
||||
CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000
|
||||
CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000
|
||||
CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000
|
||||
@ -250780,7 +250781,7 @@ CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2
|
||||
CVE-2024-24160,0,0,e19b8014b49c30329495072f174bac90c20d64ed22c36b21f9d4c3477741d674,2024-11-21T08:59:00.147000
|
||||
CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e8440e,2024-11-21T08:59:00.290000
|
||||
CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000
|
||||
CVE-2024-2418,0,0,154509dd2d91315c00067f4186c9636530cc59e8e86ab27eb13226ae6ce7d6ef,2024-11-21T09:09:42.670000
|
||||
CVE-2024-2418,0,1,a754a85317d98b9c2f5e469fa90178131735d4897cc7aa17f5aaf089859f272f,2025-02-18T16:22:50.640000
|
||||
CVE-2024-24186,0,0,07767a469bb9f886899dec5f70186dd871757234273491c05682334a187b13be,2024-11-21T08:59:00.440000
|
||||
CVE-2024-24188,0,0,c6ea63f8b5a602ecddf385c0ed8349db234fffb3df07bfe2900c73a158dad28d,2024-11-21T08:59:00.590000
|
||||
CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000
|
||||
@ -250818,8 +250819,8 @@ CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2
|
||||
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
|
||||
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
|
||||
CVE-2024-24272,0,0,5864839a910b3cf34f75bdf7fd1f937bb6e6ec5b97bf46e24e0cf397dc23313c,2024-11-21T08:59:05.650000
|
||||
CVE-2024-24275,0,1,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
|
||||
CVE-2024-24276,0,1,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
|
||||
CVE-2024-24275,0,0,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
|
||||
CVE-2024-24276,0,0,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
|
||||
CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000
|
||||
CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000
|
||||
CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000
|
||||
@ -251661,20 +251662,20 @@ CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52
|
||||
CVE-2024-25527,0,0,2feec88a1a9765ad44469f5aec4158d93cab6f4269704036d841801342c53cda,2024-11-21T09:00:57.100000
|
||||
CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000
|
||||
CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000
|
||||
CVE-2024-2553,0,0,574625102f38d8b2819cc74581faca98e0492649008616ccf5e43d086bdb38f9,2024-11-21T09:09:59.753000
|
||||
CVE-2024-2553,0,1,0428c7caac4c14b66d42abc7e2c263763f56e7b075b21c530f6512b1c928cc0b,2025-02-18T16:24:04.587000
|
||||
CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000
|
||||
CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000
|
||||
CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000
|
||||
CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000
|
||||
CVE-2024-2554,0,0,e205e9f72b72219de437b4511d9094a43e4fe790b95a7f65bbd3f50b303b2486,2024-11-21T09:09:59.897000
|
||||
CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000
|
||||
CVE-2024-2555,0,0,ca30b0e0943c5e8180a8434458a5fd7575e43e7d110383aabef1392203068ca9,2024-11-21T09:10:00.033000
|
||||
CVE-2024-2555,0,1,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000
|
||||
CVE-2024-25551,0,0,650440c21f088bef59f5c6a3697f7b30ab533966a389f6fad3ff6f66329da998,2024-11-21T09:00:58.770000
|
||||
CVE-2024-25552,0,0,c29492323c9c7ee00969f36b8fb3dece7caae4dcab3dbfec3c6b1f51d7fb887c,2024-11-21T09:00:58.990000
|
||||
CVE-2024-25553,0,0,d425d147501fa8006dbadf60a3ee6d0e30ea870822653a9e9b85ebafb1bf219a,2024-03-01T08:15:37.950000
|
||||
CVE-2024-25554,0,0,5ebde31c21d4e190368d0ea561a226f998eab9ab1a3ffbf4889f3384c5f1c9da,2024-03-01T08:15:38.107000
|
||||
CVE-2024-25559,0,0,d15ef6a8292ff4e3cc5d05413efc5a3e9dcb2e2f4913411a9a6afc4ea649c703,2024-11-21T09:00:59.190000
|
||||
CVE-2024-2556,0,0,8b07973e8f6662324da1b1c114f86aae4f8bb1f4ae0d6ebd9100cba43f42f425,2024-11-21T09:10:00.173000
|
||||
CVE-2024-2556,0,1,f4c80da7407f04757bd46e076f7f4e3a185b6829aa0c1e9a0fee27adafa78c35,2025-02-18T16:50:19.370000
|
||||
CVE-2024-25560,0,0,7b2f14a389c4855e094fced0bf47660aa6960a07e134b3de37af09c260a2b69b,2024-11-21T09:00:59.380000
|
||||
CVE-2024-25561,0,0,dea1d7704dde6d0a5306f95f9d4da9e3b9249ef4c0186b054ad470185ea987be,2024-09-12T18:50:32.413000
|
||||
CVE-2024-25562,0,0,a56e4e3ba7171dbd525020e765b8f1e1293c9793670b4770b9e6bb6db8c89d53,2024-08-31T03:40:47.857000
|
||||
@ -252781,7 +252782,7 @@ CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c
|
||||
CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000
|
||||
CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000
|
||||
CVE-2024-26899,0,0,b25c468fdd9a5dde607d7e60e93a4f4378e05bbaed78a1b87031bd334bf1cf78,2024-11-21T09:03:20.160000
|
||||
CVE-2024-2690,0,0,cb8394cf256eaae4e0bb95e296623bc5e9883d493c3bc191cade85f8fd8f451e,2024-11-21T09:10:18.073000
|
||||
CVE-2024-2690,0,1,f54be296cda9442e3719694faf713502364bcd62ae99daa0e6de3ce951368fba,2025-02-18T16:54:08.043000
|
||||
CVE-2024-26900,0,0,89eb36b4021cc9aa920b6f52a26d6c2b349256cf670208b8b8832bd853f9efc2,2024-11-21T09:03:20.300000
|
||||
CVE-2024-26901,0,0,ce718d6c1afabba164002b2247fbc0f74d9cb4434a3cc5019738d6e3fcfac2ba,2024-11-21T09:03:20.453000
|
||||
CVE-2024-26902,0,0,3fd3400946dbfe9fc533be7b14f34ebccba35c6430809af9d495947e583d5c1e,2024-11-21T09:03:20.690000
|
||||
@ -253119,7 +253120,7 @@ CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfa
|
||||
CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000
|
||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27217,0,0,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000
|
||||
CVE-2024-27218,0,1,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
|
||||
CVE-2024-27218,0,0,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
|
||||
CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000
|
||||
CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000
|
||||
CVE-2024-27220,0,0,4ee101d4577b781f601dfca4d5026ead710e942a600f8f26b9599978224cc5ac,2024-11-21T09:04:07.860000
|
||||
@ -253129,9 +253130,9 @@ CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f58
|
||||
CVE-2024-27224,0,0,f785a013141b3d88fe26f11eac326de71e5d58c27726e6d6328a3f861f1bfcdb,2024-11-21T09:04:08.610000
|
||||
CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892ac7e,2024-11-21T09:04:08.790000
|
||||
CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000
|
||||
CVE-2024-27227,0,1,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
|
||||
CVE-2024-27227,0,0,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
|
||||
CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000
|
||||
CVE-2024-27229,0,1,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
|
||||
CVE-2024-27229,0,0,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
|
||||
CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000
|
||||
CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000
|
||||
CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000
|
||||
@ -253140,7 +253141,7 @@ CVE-2024-27233,0,0,619ec8955cdc02f44102a12e814b0558d5d674c6696f24a4298c3a1d2ebf1
|
||||
CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
|
||||
CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49510,2024-11-21T09:04:10.320000
|
||||
CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000
|
||||
CVE-2024-27237,0,1,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
|
||||
CVE-2024-27237,0,0,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
|
||||
CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000
|
||||
CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000
|
||||
CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000
|
||||
@ -253392,7 +253393,7 @@ CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab04
|
||||
CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000
|
||||
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
|
||||
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
|
||||
CVE-2024-2754,0,0,7d8d4f5a2d4f72cb98a0a5ce1488f82fcaee7d8e42d70a3878c3fdc55b64191f,2024-11-21T09:10:26.530000
|
||||
CVE-2024-2754,0,1,f140b41aa53fbf6da0848ed003e2956f3ebbfb41a25f4725ef2371f5e6a35873,2025-02-18T16:56:54.550000
|
||||
CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000
|
||||
CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000
|
||||
CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000
|
||||
@ -254063,7 +254064,7 @@ CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f72
|
||||
CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000
|
||||
CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000
|
||||
CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000
|
||||
CVE-2024-2849,0,0,80bbcec0e80b63db2644b6fb7139b90a8664f7a4ff1e3076cb89ee2bdc2f8e32,2024-11-21T09:10:40.303000
|
||||
CVE-2024-2849,0,1,b781d1db4ca087a28951b4b33976b64e85895536411670722d7577d4c6b63e42,2025-02-18T16:57:52.660000
|
||||
CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000
|
||||
CVE-2024-2851,0,0,f1913ee0996b40befd8b28b4cfd22ff585e0781b3db3dfac02bb2a05a881b3ea,2024-11-21T09:10:40.600000
|
||||
CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6a01,2024-11-21T09:06:24.533000
|
||||
@ -254669,7 +254670,7 @@ CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524
|
||||
CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000
|
||||
CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
|
||||
CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000
|
||||
CVE-2024-2930,0,0,6664f147975063a07dcc29c53c207c9ea3b0aed5e2de65f4ee1816ba878242e1,2024-11-21T09:10:51.980000
|
||||
CVE-2024-2930,0,1,238cd69f670566e1da09828c2344e755e710e55c00ffa65a462cdefa17cc700d,2025-02-18T17:00:05.117000
|
||||
CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066114,2024-11-21T09:07:55.647000
|
||||
CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000
|
||||
CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000
|
||||
@ -255994,7 +255995,7 @@ CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376
|
||||
CVE-2024-31141,0,0,d3e6234dd5f7853dd5cc5624c4460d246120bc3e8971c692c1eba3ffde4baa26,2025-01-31T15:15:12.987000
|
||||
CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000
|
||||
CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000
|
||||
CVE-2024-31144,0,0,0da39fc58fadd919fbb3c54e78b2ad673d11fbf4b9dd11741c5f891c34e967b0,2025-02-14T21:15:15.107000
|
||||
CVE-2024-31144,0,1,27a5393bd8842a69656663a336180c002b70f462f45ce2ade6ba3fb63880e732,2025-02-18T15:15:16.050000
|
||||
CVE-2024-31145,0,0,f3ca8145921f17e384184f2a401130163f6a98a09ec4c0f02db53b87f0633d0f,2024-11-21T09:12:55.410000
|
||||
CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e65a,2024-11-21T09:12:55.600000
|
||||
CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56
|
||||
@ -261074,9 +261075,9 @@ CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9
|
||||
CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000
|
||||
CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000
|
||||
CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000
|
||||
CVE-2024-37601,0,1,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
|
||||
CVE-2024-37601,0,0,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
|
||||
CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000
|
||||
CVE-2024-37603,0,1,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
|
||||
CVE-2024-37603,0,0,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
|
||||
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
|
||||
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
|
||||
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
|
||||
@ -264046,7 +264047,7 @@ CVE-2024-41707,0,0,a3d7b79aeb6433d50f291b767e35dfd30d5dd12d277a3c66604231c335206
|
||||
CVE-2024-41708,0,0,445b65b3721f3d8f292337791cbf935557797b1033365e761cbc9951f26720b4,2024-09-26T14:35:13.827000
|
||||
CVE-2024-41709,0,0,2cc1be93865d85286340548125958805b824c1daf6221d632f91b966c6c7e81d,2024-11-21T09:33:01.840000
|
||||
CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000
|
||||
CVE-2024-41710,0,0,b2646ae91df501710cbb001f176f9aebe73d77fcfa56108df2a061c06367e83e,2025-02-13T02:00:01.817000
|
||||
CVE-2024-41710,0,1,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000
|
||||
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
|
||||
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
|
||||
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
|
||||
@ -267677,7 +267678,7 @@ CVE-2024-46737,0,0,3ee0b00f46177dd2e3466e1a5953938cc8fa9136f768d3d578bb135b417c3
|
||||
CVE-2024-46738,0,0,d194bba9468d71cf8cb190e63cfdaff20aa02ce1a672ea5f9529f704abdc7079,2024-09-20T18:35:04.373000
|
||||
CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5584,2024-09-20T18:34:29.957000
|
||||
CVE-2024-4674,0,0,c78832d047e3b643eaebb0eafa9c8550e597c99fc5040f942eff298210cabe1a,2024-11-21T09:43:21.190000
|
||||
CVE-2024-46740,0,0,fb8bdbed16eb197f8cd7c7e64523a2ac5097b982e7119d6bcd3057213c03f398,2024-09-20T18:34:08.163000
|
||||
CVE-2024-46740,0,1,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000
|
||||
CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000
|
||||
CVE-2024-46742,0,0,e4d9f0987a00835c8bd748f38250c558eb8edfed3f4f73ca7bbb79f2a8e020c8,2024-09-20T18:32:34.303000
|
||||
CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000
|
||||
@ -270203,7 +270204,7 @@ CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2
|
||||
CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000
|
||||
CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000
|
||||
CVE-2024-5009,0,0,2a7f1a61c4ffe3ca1ccb9712403aacf784aadd4f5cfd32895abd79408baca925,2024-11-21T09:46:46.377000
|
||||
CVE-2024-50090,0,0,ece231635574952850a8a7cafcbb4c2ad2a3187a224874e6aed563866f68fa20,2024-11-12T21:41:16.620000
|
||||
CVE-2024-50090,0,1,b5d118883ae2a075a773a8abb27764bfe656c1915eaf2e89a5c58d42a2a84f45,2025-02-18T16:15:17.740000
|
||||
CVE-2024-50091,0,0,1cb67bb828a90348a73a47095c7317641327edd2ebb55312c01ecfbc931cad87,2024-11-12T21:44:39.210000
|
||||
CVE-2024-50092,0,0,8323f00a1fe325c784efe7c468f127281c29668dbe20794e7154d6c8e52c9fc7,2024-11-13T00:40:23.183000
|
||||
CVE-2024-50093,0,0,6179b05561fba7cfa8e5286e363f283cb3de5666a14724b7b49f82dfcf76c0ed,2024-11-08T16:49:33.143000
|
||||
@ -270412,7 +270413,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a
|
||||
CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000
|
||||
CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000
|
||||
CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000
|
||||
CVE-2024-50282,0,0,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000
|
||||
CVE-2024-50282,0,1,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000
|
||||
CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000
|
||||
CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
|
||||
CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
|
||||
@ -272276,7 +272277,7 @@ CVE-2024-53058,0,0,a8028d3d287474ecf90a26d70790957c2683a9b9f2fe3dc113a472bf0e206
|
||||
CVE-2024-53059,0,0,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000
|
||||
CVE-2024-5306,0,0,6337c3272526323f63fae57a5b84d48fae4f8a9830fd7394fefa4365a042d105,2024-11-21T09:47:23.970000
|
||||
CVE-2024-53060,0,0,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000
|
||||
CVE-2024-53061,0,0,6bfb33181350cd4c9af27d4c991c8f4d2296790e1921bf746f7816f409205ec3,2024-11-22T17:51:45.817000
|
||||
CVE-2024-53061,0,1,3f3710a4f90ffd2cdcd03ef4626770b2408a5fbec497576b6679fa5d5efde367,2025-02-18T16:15:18.113000
|
||||
CVE-2024-53062,0,0,e2e51fc1a396224017bf00dfccc16b8ddb176bd1ee88f9b39b170be10d48afa8,2024-11-22T17:47:43.337000
|
||||
CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3aa6,2024-11-25T21:08:23.697000
|
||||
CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000
|
||||
@ -272418,7 +272419,7 @@ CVE-2024-53188,0,0,87bab49dbc3d18e6d91d22cbed039a405ce14263e56845387115216180a2f
|
||||
CVE-2024-53189,0,0,7db5b520eec87b3d5cf3a4268bb96f973425e7266589752714a0bff057fca02c,2024-12-27T14:15:26.400000
|
||||
CVE-2024-53190,0,0,153fa3f9259ec5968429531d7a41d372c24290865137d294e4746b162c77afe4,2024-12-27T14:15:26.530000
|
||||
CVE-2024-53191,0,0,ab633ea293d90a9c139efda5afaef33c6071f53aa9f4d2b47925752d6bb90931,2025-01-31T16:00:01.843000
|
||||
CVE-2024-53192,0,0,e8827c0a12c1ed7067fbeef26e856b81373011b74742175a86819343dd916ee6,2024-12-27T14:15:26.780000
|
||||
CVE-2024-53192,0,1,7f07a134a8b5b31f722552e3f9310d84dc06bc43a45fe02a415c4b339ce4b412,2025-02-18T16:15:18.313000
|
||||
CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841dd6d,2024-12-27T14:15:26.897000
|
||||
CVE-2024-53194,0,0,9b3c6499c47db7a3faff7ac9925971ccc55eb1886170e79f1466f6516399f844,2025-02-11T16:15:41.640000
|
||||
CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000
|
||||
@ -272660,7 +272661,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f
|
||||
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
|
||||
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
|
||||
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
|
||||
CVE-2024-53704,0,0,646c05bf19a8b546c4b27150a74eade3fe883efa2fa4dd38843e1e36cfbef051,2025-01-09T15:15:18.640000
|
||||
CVE-2024-53704,0,1,ea9d5a987657b3006054c783a63425772026bf58d4e6daa2a4625dbb969a9b56,2025-02-18T15:15:16.290000
|
||||
CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000
|
||||
CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000
|
||||
CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000
|
||||
@ -273965,7 +273966,7 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e
|
||||
CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000
|
||||
CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000
|
||||
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
|
||||
CVE-2024-56180,0,0,859a0a214e880c431d953ea42b93fc75dbc38729b9f116959536aa113f3fa28e,2025-02-14T17:15:16.317000
|
||||
CVE-2024-56180,0,1,3a1561e3486ac1bb040fb6a34e878854d4f9896bca194a84398b4784453d60f5,2025-02-18T15:15:16.500000
|
||||
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
|
||||
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
|
||||
CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000
|
||||
@ -274239,7 +274240,7 @@ CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030
|
||||
CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000
|
||||
CVE-2024-56555,0,0,27d859f187620a0e53806d8ddb970b864190f9d6d5d8bd618c07bfbaa01a7d68,2024-12-27T15:15:14.297000
|
||||
CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000
|
||||
CVE-2024-56557,0,0,b094055cd23182d8b8134730a2178a00894d62ddcf24adba7c906422ed13179a,2024-12-27T15:15:14.520000
|
||||
CVE-2024-56557,0,1,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000
|
||||
CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000
|
||||
CVE-2024-56559,0,0,353853da3e898d4bba88a08653e9a07b493a01962873d91259b7435d27f07afe,2024-12-27T15:15:14.760000
|
||||
CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000
|
||||
@ -274333,7 +274334,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf
|
||||
CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000
|
||||
CVE-2024-56640,0,0,10f0b2a3aaf12df52ffd0999892bf36d19f534ecac7e8924491df7836872b181,2025-02-11T16:15:46.470000
|
||||
CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000
|
||||
CVE-2024-56642,0,0,0dca8c301b88ee62830f0130813b46b2f13788c16ba6198c40b80f2a4204fe28,2025-02-11T16:15:46.650000
|
||||
CVE-2024-56642,0,1,8abe8530351fb237277e113d6f46693243b7bf833dd01f5d3daea39a3120bb14,2025-02-18T16:15:18.770000
|
||||
CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000
|
||||
CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000
|
||||
CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000
|
||||
@ -274592,6 +274593,10 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de
|
||||
CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000
|
||||
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
|
||||
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
|
||||
CVE-2024-57045,1,1,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000
|
||||
CVE-2024-57046,1,1,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000
|
||||
CVE-2024-57049,1,1,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000
|
||||
CVE-2024-57050,1,1,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000
|
||||
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
|
||||
CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000
|
||||
CVE-2024-57064,0,0,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000
|
||||
@ -274656,7 +274661,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b
|
||||
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
|
||||
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
|
||||
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
|
||||
CVE-2024-57241,0,1,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
|
||||
CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
|
||||
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
|
||||
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
|
||||
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
|
||||
@ -274874,7 +274879,7 @@ CVE-2024-57721,0,0,2848dad2c2b609041733157af3749bc2705ed04a630325793e55f87a8c15a
|
||||
CVE-2024-57722,0,0,cc12b04f9055359b9f59d1fb9351a1dc5f896d626ba1ab2353434d622e66c018,2025-01-23T15:15:12.610000
|
||||
CVE-2024-57723,0,0,8dfe124ae30760a599d5a92653aea7bf25ab7fabdd29029a0d6962e3146e832c,2025-01-23T15:15:12.820000
|
||||
CVE-2024-57724,0,0,80b6486449089b1abee894f99cbdee8ef8e8a7c83dc4631c3181139e769eeda6,2025-01-23T15:15:13.020000
|
||||
CVE-2024-57725,0,0,c498f9bcfb13503eba996e676be1e0c89d527282fd27cfff492633db6d1d9137,2025-02-14T21:15:16.033000
|
||||
CVE-2024-57725,0,1,27c6ae24c439cdb14d5e3d88f037e70f1d1e4712d4ba24364db40248ce2a4e12,2025-02-18T15:15:17.067000
|
||||
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
|
||||
CVE-2024-57727,0,0,e4677a15ae16ec0ebae3eb2021b05fa3f0029b408f389dd592fbd8ecc2109cf2,2025-02-14T02:00:02.377000
|
||||
CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000
|
||||
@ -274902,7 +274907,7 @@ CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485
|
||||
CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000
|
||||
CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
|
||||
CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000
|
||||
CVE-2024-57778,0,0,2b62091443e50e0aa11cddaf50af38cf82a924e836011a0f4c93d74197ed8f0c,2025-02-14T21:15:16.373000
|
||||
CVE-2024-57778,0,1,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000
|
||||
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
|
||||
CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000
|
||||
CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
|
||||
@ -274977,22 +274982,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685
|
||||
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
|
||||
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
|
||||
CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000
|
||||
CVE-2024-57905,0,1,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
|
||||
CVE-2024-57906,0,1,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
|
||||
CVE-2024-57907,0,1,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
|
||||
CVE-2024-57908,0,1,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
|
||||
CVE-2024-57909,0,1,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
|
||||
CVE-2024-57905,0,0,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
|
||||
CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
|
||||
CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
|
||||
CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
|
||||
CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
|
||||
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
|
||||
CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
|
||||
CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
|
||||
CVE-2024-57912,0,1,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
|
||||
CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
|
||||
CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000
|
||||
CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000
|
||||
CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000
|
||||
CVE-2024-57916,0,1,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
|
||||
CVE-2024-57916,0,0,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
|
||||
CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000
|
||||
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
||||
CVE-2024-57919,0,1,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
||||
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
|
||||
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
||||
@ -275046,7 +275051,7 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e
|
||||
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
|
||||
CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000
|
||||
CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000
|
||||
CVE-2024-57970,0,0,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000
|
||||
CVE-2024-57970,0,1,7c0875f2d20f0c5e1f382717358d28b61ebe8a0a2bfb0f2c818ee7d95f28a926,2025-02-18T15:15:17.343000
|
||||
CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
|
||||
@ -276670,7 +276675,7 @@ CVE-2024-7587,0,0,905f1e2769f930482ddb7f6e8ea78290401663df4ac22d8bf86420647d5839
|
||||
CVE-2024-7588,0,0,1358b20a23caea616b44e7d1fe9b2d36965a9414c7baff3fbe2639297f0ac95b,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7589,0,0,4a4abde1139ff2d724dfc63d85f01201c50a76c0c99327051fb78ce9046dd2da,2024-11-21T09:51:46.310000
|
||||
CVE-2024-7590,0,0,1533bedd8671f69add27338b97b679c389b63d7adf3d74a6b1d24d9f2d72c2c0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7591,0,0,3981556d61b5d492202f1f69870bd6896666aa7faf47c350af2b715310e14220,2025-02-17T17:15:09.300000
|
||||
CVE-2024-7591,0,1,041f4eda84f2c8a6fc5bb4d14a322e4df44b8c9f4b7f6dff3915a52ba4bbd6ad,2025-02-18T16:15:19.110000
|
||||
CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000
|
||||
CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000
|
||||
CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000
|
||||
@ -279352,11 +279357,11 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
|
||||
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000
|
||||
CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000
|
||||
CVE-2025-1269,1,1,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000
|
||||
CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000
|
||||
CVE-2025-1298,0,1,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
|
||||
CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000
|
||||
CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000
|
||||
CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000
|
||||
@ -279372,7 +279377,7 @@ CVE-2025-1354,0,0,3d7667bfcb2c0b251ddb0a6e2cd2d09c76acedbca3edf8c1b754b383822407
|
||||
CVE-2025-1355,0,0,2b32faeae86cf10a841d554d3f1028e038f2f84a86d16604e50e5f2d459277b4,2025-02-16T17:15:07.973000
|
||||
CVE-2025-1356,0,0,ad47206c360f81c88d742a140cb46365165054af6533ecf378500f5e98562fa1,2025-02-16T18:15:07.383000
|
||||
CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857bd,2025-02-16T19:15:09.500000
|
||||
CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000
|
||||
CVE-2025-1358,0,1,9cc206366a5cf3c6fd36dca7ea305ebd259d86e92a5cfd3942bb4b274e8c43ad,2025-02-18T15:15:18.157000
|
||||
CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000
|
||||
CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000
|
||||
CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000
|
||||
@ -279398,7 +279403,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b
|
||||
CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000
|
||||
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
|
||||
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
|
||||
CVE-2025-1414,1,1,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
|
||||
CVE-2025-1414,0,0,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -279730,7 +279735,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417
|
||||
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
|
||||
CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000
|
||||
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
|
||||
CVE-2025-21401,0,0,2e24ce0f54684c9309cfe6f1adac5a5a8a1682c152140c2d76a9e52198e7f90f,2025-02-15T00:15:27.163000
|
||||
CVE-2025-21401,0,1,df0f74dcda8fafe80cdce4c22148075892d97eed204201d20b25f487dd51c8fe,2025-02-18T15:15:18.357000
|
||||
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
|
||||
CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000
|
||||
CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000
|
||||
@ -279929,6 +279934,8 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1
|
||||
CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000
|
||||
CVE-2025-21700,0,0,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000
|
||||
CVE-2025-21701,0,0,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000
|
||||
CVE-2025-21702,1,1,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000
|
||||
CVE-2025-21703,1,1,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000
|
||||
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
|
||||
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
|
||||
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
|
||||
@ -279954,6 +279961,7 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8
|
||||
CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a7380917346d,2025-02-04T18:15:35.247000
|
||||
CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000
|
||||
CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000
|
||||
CVE-2025-22207,1,1,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000
|
||||
CVE-2025-22208,0,0,55682c702be57115138b9836a7ae27c0c6ea10f7b8b4845e2269e3fb48a78e9f,2025-02-15T09:15:11.043000
|
||||
CVE-2025-22209,0,0,f0ef35082d3ac11b8f37aa95511370b4c1ef70485b50313f4e611683562ad393,2025-02-15T09:15:11.237000
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
@ -280927,7 +280935,7 @@ CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22
|
||||
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
|
||||
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
|
||||
CVE-2025-24031,0,0,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000
|
||||
CVE-2025-24032,0,1,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
|
||||
CVE-2025-24032,0,0,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
|
||||
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
|
||||
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
|
||||
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
|
||||
@ -281506,7 +281514,7 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673
|
||||
CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000
|
||||
CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000
|
||||
CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000
|
||||
CVE-2025-25530,0,0,80f36605b63569036b66acb5263c199af5b962300f8a88d6532226521bf2cf87,2025-02-11T20:15:39.327000
|
||||
CVE-2025-25530,0,1,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000
|
||||
CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000
|
||||
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
|
||||
CVE-2025-25742,0,0,44a73b49255ee9adcf82a52f384eb5c222198ebf34b2a31793c5bb7b83755521,2025-02-12T17:15:24.150000
|
||||
@ -281514,18 +281522,18 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a
|
||||
CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000
|
||||
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
|
||||
CVE-2025-25897,0,0,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000
|
||||
CVE-2025-25898,0,1,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
|
||||
CVE-2025-25897,0,1,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000
|
||||
CVE-2025-25898,0,0,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
|
||||
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
|
||||
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
|
||||
CVE-2025-25901,0,1,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
|
||||
CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
|
||||
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
|
||||
CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000
|
||||
CVE-2025-25990,0,1,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000
|
||||
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000
|
||||
CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497276,2025-02-14T19:15:14.633000
|
||||
CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000
|
||||
CVE-2025-25994,0,0,6bec65e408b077c95d438b99a20cddf302d68b2ed2a6a207d98d1bd92f9a888b,2025-02-14T20:15:37.390000
|
||||
CVE-2025-25997,0,0,76f87d459e5781a855c01da7ce8c838760a817361c8faf2da21d279ede1a1fd5,2025-02-14T19:15:14.903000
|
||||
CVE-2025-25994,0,1,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000
|
||||
CVE-2025-25997,0,1,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000
|
||||
CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user