Auto-Update: 2025-02-18T17:01:33.653463+00:00

This commit is contained in:
cad-safe-bot 2025-02-18 17:05:00 +00:00
parent f8f767ade5
commit 415fae944f
97 changed files with 6654 additions and 408 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-19692",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-04T15:15:07.653",
"lastModified": "2024-11-21T05:09:19.700",
"lastModified": "2025-02-18T15:15:11.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-19693",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-04T15:15:07.697",
"lastModified": "2024-11-21T05:09:19.843",
"lastModified": "2025-02-18T15:15:12.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2560",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.447",
"lastModified": "2024-11-21T07:01:15.113",
"lastModified": "2025-02-18T16:15:10.817",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV30": [
@ -60,7 +80,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -70,6 +90,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2561",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.517",
"lastModified": "2024-11-21T07:01:15.230",
"lastModified": "2025-02-18T16:15:11.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27493",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T21:15:08.407",
"lastModified": "2024-11-21T06:55:50.167",
"lastModified": "2025-02-18T16:15:09.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-665"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28685",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.127",
"lastModified": "2024-11-21T06:57:44.447",
"lastModified": "2025-02-18T16:15:09.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28686",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.217",
"lastModified": "2024-11-21T06:57:44.560",
"lastModified": "2025-02-18T16:15:09.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28687",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.303",
"lastModified": "2024-11-21T06:57:44.670",
"lastModified": "2025-02-18T16:15:10.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28688",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.380",
"lastModified": "2024-11-21T06:57:44.780",
"lastModified": "2025-02-18T16:15:10.237",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28858",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T21:15:08.513",
"lastModified": "2024-11-21T06:58:04.450",
"lastModified": "2025-02-18T16:15:10.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2825",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.610",
"lastModified": "2024-11-21T07:01:45.653",
"lastModified": "2025-02-18T16:15:11.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-121"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2848",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.680",
"lastModified": "2024-11-21T07:01:48.140",
"lastModified": "2025-02-18T16:15:11.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV30": [
@ -60,7 +80,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -70,13 +90,23 @@
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-29507",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T20:15:11.313",
"lastModified": "2024-11-21T06:59:13.363",
"lastModified": "2025-02-18T16:15:10.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-522"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33209",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T21:15:08.687",
"lastModified": "2024-11-21T07:07:43.390",
"lastModified": "2025-02-18T16:15:11.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34488",
"sourceIdentifier": "secure@intel.com",
"published": "2022-08-18T21:15:08.773",
"lastModified": "2024-11-21T07:09:40.533",
"lastModified": "2025-02-18T16:15:11.813",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34713",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.487",
"lastModified": "2024-11-21T07:10:02.083",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T15:06:15.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36969",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:11.753",
"lastModified": "2024-11-21T07:14:10.820",
"lastModified": "2025-02-18T16:15:11.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37351",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.200",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:12.197",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37352",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.293",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:12.407",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
@ -60,7 +80,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -70,6 +90,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37353",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.373",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:12.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37354",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.500",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:12.807",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37355",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.593",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -60,7 +80,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37356",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.683",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37357",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.760",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37358",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.833",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.563",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37359",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.917",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37360",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.010",
"lastModified": "2024-11-27T20:11:45.410",
"lastModified": "2025-02-18T16:15:13.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
@ -67,6 +87,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37969",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:12.323",
"lastModified": "2024-11-21T07:15:28.000",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T15:05:07.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38922",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T15:15:18.777",
"lastModified": "2024-11-21T07:17:15.550",
"lastModified": "2025-02-18T16:15:14.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41049",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-11-09T22:15:19.567",
"lastModified": "2024-11-21T07:22:31.177",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T15:02:20.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41080",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-11-09T22:15:21.550",
"lastModified": "2024-11-21T07:22:34.373",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T15:01:39.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48221",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-04T15:15:08.717",
"lastModified": "2024-11-21T07:32:59.250",
"lastModified": "2025-02-18T15:15:12.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48222",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-04T16:15:07.143",
"lastModified": "2024-11-21T07:32:59.403",
"lastModified": "2025-02-18T15:15:12.803",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-427"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0225",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-03T23:15:06.907",
"lastModified": "2024-11-21T07:36:46.750",
"lastModified": "2025-02-18T16:15:14.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -52,6 +72,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T22:15:07.023",
"lastModified": "2024-11-21T07:48:19.893",
"lastModified": "2025-02-18T15:15:13.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26830",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T16:15:07.507",
"lastModified": "2024-11-21T07:51:59.023",
"lastModified": "2025-02-18T15:15:13.227",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26858",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T20:15:07.397",
"lastModified": "2024-11-21T07:52:00.960",
"lastModified": "2025-02-18T15:15:13.423",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26916",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T22:15:07.060",
"lastModified": "2024-11-21T07:52:03.453",
"lastModified": "2025-02-18T15:15:13.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26925",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T19:15:07.230",
"lastModified": "2024-11-21T07:52:04.800",
"lastModified": "2025-02-18T16:15:14.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27025",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-02T01:15:07.400",
"lastModified": "2024-11-21T07:52:12.293",
"lastModified": "2025-02-18T16:15:14.717",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-494"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27159",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T19:15:07.273",
"lastModified": "2024-11-21T07:52:23.917",
"lastModified": "2025-02-18T15:15:13.813",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27163",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T20:15:07.477",
"lastModified": "2024-11-21T07:52:24.517",
"lastModified": "2025-02-18T16:15:14.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28503",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.123",
"lastModified": "2024-11-21T07:55:14.880",
"lastModified": "2025-02-18T16:15:15.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28504",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.170",
"lastModified": "2024-11-21T07:55:15.007",
"lastModified": "2025-02-18T16:15:15.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28505",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.217",
"lastModified": "2024-11-21T07:55:15.137",
"lastModified": "2025-02-18T16:15:15.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -55,6 +75,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28506",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.263",
"lastModified": "2024-11-21T07:55:15.257",
"lastModified": "2025-02-18T16:15:15.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -55,6 +75,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28507",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.307",
"lastModified": "2024-11-21T07:55:15.387",
"lastModified": "2025-02-18T15:15:14.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -55,6 +75,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28508",
"sourceIdentifier": "cve@rapid7.com",
"published": "2023-03-29T21:15:08.353",
"lastModified": "2024-11-21T07:55:15.517",
"lastModified": "2025-02-18T15:15:14.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -55,6 +75,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29140",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T19:15:07.503",
"lastModified": "2024-11-21T07:56:36.620",
"lastModified": "2025-02-18T16:15:15.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29141",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-31T19:15:07.540",
"lastModified": "2024-11-21T07:56:36.747",
"lastModified": "2025-02-18T16:15:16.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"configurations": [
@ -156,6 +186,14 @@
{
"url": "https://www.debian.org/security/2023/dsa-5447",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://phabricator.wikimedia.org/T285159",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29218",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T21:15:07.237",
"lastModified": "2024-11-21T07:56:44.130",
"lastModified": "2025-02-18T15:15:14.460",
"vulnStatus": "Modified",
"cveTags": [
{
@ -39,6 +39,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -52,6 +72,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,20 +2,44 @@
"id": "CVE-2024-12314",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:09.987",
"lastModified": "2025-02-18T05:15:09.987",
"lastModified": "2025-02-18T15:15:14.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting."
},
{
"lang": "es",
"value": "El complemento Rapid Cache para WordPress es vulnerable al envenenamiento de cach\u00e9 en todas las versiones hasta 1.2.3 incluida. Esto se debe al complemento que almacena los encabezados HTTP en los datos en cach\u00e9. Esto hace posible que los atacantes no autenticados envenenen el cach\u00e9 con encabezados HTTP personalizados que pueden ser no depurados, lo que puede conducir a Cross-Site Scripting."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@ -45,6 +69,16 @@
"value": "CWE-524"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-524"
}
]
}
],
"references": [

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13689",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T15:15:15.547",
"lastModified": "2025-02-18T15:15:15.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0a61e11-1137-4da0-8580-0a44300b1542?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-04T21:15:07.137",
"lastModified": "2024-11-21T09:09:10.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:14:41.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "034678D5-42ED-4076-964F-D89620540E75"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.255678",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255678",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.255678",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255678",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2332",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-09T14:15:51.433",
"lastModified": "2024-11-21T09:09:31.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:17:02.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256283",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256283",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2393",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-12T13:15:50.023",
"lastModified": "2024-11-21T09:09:39.413",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:20:38.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:remyandrade:crud_without_page_reload\\/refresh:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72AD257E-3756-476B-A44E-9596D320CAC7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256453",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256453",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256453",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256453",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2418",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-13T18:15:07.990",
"lastModified": "2024-11-21T09:09:42.670",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:22:50.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_pos_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A86D4E42-CD06-4E87-A2FE-378E9BABE3A6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256705",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256705",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256705",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256705",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2553",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T04:15:07.073",
"lastModified": "2024-11-21T09:09:59.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:24:04.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,46 +96,101 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:remyandrade:product_review\\/rating_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154BF390-7979-405B-B58E-6FEFEDBED9A6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.257052",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257052",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.298886",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.257052",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257052",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.298886",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2555",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T07:15:05.803",
"lastModified": "2024-11-21T09:10:00.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T16:52:50.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257054",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.257054",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257054",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.257054",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2556",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T08:15:05.997",
"lastModified": "2024-11-21T09:10:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T16:50:19.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.257055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.257055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2690",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-20T10:15:11.250",
"lastModified": "2024-11-21T09:10:18.073",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:54:08.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wkeyi0x1/vul-report/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257388",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257388",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/wkeyi0x1/vul-report/issues/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257388",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257388",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2754",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T07:15:47.193",
"lastModified": "2024-11-21T09:10:26.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:56:54.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,71 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wkeyi0x1/vul-report/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257544",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257544",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/wkeyi0x1/vul-report/issues/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257544",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257544",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-23T18:15:07.770",
"lastModified": "2024-11-21T09:10:40.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T16:57:52.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,87 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257770",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257770",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.303123",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/CveSecLook/cve/issues/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.257770",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257770",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.303123",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T00:15:07.870",
"lastModified": "2024-11-21T09:10:51.980",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T17:00:05.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,87 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:music_gallery_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60452D80-76E0-47AB-99D9-9CC1853CBCB2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258001",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258001",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304234",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258001",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258001",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304234",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-31144",
"sourceIdentifier": "security@xen.org",
"published": "2025-02-14T21:15:15.107",
"lastModified": "2025-02-14T21:15:15.107",
"lastModified": "2025-02-18T15:15:16.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "For a brief summary of Xapi terminology, see:\n\n https://xapi-project.github.io/xen-api/overview.html#object-model-overview \n\nXapi contains functionality to backup and restore metadata about Virtual\nMachines and Storage Repositories (SRs).\n\nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an\nSR. This is used for two purposes; a general backup of metadata\n(e.g. to recover from a host failure if the filer is still good), and\nPortable SRs (e.g. using an external hard drive to move VMs to another\nhost).\n\nMetadata is only restored as an explicit administrator action, but\noccurs in cases where the host has no information about the SR, and must\nlocate the metadata VDI in order to retrieve the metadata.\n\nThe metadata VDI is located by searching (in UUID alphanumeric order)\neach VDI, mounting it, and seeing if there is a suitable metadata file\npresent. The first matching VDI is deemed to be the metadata VDI, and\nis restored from.\n\nIn the general case, the content of VDIs are controlled by the VM owner,\nand should not be trusted by the host administrator.\n\nA malicious guest can manipulate its disk to appear to be a metadata\nbackup.\n\nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk\nhas a 50% chance of sorting ahead of the legitimate metadata backup. A\nguest with two disks has a 75% chance, etc."
},
{
"lang": "es",
"value": "Para obtener un breve resumen de la terminolog\u00eda de Xapi, consulte: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contiene funcionalidad para realizar copias de seguridad y restaurar metadatos sobre m\u00e1quinas virtuales y repositorios de almacenamiento (SR). Los metadatos en s\u00ed se almacenan en una imagen de disco virtual (VDI) dentro de un SR. Esto se utiliza para dos prop\u00f3sitos: una copia de seguridad general de metadatos (por ejemplo, para recuperarse de una falla del host si el archivador a\u00fan est\u00e1 en buen estado) y SR port\u00e1tiles (por ejemplo, usar un disco duro externo para mover m\u00e1quinas virtuales a otro host). Los metadatos solo se restauran como una acci\u00f3n expl\u00edcita del administrador, pero ocurre en los casos en que el host no tiene informaci\u00f3n sobre el SR y debe ubicar el VDI de metadatos para recuperar los metadatos. El VDI de metadatos se ubica buscando (en orden alfanum\u00e9rico UUID) cada VDI, mont\u00e1ndolo y viendo si hay un archivo de metadatos adecuado presente. El primer VDI coincidente se considera el VDI de metadatos y se restaura desde \u00e9l. En general, el propietario de la m\u00e1quina virtual controla el contenido de las VDI y el administrador del host no deber\u00eda confiar en ellas. Un invitado malintencionado puede manipular su disco para que parezca una copia de seguridad de metadatos. Un invitado no puede elegir los UUID de sus VDI, pero un invitado con un disco tiene un 50 % de posibilidades de clasificarse antes que la copia de seguridad de metadatos leg\u00edtima. Un invitado con dos discos tiene un 75 % de posibilidades, etc."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.0,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://xenbits.xen.org/xsa/advisory-459.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41710",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T19:15:16.850",
"lastModified": "2025-02-13T02:00:01.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T15:28:00.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -44,6 +64,16 @@
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Mitel SIP Phones Argument Injection Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -55,18 +85,450 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6970_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "D391B6ED-2FEF-43A3-8ECE-F42B79E1F9CD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6970:-:*:*:*:*:*:*:*",
"matchCriteriaId": "651C4A02-AE83-4D6E-B49F-D756DF8032F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "1BD5BE48-120F-4A09-96C8-1095E04C8D69"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6940w_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0BB4B3A-65F9-4726-938D-71B686BC13E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "D1E36148-4C07-46E4-B99C-FD3D8EBF48F8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6930w_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5230BCB-800F-434D-9AAB-A35A7F87D356"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "6DE5CF0D-7BF3-468E-9809-6A1417C6989F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6920w_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "663416FA-7F4F-45CA-A28F-3FF20214F20B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "E1D8483A-A448-416F-9918-B1D995616553"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6920_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8084E6D-1382-4785-9D01-0111A04B233A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "A04266DF-3E78-47DB-BAA5-E79FCB38974B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6915_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F279F8-83D8-4EEC-AA99-5EED398653E8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "91BCABB3-BA8D-41B8-953B-A33C7BFB332C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "412A5856-40B0-4633-B0F6-D87D3DB85BE5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "7B379EEB-2927-4A36-83A1-E7B4CB88F3E4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97CB43CD-3B53-4839-9AE4-67024A276305"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6940_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "1A3ED2A5-977E-4743-838F-62EE2A7A6837"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6940_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05422EAF-9528-48CE-972C-9DF111F91570"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6930_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "4ECFE164-B4A2-44DC-B603-EF7C4E6F68F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6930_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1837336E-7A1D-414C-B888-56350AF6C32A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6873i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "66B0069E-B089-46B0-B1D7-C560A15FC26E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C298A98-C6CE-4AEB-AD9F-FFCFA1E865F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "4415660E-385F-43DC-9F37-4C06AC7F052F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "654554ED-253C-4928-92D0-92EADF5F4768"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6867i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "645135A3-362E-4DBB-805C-49A6B21EB4C9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4942E820-8103-4763-8715-F1301F233B05"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6865i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "91CC349C-AFB9-418F-9425-0038E91EF7BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AAFF6ED-44F6-4D3B-99EA-0F8FE58EC34B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.4.0.136",
"matchCriteriaId": "10E7483A-BFB0-4F2A-B5DF-43AD0A308F7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7C6275-6DA1-4768-A331-5290E8CB64D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/kwburns/CVE/blob/main/Mitel/6.3.0.1020/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0019",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46740",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:03.377",
"lastModified": "2024-09-20T18:34:08.163",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-18T16:15:17.540",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50090",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-05T17:15:06.477",
"lastModified": "2024-11-12T21:41:16.620",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-18T16:15:17.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50282",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T02:16:30.540",
"lastModified": "2025-01-24T16:15:37.570",
"lastModified": "2025-02-18T16:15:17.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53061",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T18:15:25.997",
"lastModified": "2024-11-22T17:51:45.817",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-18T16:15:18.113",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-191"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53192",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:26.780",
"lastModified": "2024-12-27T14:15:26.780",
"lastModified": "2025-02-18T16:15:18.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: clk-loongson2: Se corrige un desbordamiento de b\u00fafer potencial en el acceso a miembros de la matriz flexible El miembro de la matriz flexible `hws` en `struct clk_hw_onecell_data` est\u00e1 anotado con el atributo `counted_by()`. Esto significa que cuando se asigna memoria para esta matriz, el _contador_, que en este caso es el miembro `num` en la estructura flexible, se debe establecer en el n\u00famero m\u00e1ximo de elementos que la matriz flexible puede contener, o menos. En este caso, el n\u00famero total de elementos para la matriz flexible se determina mediante la variable `clks_num` al asignar espacio de mont\u00f3n a trav\u00e9s de `devm_kzalloc()`, como se muestra a continuaci\u00f3n: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); Por lo tanto, `clp->clk_data.num` debe establecerse en `clks_num` o menos, y no superar `clks_num`, como es el caso actualmente. De lo contrario, si los datos se escriben en `clp->clk_data.hws[clks_num]`, la instrumentaci\u00f3n proporcionada por el compilador no detectar\u00e1 el desbordamiento, lo que provocar\u00e1 un error de corrupci\u00f3n de memoria en tiempo de ejecuci\u00f3n. Solucione este problema estableciendo `clp->clk_data.num` en `clks_num`."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/02fb4f0084331ef72c28d0c70fcb15d1bea369ec",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53704",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2025-01-09T07:15:27.203",
"lastModified": "2025-01-09T15:15:18.640",
"lastModified": "2025-02-18T15:15:16.290",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 4.2
}
]
},

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-56180",
"sourceIdentifier": "security@apache.org",
"published": "2025-02-14T14:15:32.267",
"lastModified": "2025-02-14T17:15:16.317",
"lastModified": "2025-02-18T15:15:16.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft\u00a0plugin\u00a0module in Apache EventMesh master branch without release version on windows\\linux\\mac os e.g. platforms allows attackers to send controlled message and remote code execute\u00a0via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue."
},
{
"lang": "es",
"value": "CWE-502 La deserializaci\u00f3n de datos no confiables en el m\u00f3dulo de complemento eventmesh-meta-raft en la rama maestra Apache EventMesh sin versi\u00f3n de lanzamiento en plataformas Windows\\Linux\\Mac OS, por ejemplo, permite a los atacantes enviar mensajes controlados y ejecutar c\u00f3digo remoto a trav\u00e9s del protocolo RPC de deserializaci\u00f3n hessiana. Los usuarios pueden usar el c\u00f3digo en la rama maestra en el repositorio del proyecto o la versi\u00f3n 1.11.0 para solucionar este problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56557",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:14.520",
"lastModified": "2024-12-27T15:15:14.520",
"lastModified": "2025-02-18T16:15:18.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ad7923: Se corrige el desbordamiento de b\u00fafer para tx_buf y ring_xfer El AD7923 se actualiz\u00f3 para soportar dispositivos con 8 canales, pero el tama\u00f1o de tx_buf y ring_xfer no se increment\u00f3 en consecuencia, lo que provoc\u00f3 un posible desbordamiento de b\u00fafer en ad7923_update_scan_mode()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/00663d3e000c31d0d49ef86a809f5c107c2d09cd",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-56642",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:23.930",
"lastModified": "2025-02-11T16:15:46.650",
"lastModified": "2025-02-18T16:15:18.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_net_stop() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer"
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_exit_net() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer"
},
{
"lang": "es",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57045",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T15:15:16.677",
"lastModified": "2025-02-18T15:15:16.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/D-Link/DIR-859/ACL%20bypass%20Vulnerability%20in%20D-Link%20DIR-859.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57046",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T15:15:16.783",
"lastModified": "2025-02-18T15:15:16.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding \"?x=1.gif\" to the the requested url, it will be recognized as passing the authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/DGN2200/ACL%20bypass%20Vulnerability%20in%20Netgear%20DGN2200.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57049",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T15:15:16.890",
"lastModified": "2025-02-18T15:15:16.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57050",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T15:15:16.977",
"lastModified": "2025-02-18T15:15:16.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-57725",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T16:15:34.360",
"lastModified": "2025-02-14T21:15:16.033",
"lastModified": "2025-02-18T15:15:17.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the Arcadyan Livebox Fibra PRV3399B_B_LT allows a remote or local attacker to modify the GPON link value without authentication, causing an internet service disruption via the /firstconnection.cgi endpoint."
},
{
"lang": "es",
"value": "Un problema en Arcadyan Livebox Fibra PRV3399B_B_LT permite que un atacante remoto o local modifique el valor del enlace GPON sin autenticaci\u00f3n, lo que provoca una interrupci\u00f3n del servicio de Internet a trav\u00e9s del endpoint /firstconnection.cgi."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-57778",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T16:15:34.453",
"lastModified": "2025-02-14T21:15:16.373",
"lastModified": "2025-02-18T15:15:17.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Orbe ONetView Roeador Onet-1200 Orbe 1680210096 allows a remote attacker to escalate privileges via the servers response from status code 500 to status code 200."
},
{
"lang": "es",
"value": "Un problema en Orbe ONetView Roeador Onet-1200 Orbe 1680210096 permite a un atacante remoto escalar privilegios a trav\u00e9s de la respuesta del servidor del c\u00f3digo de estado 500 al c\u00f3digo de estado 200."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-57970",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-16T04:15:21.843",
"lastModified": "2025-02-16T04:15:21.843",
"lastModified": "2025-02-18T15:15:17.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname."
},
{
"lang": "es",
"value": "libarchive hasta 3.7.7 tiene una sobrelectura de b\u00fafer basada en mont\u00f3n en header_gnu_longlink en archive_read_support_format_tar.c a trav\u00e9s de un archivo TAR porque gestiona incorrectamente el truncamiento en el medio de un nombre de enlace largo GNU."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
@ -45,6 +69,16 @@
"value": "CWE-126"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7591",
"sourceIdentifier": "security@progress.com",
"published": "2024-09-05T18:15:06.480",
"lastModified": "2025-02-17T17:15:09.300",
"lastModified": "2025-02-18T16:15:19.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -108,6 +108,10 @@
}
],
"references": [
{
"url": "https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591",
"source": "security@progress.com"
},
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591",
"source": "security@progress.com",
@ -115,10 +119,6 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://url.us.m.mimecastprotect.com/s/m_v3CkRgEgSz2vDGUQi8HGPtBQ?domain=insinuator.net",
"source": "security@progress.com"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-1298",
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2025-02-14T08:15:30.877",
"lastModified": "2025-02-14T08:15:30.877",
"lastModified": "2025-02-18T15:15:18.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover."
},
{
"lang": "es",
"value": "Una vulnerabilidad l\u00f3gica en la aplicaci\u00f3n m\u00f3vil (com.transsion.carlcare) podr\u00eda generar riesgo de apropiaci\u00f3n de cuenta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1358",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-16T20:15:07.990",
"lastModified": "2025-02-16T20:15:07.990",
"lastModified": "2025-02-18T15:15:18.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Pix Software Vivaz 6.0.10. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Pix Software Vivaz 6.0.10. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,27 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
@ -118,6 +142,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [

View File

@ -2,20 +2,44 @@
"id": "CVE-2025-21401",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-15T00:15:27.163",
"lastModified": "2025-02-15T00:15:27.163",
"lastModified": "2025-02-18T15:15:18.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 3.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
@ -45,6 +69,16 @@
"value": "CWE-601"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-21702",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-18T15:15:18.530",
"lastModified": "2025-02-18T15:15:18.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/647cef20e649c576dff271e018d5d15d998b629d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b6a079c3b6f95378f26e2aeda520cb3176f7067b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e40cb34b7f247fe2e366fd192700d1b4f38196ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-21703",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-18T15:15:18.633",
"lastModified": "2025-02-18T16:15:20.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f8e3f4a4b8b90ad274dfbc66fc7d55cb582f4d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6312555249082d6d8cc5321ff725df05482d8b83",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/638ba5089324796c2ee49af10427459c2de35f71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/839ecc583fa00fab785fde1c85a326743657fd32",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-22207",
"sourceIdentifier": "security@joomla.org",
"published": "2025-02-18T16:15:20.467",
"lastModified": "2025-02-18T16:15:20.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@joomla.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NO",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://developer.joomla.org/security-centre/958-20250201-core-sql-injection-vulnerability-in-scheduled-tasks-component.html",
"source": "security@joomla.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25530",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T20:15:39.327",
"lastModified": "2025-02-11T20:15:39.327",
"lastModified": "2025-02-18T16:15:20.723",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en Digital China DCBI-Netlog-LAB Gateway 1.0 debido a la falta de verificaci\u00f3n de longitud, que est\u00e1 relacionada con el almacenamiento de informaci\u00f3n de configuraci\u00f3n de control parental. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/XiaoCurry/570a765f6812b8c53d35f623ee701b19",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25897",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T16:16:49.790",
"lastModified": "2025-02-13T16:16:49.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T15:00:36.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,79 @@
"value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro 'ip' en /userRpm/WanStaticIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_3.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25990",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T17:15:21.320",
"lastModified": "2025-02-14T21:15:16.913",
"lastModified": "2025-02-18T15:15:18.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting en hooskcms v.1.7.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /install/index.php."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25994",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T17:15:21.953",
"lastModified": "2025-02-14T20:15:37.390",
"lastModified": "2025-02-18T15:15:18.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameters date1, date2, id."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n SQL en FeMiner wms wms 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros date1, date2, id."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25997",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T17:15:22.117",
"lastModified": "2025-02-14T19:15:14.903",
"lastModified": "2025-02-18T15:15:19.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component."
},
{
"lang": "es",
"value": "La vulnerabilidad de Directory Traversal en FeMiner wms v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente databak.php."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 4.7
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-18T15:01:16.063065+00:00
2025-02-18T17:01:33.653463+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-18T14:59:38.510000+00:00
2025-02-18T17:00:05.117000+00:00
```
### Last Data Feed Release
@ -33,46 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281636
281644
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `8`
- [CVE-2025-1269](CVE-2025/CVE-2025-12xx/CVE-2025-1269.json) (`2025-02-18T14:15:28.513`)
- [CVE-2025-1414](CVE-2025/CVE-2025-14xx/CVE-2025-1414.json) (`2025-02-18T14:15:28.670`)
- [CVE-2024-13689](CVE-2024/CVE-2024-136xx/CVE-2024-13689.json) (`2025-02-18T15:15:15.547`)
- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-18T15:15:16.677`)
- [CVE-2024-57046](CVE-2024/CVE-2024-570xx/CVE-2024-57046.json) (`2025-02-18T15:15:16.783`)
- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-18T15:15:16.890`)
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-18T15:15:16.977`)
- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-02-18T15:15:18.530`)
- [CVE-2025-21703](CVE-2025/CVE-2025-217xx/CVE-2025-21703.json) (`2025-02-18T15:15:18.633`)
- [CVE-2025-22207](CVE-2025/CVE-2025-222xx/CVE-2025-22207.json) (`2025-02-18T16:15:20.467`)
### CVEs modified in the last Commit
Recently modified CVEs: `33`
Recently modified CVEs: `87`
- [CVE-2022-46169](CVE-2022/CVE-2022-461xx/CVE-2022-46169.json) (`2025-02-18T14:51:04.277`)
- [CVE-2023-50167](CVE-2023/CVE-2023-501xx/CVE-2023-50167.json) (`2025-02-18T13:43:27.293`)
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-18T14:15:27.107`)
- [CVE-2024-1696](CVE-2024/CVE-2024-16xx/CVE-2024-1696.json) (`2025-02-18T13:43:18.590`)
- [CVE-2024-22011](CVE-2024/CVE-2024-220xx/CVE-2024-22011.json) (`2025-02-18T13:42:57.540`)
- [CVE-2024-24275](CVE-2024/CVE-2024-242xx/CVE-2024-24275.json) (`2025-02-18T13:44:28.043`)
- [CVE-2024-24276](CVE-2024/CVE-2024-242xx/CVE-2024-24276.json) (`2025-02-18T13:44:14.953`)
- [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2025-02-18T13:42:34.137`)
- [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2025-02-18T13:42:12.110`)
- [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2025-02-18T13:42:04.037`)
- [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2025-02-18T13:41:56.553`)
- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-18T14:15:27.900`)
- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-18T14:15:28.070`)
- [CVE-2024-57241](CVE-2024/CVE-2024-572xx/CVE-2024-57241.json) (`2025-02-18T14:15:28.237`)
- [CVE-2024-57905](CVE-2024/CVE-2024-579xx/CVE-2024-57905.json) (`2025-02-18T13:40:32.897`)
- [CVE-2024-57906](CVE-2024/CVE-2024-579xx/CVE-2024-57906.json) (`2025-02-18T13:40:18.470`)
- [CVE-2024-57907](CVE-2024/CVE-2024-579xx/CVE-2024-57907.json) (`2025-02-18T13:40:05.290`)
- [CVE-2024-57908](CVE-2024/CVE-2024-579xx/CVE-2024-57908.json) (`2025-02-18T13:39:42.783`)
- [CVE-2024-57909](CVE-2024/CVE-2024-579xx/CVE-2024-57909.json) (`2025-02-18T13:39:06.190`)
- [CVE-2024-57912](CVE-2024/CVE-2024-579xx/CVE-2024-57912.json) (`2025-02-18T13:38:39.953`)
- [CVE-2024-57916](CVE-2024/CVE-2024-579xx/CVE-2024-57916.json) (`2025-02-18T13:38:31.347`)
- [CVE-2024-57919](CVE-2024/CVE-2024-579xx/CVE-2024-57919.json) (`2025-02-18T13:38:22.377`)
- [CVE-2025-24032](CVE-2025/CVE-2025-240xx/CVE-2025-24032.json) (`2025-02-18T14:15:28.770`)
- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T14:59:38.510`)
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-18T14:57:24.510`)
- [CVE-2024-2849](CVE-2024/CVE-2024-28xx/CVE-2024-2849.json) (`2025-02-18T16:57:52.660`)
- [CVE-2024-2930](CVE-2024/CVE-2024-29xx/CVE-2024-2930.json) (`2025-02-18T17:00:05.117`)
- [CVE-2024-31144](CVE-2024/CVE-2024-311xx/CVE-2024-31144.json) (`2025-02-18T15:15:16.050`)
- [CVE-2024-41710](CVE-2024/CVE-2024-417xx/CVE-2024-41710.json) (`2025-02-18T15:28:00.123`)
- [CVE-2024-46740](CVE-2024/CVE-2024-467xx/CVE-2024-46740.json) (`2025-02-18T16:15:17.540`)
- [CVE-2024-50090](CVE-2024/CVE-2024-500xx/CVE-2024-50090.json) (`2025-02-18T16:15:17.740`)
- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-02-18T16:15:17.927`)
- [CVE-2024-53061](CVE-2024/CVE-2024-530xx/CVE-2024-53061.json) (`2025-02-18T16:15:18.113`)
- [CVE-2024-53192](CVE-2024/CVE-2024-531xx/CVE-2024-53192.json) (`2025-02-18T16:15:18.313`)
- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-18T15:15:16.290`)
- [CVE-2024-56180](CVE-2024/CVE-2024-561xx/CVE-2024-56180.json) (`2025-02-18T15:15:16.500`)
- [CVE-2024-56557](CVE-2024/CVE-2024-565xx/CVE-2024-56557.json) (`2025-02-18T16:15:18.597`)
- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-02-18T16:15:18.770`)
- [CVE-2024-57725](CVE-2024/CVE-2024-577xx/CVE-2024-57725.json) (`2025-02-18T15:15:17.067`)
- [CVE-2024-57778](CVE-2024/CVE-2024-577xx/CVE-2024-57778.json) (`2025-02-18T15:15:17.207`)
- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-18T15:15:17.343`)
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2025-02-18T16:15:19.110`)
- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-18T15:15:18.007`)
- [CVE-2025-1358](CVE-2025/CVE-2025-13xx/CVE-2025-1358.json) (`2025-02-18T15:15:18.157`)
- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-02-18T15:15:18.357`)
- [CVE-2025-25530](CVE-2025/CVE-2025-255xx/CVE-2025-25530.json) (`2025-02-18T16:15:20.723`)
- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-02-18T15:00:36.487`)
- [CVE-2025-25990](CVE-2025/CVE-2025-259xx/CVE-2025-25990.json) (`2025-02-18T15:15:18.790`)
- [CVE-2025-25994](CVE-2025/CVE-2025-259xx/CVE-2025-25994.json) (`2025-02-18T15:15:18.923`)
- [CVE-2025-25997](CVE-2025/CVE-2025-259xx/CVE-2025-25997.json) (`2025-02-18T15:15:19.063`)
## Download and Usage

View File

@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000
CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000
CVE-2020-1631,0,1,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
CVE-2020-1631,0,0,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000
CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000
CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000
@ -152555,8 +152555,8 @@ CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817f
CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000
CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000
CVE-2020-1969,0,0,bd9f49a98ad543d77a8214d913e1ed1b4f56591bd018723df14a8a068726c075,2023-11-07T03:19:39.247000
CVE-2020-19692,0,0,7ee790d853fb0759f8d6d656fa7b5c311f39ebde27c2bdeff11b7958e0f8af43,2024-11-21T05:09:19.700000
CVE-2020-19693,0,0,857ecae3028e4bfb3989cece11683e673294d2da88b958689f6dbb2231dd4d61,2024-11-21T05:09:19.843000
CVE-2020-19692,0,1,7f260c96d75c5b443b8b872dec4e302f255477d0bc310cff7fb517ff9145de12,2025-02-18T15:15:11.590000
CVE-2020-19693,0,1,b5d87c0147e22c028906f5d67dcc40149f4eb9751f0a63d25b7fdebd9080d03d,2025-02-18T15:15:12.407000
CVE-2020-19695,0,0,6115879a09e501e85f4fc63634f821fab295f3df0873d88cdc944342d793ab21,2025-02-14T20:15:31.860000
CVE-2020-19697,0,0,90559cd46229e821328de13f626f88775e66d3af88432331bf51bc30bdc19a21,2025-02-14T20:15:32.023000
CVE-2020-19698,0,0,9d802db7209a05d363679e7d8885308fb5c287656ebeae027c922fbbca980adf,2025-02-14T19:15:11.397000
@ -166537,7 +166537,7 @@ CVE-2021-1901,0,0,b4e439599e636bd2af3f4917af437f418f3102e0c7a63069310a81adcf8a4e
CVE-2021-1903,0,0,d39f8f46801673020c5fbf3ea01fae62f95ab502fce8796c85a54991fed2fd38,2024-11-21T05:45:22.487000
CVE-2021-1904,0,0,736c70e50ad0301f8658a558129e85f2c3820d51a12d0cb07c0e689d67b51d07,2024-11-21T05:45:22.860000
CVE-2021-1905,0,0,372125f83a874275be00c1ffa8da76d54507cb820495157f0730c4f460e930e9,2025-01-29T20:15:27.953000
CVE-2021-1906,0,1,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
CVE-2021-1906,0,0,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
CVE-2021-1907,0,0,8faafa9970a3672f067ece059b551bd2adc47cbf8ba4f75421ae6f6b8c30f6d5,2024-11-21T05:45:24.550000
CVE-2021-1909,0,0,09b73ecdef2f380acd80f25a5da214cc33c77d1e8af71d49aad377ad62e8a0d2,2024-11-21T05:45:24.763000
CVE-2021-1910,0,0,a6374620334700cdcae2f54d499d65ec2bbdf4b8d8dd71d334a216c6c2c176fe,2024-11-21T05:45:25.270000
@ -168097,7 +168097,7 @@ CVE-2021-21548,0,0,e80187ad2950a294a09661ea49be95505d3f571dbd9ab97003d898e1d0358
CVE-2021-21549,0,0,5a72c9373b5f3678521b4794d922020eae70ef71ec64d4a07514540bc3837529,2024-11-21T05:48:34.457000
CVE-2021-2155,0,0,eb4c03a926d31556ec740f7b42e3a4a271a44933a2669c0de73d97afb2830623,2024-11-21T06:02:29.657000
CVE-2021-21550,0,0,7b689bab33a09088da87dc915a31847831a8baf8d2382c09a29233f12dce427b,2024-11-21T05:48:34.590000
CVE-2021-21551,0,0,0eaf22df3069b557a145e0bf22ceae51d7293de54f89854908f0541af0fed9c7,2024-11-21T05:48:34.733000
CVE-2021-21551,0,1,b45157399bbce6f0b6f63538ebd2b85806e1b1b0d0faf9004d161d9f773c7558,2025-02-18T15:46:11.177000
CVE-2021-21552,0,0,f6ecc9c2646156934a1124feca474788bf8777a4ccb7dc9918b5dcb68da8dbf7,2024-11-21T05:48:34.887000
CVE-2021-21553,0,0,767ebd1895f45e230d4b3fbd59734888f2385fa2c2212ab406a048c3362d69f4,2024-11-21T05:48:35.023000
CVE-2021-21554,0,0,46e432f9c20f997faef495d3f022ea7b2c24aa5b671ef6c0fc7280bc0f7d926d,2024-11-21T05:48:35.170000
@ -176565,7 +176565,7 @@ CVE-2021-32644,0,0,48326864e3c31b32f0a2a40c894f4c5b136a56d07940984e0dd5cc5d1fc98
CVE-2021-32645,0,0,9ccb448ef4de54166b4a9bb78f7bf78b88ec7ed02e5d39b6aaf9d53721c1c7e6,2024-11-21T06:07:26.863000
CVE-2021-32646,0,0,8b20a03ce7ae582704f08e6c885ebaac0c533a1c8e4c47c8c7120f9c4abe2385,2024-11-21T06:07:26.993000
CVE-2021-32647,0,0,c99a9247f5a69d1d18fc3868b9feddd2d5c1cfa057b7d5e9eeb861f20cdb1970,2024-11-21T06:07:27.147000
CVE-2021-32648,0,1,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
CVE-2021-32648,0,0,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
CVE-2021-32649,0,0,ec6446253c3390080ce76cfe06ab7e81e042190c48d349c3bbe41d3582775742,2024-11-21T06:07:27.430000
CVE-2021-32650,0,0,d5f4ce6dfd3368853beb539f2091f1046487c5cbc12b94f90a4301791365a1eb,2024-11-21T06:07:27.550000
CVE-2021-32651,0,0,cbadacd8e821828cc3ee8a01abf2792bbd8d05e094c35e440cf4cdd8ff657d70,2024-11-21T06:07:27.657000
@ -181494,7 +181494,7 @@ CVE-2021-3914,0,0,587d3c5496a3894f3bee9050cac22e88e23c870c5f08774001d16b01d73514
CVE-2021-39140,0,0,0d9122e27f2e8ed15d337a2299d703bde300b1bfc5641e6a2d94398671530bde,2024-11-21T06:18:40.777000
CVE-2021-39141,0,0,308173be0e42d3b05e3159d40259ea4c33203fe28aebec15c3e70290187fba0a,2024-11-21T06:18:41.053000
CVE-2021-39143,0,0,ffd9d8fa28b7e55b36ad11f211caff12c1dd3699acec6a9366db77a7d01be1df,2024-11-21T06:18:41.313000
CVE-2021-39144,0,1,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
CVE-2021-39144,0,0,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
CVE-2021-39145,0,0,9062191979151d36b337ca921b5d90e49dc062b4974dde4e6e8076a6ae806f74,2024-11-21T06:18:41.880000
CVE-2021-39146,0,0,a68f99bfb9c34ab239930244698e1dfe09b229ea585fcfca9e82690b53f706d2,2024-11-21T06:18:42.123000
CVE-2021-39147,0,0,c59b801126c107f7229606315684ca5bddd626cafdf34772e7610770cf359be9,2024-11-21T06:18:42.353000
@ -181583,7 +181583,7 @@ CVE-2021-39222,0,0,71610020ce9e67dc6940837aefe504acf8a8d9fdb64ff351427e97a92ab7a
CVE-2021-39223,0,0,5c82a3350e48ddcff666b93be9d4046e000db4dacdb95c195e7d0a6ac4994a66,2024-11-21T06:18:56.700000
CVE-2021-39224,0,0,0dbf7b0b7c0bfb5a2d9503d6d8b25452b69229fa68d356a1f3ea08c1eb5c6037,2024-11-21T06:18:56.860000
CVE-2021-39225,0,0,0657e7f09b5d865111d8be38a777e243b614f6eb04392640f272b6c40ad1c8e4,2024-11-21T06:18:57.023000
CVE-2021-39226,0,1,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
@ -183276,7 +183276,7 @@ CVE-2021-41273,0,0,99397a929c92479c9f01da437507d101a5bf50eb4f748f5c7c67a12a6baaa
CVE-2021-41274,0,0,7158857e7d9becd3b84392aa0da7e34d2226b9ffe9aeee343c59c3868ee024e3,2024-11-21T06:25:56.540000
CVE-2021-41275,0,0,3a49ec4bc6781140610890599c8c13b510fa22785ea728e600da8381edd2a293,2024-11-21T06:25:56.670000
CVE-2021-41276,0,0,77b0bd73bf0cb70e85934ea984c04179674e78ac11807816d660704623492517,2024-11-21T06:25:56.823000
CVE-2021-41277,0,1,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
CVE-2021-41277,0,0,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
CVE-2021-41278,0,0,12082549d8e21ddc5cfe62e6f0a9abd13e7d3cdf0888335bc0d75510b76033a0,2024-11-21T06:25:57.203000
CVE-2021-41279,0,0,08dbaadaa38da000bb5a66fa4874a7c1582995ca6d179537b3e54f5f561379fd,2024-11-21T06:25:57.340000
CVE-2021-4128,0,0,a7ff56c7d35e301b0a6c7f5571b37ed5026ab961314fd66e1ee36016b813b933,2024-11-21T06:36:57.697000
@ -194265,7 +194265,7 @@ CVE-2022-24812,0,0,ba1810f3f8f684688400e185ebc7233835c3ff6495510564b8dac490202d0
CVE-2022-24813,0,0,877de67ab2140b2965630d6b87135eaf6ace0d62798d255eaaad903269f6f716,2024-11-21T06:51:09.340000
CVE-2022-24814,0,0,842db0f91ff63ac21bda327b9c3901d7b44f013aad2b3062d150a0c3eda475d7,2024-11-21T06:51:09.463000
CVE-2022-24815,0,0,27e7266001f871c48274f931037b93d1533250e699e309d319783ba507b69571,2024-11-21T06:51:09.587000
CVE-2022-24816,0,1,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
CVE-2022-24816,0,0,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
CVE-2022-24817,0,0,a9b66571183a48bb0e197f3de17073db6b3e8acb18975114b7691755a44c848d,2024-11-21T06:51:09.863000
CVE-2022-24818,0,0,a1ec3bb9985bb733a04420f18fd769587d8bdd5026fd3de5f563672d821e2f49,2024-11-21T06:51:09.987000
CVE-2022-24819,0,0,2c88a72c04bc40dc0e3ecd356f74d1b49fc751aa38ec58544ec9cfabe9b06b80,2024-11-21T06:51:10.110000
@ -194906,7 +194906,7 @@ CVE-2022-25596,0,0,e20895499b50f257835b5cef4ccb445e059a896f4752a079569605fe5e1a9
CVE-2022-25597,0,0,eaf37006afa9b701597a13e86a6a8b9dcd23db62b468f93a19bc35ac7c3bdc9a,2024-11-21T06:52:24.670000
CVE-2022-25598,0,0,71bd9180efa2a8b6c83e3b611fbc1013a1ddce4691267feb04933d7262365773,2024-11-21T06:52:24.793000
CVE-2022-25599,0,0,b2500cb798c90f66522b41c69e71517db2f6434ee5e39ea15b171e36b340a1fb,2024-11-21T06:52:24.917000
CVE-2022-2560,0,0,1395889ddce333b10cee723a7ebfe84b1b4f3ba67cdf63ffb9404e0442b026ba,2024-11-21T07:01:15.113000
CVE-2022-2560,0,1,76499e3463de56f9dfdde31f5da65b99e4e8dda3455c16cb790a47b23dffd960,2025-02-18T16:15:10.817000
CVE-2022-25600,0,0,495b4f6c50a3d5cda10e78d5d8ebcc64b109954b157fc78da0e3a2ad57d29580,2024-11-21T06:52:25.050000
CVE-2022-25601,0,0,3dbf007ef693de272e8034005f728c29b9ddfaba0684d5643181ce0cd9f79fb5,2024-11-21T06:52:25.193000
CVE-2022-25602,0,0,42071c67cba7690029535ff818083bdd303016e39e645999fd4f9bcbe45b73f2,2024-11-21T06:52:25.333000
@ -194917,7 +194917,7 @@ CVE-2022-25606,0,0,f88974541eb3aa3a839095fe8d26a0574cfc401492b671fc89527187563cd
CVE-2022-25607,0,0,4315807fe55335037587ad4704a9d2df0c06852be854f37614ed33a9c7d8034e,2024-11-21T06:52:25.970000
CVE-2022-25608,0,0,5a9acd8289576bd8a115f40e2c67e4376263bf0971af6ae43e6f89e05a419f1a,2024-11-21T06:52:26.110000
CVE-2022-25609,0,0,599de89a5a011caeba847a172dec58ccd9b1ee3d45d7b41cf184df65b49da5e7,2024-11-21T06:52:26.233000
CVE-2022-2561,0,0,96b65e85c790b29d4938c07cd065406f1ab3b5bc53fe483cf86a12fe38a6754b,2024-11-21T07:01:15.230000
CVE-2022-2561,0,1,cf9fbb69422957338b663b01a457a426c4f28047f792f9304090478a6cd296f4,2025-02-18T16:15:11.030000
CVE-2022-25610,0,0,63b2067f59f7d4a1932ce97af52643e33bc4cb7a351d7eead5f7bd19e7a96fd1,2024-11-21T06:52:26.353000
CVE-2022-25611,0,0,642a5ed9c9d3e03bed247169366e2e3d0121a3af4fb9988816db035e26288f0d,2024-11-21T06:52:26.477000
CVE-2022-25612,0,0,6585fbc0b1fc2637237fd46922b6d370aff096201ee86368ec9c334416ab691b,2024-11-21T06:52:26.593000
@ -196438,7 +196438,7 @@ CVE-2022-2749,0,0,7aa26a0c23dc155071b3059a24689083204379ce2615654a58696d67869e26
CVE-2022-27490,0,0,caa845b0bc3c21e72ec430c1bb91d0947629956b0eead13ce1096d9d7ae094cd,2024-11-21T06:55:49.757000
CVE-2022-27491,0,0,8a7d2a569689762339050e1db2eba7ddc2305665c61fafc0e8565e91ee3fb10b,2024-11-21T06:55:49.903000
CVE-2022-27492,0,0,ced91e0048ca7c83b66693a736c13d17d779d0f9b27c488111d6615fa1e551b6,2024-11-21T06:55:50.043000
CVE-2022-27493,0,0,ac4b52c241a158cf2e1e484102384f85fb35c448f1c8cee955f31b0620840c35,2024-11-21T06:55:50.167000
CVE-2022-27493,0,1,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000
CVE-2022-27494,0,0,b5e4c7775e0d6176d23b0fb12b6a970b96dbce2c8884f72b3a008868b3622bc6,2024-11-21T06:55:50.290000
CVE-2022-27495,0,0,71ecb2cc76801c85c8467f4395a420002118e2b27be3cfb1821a32679e396cc2,2024-11-21T06:55:50.420000
CVE-2022-27496,0,0,525472f4d923f606f377ed6195861e6894790651b972bda97b2d24b4e96f84ab,2024-11-21T06:55:50.550000
@ -197043,7 +197043,7 @@ CVE-2022-28246,0,0,42e72399563b8c397b24f5e80e1002917bc453725243f9a631a46b8760810
CVE-2022-28247,0,0,d91e41860bc8e908ac7755fa918ae493c1b0e1029ea2b2056474b9de3bf43e07,2024-11-21T06:57:01.847000
CVE-2022-28248,0,0,4c158f114b85533d8f8f6dbcc7d56eb3e048d749afb1c18f2771c4bc03f575d0,2024-11-21T06:57:01.967000
CVE-2022-28249,0,0,a59055a5419ab6c55b17a30346ba204a34fc7fccc3398b4f67e692bb248781fe,2024-11-21T06:57:02.090000
CVE-2022-2825,0,0,584e963cdfe23de28b0e2b3a20e87ba68cf56e0e1cb8bd0ed82ef7365edb8bc1,2024-11-21T07:01:45.653000
CVE-2022-2825,0,1,40f70f6e9293a0a2adb70eb6f87e41444a7b7795afc5d1a781898b0c3c230f18,2025-02-18T16:15:11.223000
CVE-2022-28250,0,0,283a2e1a389e53f2a177db94792d609666d9596289fd137bbe4f4bdbc75daba8,2024-11-21T06:57:02.223000
CVE-2022-28251,0,0,32e68a13357ce7ffa3e0f8f15098c1b43fe63e6e04e7216ae09a4d7571dcb7bb,2024-11-21T06:57:02.350000
CVE-2022-28252,0,0,c1c1a9374bea5d81dab884e8cfdf3684b057f64cc61c4a729c7d851db38a852a,2024-11-21T06:57:02.483000
@ -197225,7 +197225,7 @@ CVE-2022-28471,0,0,22daddaeedef7bf9aab39f3549190b2978c74d629d8530f5d0fe76defac80
CVE-2022-28477,0,0,e71a98c918c772ec3dfb27061456e47f05943a8f0537c4c7b6c2b43844e0347d,2024-11-21T06:57:24.360000
CVE-2022-28478,0,0,8d9bda9a2e1a2e9d91bb3cc6c0b2ec7e8233af87753711810fc4eb8554a71ad1,2024-11-21T06:57:24.503000
CVE-2022-28479,0,0,bf3ccfb37fd50246d1ee97aa4ea7efaf57fa4c4e5539490bf2c40fe8021ca895,2024-11-21T06:57:24.650000
CVE-2022-2848,0,0,f58d1269d8a1dc55ebd4269c7f409207ae8d9a0cb217ff16ba4866d81df6b361,2024-11-21T07:01:48.140000
CVE-2022-2848,0,1,15aac2bbc76a073ca891b3e3ba3f9fb9bf9e09c4d3707e4aa233f2752b51e5d3,2025-02-18T16:15:11.440000
CVE-2022-28480,0,0,e54d1704695ba9f75944951bfd24a58836e23ddb8fee804a7b42639257c1adc9,2024-11-21T06:57:24.790000
CVE-2022-28481,0,0,17953b88e80bda6244bb3c037dfcaee26ba958ace6634f14c6cd34c20e8e36e9,2024-11-21T06:57:24.937000
CVE-2022-28487,0,0,adbca582fe216ceea0244fed85d992720694ffad6c331fdf3b6d541c21b44d1c,2024-11-21T06:57:25.087000
@ -197267,7 +197267,7 @@ CVE-2022-28550,0,0,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131
CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000
CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000
CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000
CVE-2022-2856,0,1,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
CVE-2022-2856,0,0,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
CVE-2022-28560,0,0,e4b562b74d9cdbf01bd96ffaeba2fe191d5510688ed63ab34991480eb886b49c,2024-11-21T06:57:30.927000
CVE-2022-28561,0,0,518c19fe66b4e09bc9800bc1acea302b3504c0f43ee73ab2e30472e903ec5797,2024-11-21T06:57:31.067000
CVE-2022-28568,0,0,beb032e0c658d78fbcbcb904731866c4eac85eb53ad4d016a962c9ad42c8eec9,2024-11-21T06:57:31.207000
@ -197379,10 +197379,10 @@ CVE-2022-28681,0,0,b8f43a20c2b57f6a0047369d1b230ed63c65321a6161ac4f8a31ae69a945d
CVE-2022-28682,0,0,bcb0dd1ae49198f8c0556b2624b0e12d2675714cdc534d6a7c47a01283a9b4f7,2024-11-21T06:57:44.080000
CVE-2022-28683,0,0,816d2a1520e8e5feb91adc57ce7b5e8c27cb3af115756c8d55ddd45d4976a7f8,2024-11-21T06:57:44.193000
CVE-2022-28684,0,0,9dc7594b3784884140b568f0f3dc9b301f745444d48b4d2178b9170bf14bdfe3,2024-11-21T06:57:44.340000
CVE-2022-28685,0,0,152fc0fbd8ee18c7230c5f3d5d704d88647ba8dbb768dee591dcc5b94526108f,2024-11-21T06:57:44.447000
CVE-2022-28686,0,0,fc5a8d3981233b0aa83c78ccd20ad35a64d3a864fee4217312c9452af1d74508,2024-11-21T06:57:44.560000
CVE-2022-28687,0,0,7e8679b0cab2bfb90c67e0195d85678c882fbade624a2fdf1685f8430d9cff7b,2024-11-21T06:57:44.670000
CVE-2022-28688,0,0,83a2d67d6cbd25bab7067bc2117992af15ed92b2d338438f593120b785052340,2024-11-21T06:57:44.780000
CVE-2022-28685,0,1,13fdb21feec95cfcf189f49dfca8222824884ec433e23637260407a27e43da2b,2025-02-18T16:15:09.603000
CVE-2022-28686,0,1,cebc1c945513cb1513b6df344dcd83d493529699cb43e1a8063801dc36e15a7b,2025-02-18T16:15:09.843000
CVE-2022-28687,0,1,cea133e37c0d577f02bf1101ea517f348ecd561600f39ac93e5ef05a72fe43d0,2025-02-18T16:15:10.037000
CVE-2022-28688,0,1,55c73171fec355065b988971451e8c5b848b33b671f4f0c66ded8fff4eeeea1b,2025-02-18T16:15:10.237000
CVE-2022-28689,0,0,4edf7f56430cc28a3558cb1cd6b706bef48e22bf9a07b07fb6c8e6a850c09772,2024-11-21T06:57:44.890000
CVE-2022-2869,0,0,a6c41e2e21e8e9f4dc93eb0145cd5fd437c35477a6c25e9b79b4ec21715ae9b8,2024-11-21T07:01:50.573000
CVE-2022-28690,0,0,4e56822b4ca0b82e0ba605af45b9bee55966330e5871f1dc9b7083b71a61e0d7,2024-11-21T06:57:45.003000
@ -197546,7 +197546,7 @@ CVE-2022-28854,0,0,4d1c220322567ff9f4708969d7d10eb6959c2e153abb29c60fad9cd137da4
CVE-2022-28855,0,0,bf12e5d75021f7d2d78ab47b552c3ab814362b0a565c0ae025e8b59ea8cc14af,2024-11-21T06:58:04.083000
CVE-2022-28856,0,0,97b5cb854c42e2bba4bec2f848d8712db4c9642ef906b4e7ec288909a1b2f958,2024-11-21T06:58:04.200000
CVE-2022-28857,0,0,5a8fdec603118a8974a915694450f8aa4b6b3ba53be0b982bbbdbf1bfe0eb3cb,2024-11-21T06:58:04.323000
CVE-2022-28858,0,0,d23efb5965bfe49f553eb87aa86ee83508daff6ac4e655ac793d8b70ce1506a3,2024-11-21T06:58:04.450000
CVE-2022-28858,0,1,9e7e73d449279aab38a9df1761b011f1b66cfa107d24ed8c9c98f0221de31ce3,2025-02-18T16:15:10.440000
CVE-2022-28859,0,0,a02312803b54899a0654f8646f9d712bf9ef577e625f0fe5c5597df0c05b7184,2024-11-21T06:58:04.560000
CVE-2022-2886,0,0,28abfd9bb6d6a1fe516db20229db64e5d00f417a56ab77e71cb1ddbabe24ffa6,2024-11-21T07:01:52.320000
CVE-2022-28860,0,0,4d02378e35e0791603644de01c1793437119d0059fb13a48a51bed20a880b488,2024-11-21T06:58:04.703000
@ -198099,7 +198099,7 @@ CVE-2022-29503,0,0,fe6627b1984ed177ece5e234f18079d6f3fc74ce3b11a4bd045d18a306497
CVE-2022-29504,0,0,22a099b727838bb2a7351196b16a44e93ae2bd9429da35a97f193aa24f9c461f,2023-11-07T03:46:02.927000
CVE-2022-29505,0,0,359fae353ad08726f4eb696e09d2ad139e0df88243f5d6fd78bf52cc106df861,2024-11-21T06:59:12.817000
CVE-2022-29506,0,0,3962b51c5c27127830a629454b32828486786c50629dfc167ed1a3c071df6910,2024-11-21T06:59:12.933000
CVE-2022-29507,0,0,27dd9000741eeff9b850bf513c99acf1a13f8ab0cd1f28379608570939c0aa0f,2024-11-21T06:59:13.363000
CVE-2022-29507,0,1,945b58f924585e3341e2c3d1e885edf8373ff44b156db3427d9d9620e3f37437,2025-02-18T16:15:10.620000
CVE-2022-29508,0,0,029dbe6b5c8453a90a1bede64abc7355dcd4eee2e86a4c637313c074f5e8cda3,2024-11-21T06:59:13.490000
CVE-2022-29509,0,0,28be0bb8f6027f6a3f64d19fc3df6f9375536374635311b07102c0cc08182e76,2024-11-21T06:59:13.617000
CVE-2022-2951,0,0,0a2ab5f8c78419f2afab990815bc7f66b5f4d6d9104075eb34ffa8066ce52a9b,2024-11-21T07:01:58.693000
@ -201225,7 +201225,7 @@ CVE-2022-33205,0,0,ad8faf3876c0077e3cb7d3d6e29faf9b902785a9eceab895247358a4f738f
CVE-2022-33206,0,0,e32e9be49b2eb2c4208bef01f53fd6d8a5f6271a592dbd0c7b2725f0c3f9d4ba,2024-11-21T07:07:42.970000
CVE-2022-33207,0,0,e4e6e0d2c508d1fdcbf5089ac279cd3000758bacc2fa3199bf3036006f634fc2,2024-11-21T07:07:43.093000
CVE-2022-33208,0,0,2a6f2df46feca332d01a82d64766bae5ecf7c98e1aa88ac96cab3c28dffdb603,2024-11-21T07:07:43.217000
CVE-2022-33209,0,0,0ebe2a6927b6f5e61b49a2061f18eb644565905c802cd81be878ea0c883c4bef,2024-11-21T07:07:43.390000
CVE-2022-33209,0,1,8ef77cad81932fd6188fdadf89d706a5a1ae5b860bd89c91721b6ba1ecb1e7b8,2025-02-18T16:15:11.617000
CVE-2022-3321,0,0,0b6f40cf08d2d5ed5e532a099454d95b632accf8c53ec46ef50e3d2a8b5fa145,2024-11-21T07:19:17.507000
CVE-2022-33210,0,0,2696f6298e82345893f2e01081ffb8df669d3082c9469855a36269a3df50848a,2024-11-21T07:07:43.520000
CVE-2022-33211,0,0,827df58dbc8d588d3b82af3e9575085e665db249aae05c37ee62cd1a91ffe7c2,2024-11-21T07:07:43.700000
@ -202092,7 +202092,7 @@ CVE-2022-34484,0,0,3f533b42daa5e7fd1f916268062039bde8318359b70f5d96545b1be970c41
CVE-2022-34485,0,0,cf1c5fe8184d6bbd2a9c1cd4bc47ae63f9b901e1b67c37ad6be7e135040e3c02,2024-11-21T07:09:40.087000
CVE-2022-34486,0,0,73a71e1f77d0db95faf44d581ebc7697f58e47daa52f286b1737b58b52030cc1,2024-11-21T07:09:40.210000
CVE-2022-34487,0,0,6ce1ccea025a4a271a03bc9f211e020097976ad6b82aba7dc5230a69f3b14d2a,2024-11-21T07:09:40.343000
CVE-2022-34488,0,0,df94e6a2937bc515a012a3a51a6b4d140e9fa6af146bcf4274b8888dd95ebce5,2024-11-21T07:09:40.533000
CVE-2022-34488,0,1,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000
CVE-2022-3449,0,0,0388ee85291cdb5d5e1be71b8006e97d902b56f4af3c11559fb4a756ab252692,2024-11-21T07:19:32.820000
CVE-2022-34491,0,0,6187ed181d7b674a78943e3d774b41de94989ca40b50c2995c2fe8e77a783692,2023-11-07T03:48:43.663000
CVE-2022-34494,0,0,8444dd94d30d9fcb0438cd24fba1ee60981ff98fc80786b17183be67509bd0c9,2024-11-21T07:09:40.703000
@ -202257,7 +202257,7 @@ CVE-2022-3471,0,0,495d0e8dcc7168cf73d6752bd352dc355254512638404907315f8c8587cf20
CVE-2022-34710,0,0,873660d048e28a149e24e157bf627764663cd5072c4620ae24c67a19668c7527,2024-11-21T07:10:01.627000
CVE-2022-34711,0,0,c44da15e9a9f787ffdb3f343336e0d67972465f3cc3917d88950889394348c41,2024-11-21T07:10:01.790000
CVE-2022-34712,0,0,b3b95e93f77b00695ba541618424625a617fac2c395c356b58b85959b0196871,2024-11-21T07:10:01.950000
CVE-2022-34713,0,0,c213befcfa76bf61c530a8d956ecc8d9bc6f1dacfc62577512f94aa0ad7e8731,2024-11-21T07:10:02.083000
CVE-2022-34713,0,1,2f94f2d82dff054953e34a660855d92ec8337c2f9a6efa036d564437fb454930,2025-02-18T15:06:15.647000
CVE-2022-34714,0,0,cd7847bb81aa6cee536f4b993097e8160f3dd670d1c0e9f6376413be64c73e46,2024-11-21T07:10:02.283000
CVE-2022-34715,0,0,1a6430359b7e294a3661adff75f8cbcd008524c0b3380f11bf12898f184ac7f2,2024-11-21T07:10:02.580000
CVE-2022-34716,0,0,823de494d6afe6089e979b6e89b590f446004ca2a60a6ac4e68b91b576e3ce40,2024-11-21T07:10:02.710000
@ -204223,7 +204223,7 @@ CVE-2022-36965,0,0,0ca23e8ac16cb88858e1fe0eb569827b54b6cfc7d3aeecce850c21cf96b18
CVE-2022-36966,0,0,fccbf34c70f1f2f8ada911a76c54bfb7636a8f0bb16cef989a57c4cc9e296b6c,2024-11-21T07:14:10.403000
CVE-2022-36967,0,0,3ece16c6a6e55181708868bbad5290d8849bd16a56f97d5755153213a266ceea,2024-11-21T07:14:10.527000
CVE-2022-36968,0,0,f423ae7f2d865457f2551156d8fb7595788a1b7c0617aa72595eafd6ad4f563f,2024-11-21T07:14:10.677000
CVE-2022-36969,0,0,0afc5bff7d868422a124dbab056241ca446f34a21466cf8be80c181b0c15e773,2024-11-21T07:14:10.820000
CVE-2022-36969,0,1,f9de56edb316c33ae9002ada5cbf6c225a11c92e9932b9c8ffe5dbb24be9fcb2,2025-02-18T16:15:11.987000
CVE-2022-3697,0,0,2f8b38c5a7b1843fbd9fd8a8a356e31179919e604675a74b4f7d9b071a38d1ee,2024-11-21T07:20:03.293000
CVE-2022-36970,0,0,cb3c9c8a4054905fdd0c810ac8bf9d3add8718beb8c8c6fa550ec3a3d4370b03,2024-11-21T07:14:10.953000
CVE-2022-36971,0,0,9a126f8836db514d07730137b1743a7c1da7b8e3225a7872e1dc3a89ae49569b,2024-11-21T07:14:11.087000
@ -204513,17 +204513,17 @@ CVE-2022-37348,0,0,839121da509d7997c32a937a2927f2a149c85a419aa5334432df88972878e
CVE-2022-37349,0,0,be4c38fe75bdf20aeed9cb31e90b4ed76bbc7c21e042d700d48481bc68a7343f,2024-11-27T20:11:45.410000
CVE-2022-3735,0,0,6a3a0d98c65ef51e5e82db93717d565b35d58fd0d38d66a0856b2386409b0e4d,2024-11-21T07:20:08.103000
CVE-2022-37350,0,0,2b8c3c24a3100b5d8e15e20e8e0d1fc730171430393e497c152d93645d5758fe,2024-11-27T20:11:45.410000
CVE-2022-37351,0,0,01046383c63ecf3dcc1b2b62eb931a1f970df41eff31fac963f42608f4cb1c03,2024-11-27T20:11:45.410000
CVE-2022-37352,0,0,29811d70e67480c5ae6a50339f8ef1bf240f637c50ac7705b92155c4af9bc847,2024-11-27T20:11:45.410000
CVE-2022-37353,0,0,d958d9c5f95a2d12b6554f350242c837b759201154e0df2070ac95e71520c8d8,2024-11-27T20:11:45.410000
CVE-2022-37354,0,0,8c5f73e4710d71187ccd4bb2f5e35a9d35fa3991ad2444f7906c5eeb2926a2d9,2024-11-27T20:11:45.410000
CVE-2022-37355,0,0,3f06165ac7692aa506dc379953c4d15c71f9fb28aeb9043edfccfb2990d973c1,2024-11-27T20:11:45.410000
CVE-2022-37356,0,0,ed207f6de49f0f97073773917886fafd7c7e26add21498c5a152314e65b3cbba,2024-11-27T20:11:45.410000
CVE-2022-37357,0,0,8f75ea8a83bcdcea506d766db7c6bf4a84f454444778e425a0ae209cbb47077d,2024-11-27T20:11:45.410000
CVE-2022-37358,0,0,14fc86776ec261982cd92d8f6f23258a89a481a4bdc8a1bf8dede56a6bcb2b7e,2024-11-27T20:11:45.410000
CVE-2022-37359,0,0,a20a29eab6e9d892f6e71ac600e5d128cf2387332a5597df1fe5874ab1dbd08c,2024-11-27T20:11:45.410000
CVE-2022-37351,0,1,d5b8044a97760d6c3234d0a8fd27735626dfde61898efd736ea6515abb08e21e,2025-02-18T16:15:12.197000
CVE-2022-37352,0,1,f61c84cce450042b8c3be2e1dac417a8c1d9f399e47918172cadaab2818d7e42,2025-02-18T16:15:12.407000
CVE-2022-37353,0,1,8a685d2101ee9c996c0441515374084c6315df48869471bc8b533638c837669b,2025-02-18T16:15:12.613000
CVE-2022-37354,0,1,76831841e61d25ac28d8d2d714ad74be6c1f83759ad1c4fdd8f4a96b207cf21d,2025-02-18T16:15:12.807000
CVE-2022-37355,0,1,aac48491f25019390b2ebcae75dd23911f9273182a607c612c75f13b1d8a9c53,2025-02-18T16:15:13
CVE-2022-37356,0,1,f85d6dc20ac1d33a6f06b49f45e0e101ac386f9508c0a853de0ee1142b5987f4,2025-02-18T16:15:13.190000
CVE-2022-37357,0,1,c6aa4356d882113ccf9068f91803a778fd76dc9bc9b24c6f11dc3eeeca46c767,2025-02-18T16:15:13.383000
CVE-2022-37358,0,1,248c48d7aae1d619d41ba5f9aad6790a3a8578110c35c90b6c7480cdbec9b559,2025-02-18T16:15:13.563000
CVE-2022-37359,0,1,8e1d405058a35dad2fc42f0173eb2d5d81acb1529bee17e71ece202f651d9586,2025-02-18T16:15:13.747000
CVE-2022-3736,0,0,dd1289d0aeed63a5c6b3760a10b956fb9d3fddd85d529817d7d1f2e9a1ed6ea9,2024-11-21T07:20:08.243000
CVE-2022-37360,0,0,fa0b960e795ad937f8501f34b4600d6c81a3181c1334aecb059bd02691b1a87c,2024-11-27T20:11:45.410000
CVE-2022-37360,0,1,90e9b2914e31243dff9f80f7d72ff9db2f0e855d0d259f42c3dd7f02da1e65f0,2025-02-18T16:15:13.940000
CVE-2022-37361,0,0,3ba217ae52772213ee60da4f905ed8e862327f9b6db9244049f77d49ebc5aa06,2024-11-27T20:11:45.410000
CVE-2022-37362,0,0,c03ac04d696b68b10b811ec3825b2727875f9968ad246df0c4439e546ab54bdb,2024-11-27T20:11:45.410000
CVE-2022-37363,0,0,e48d1b5269159bc30e4686ce829dddc03df755715a821c209d4f3f893da32be1,2024-11-27T20:11:45.410000
@ -204856,7 +204856,7 @@ CVE-2022-37965,0,0,7382339f174de9fdc4b84849a25276f93f4cba28d66c4e02be65e6c4c9a26
CVE-2022-37966,0,0,e7ca4037eaa67c01820375a90d40ed51c66c9acd2b7e40a9f1ea8dc246ba3edb,2025-01-02T22:15:09.867000
CVE-2022-37967,0,0,f583f9211879c0c61033a7b05dcaffc689e2c7f204c11c47debf243169222056,2025-01-02T22:15:10.010000
CVE-2022-37968,0,0,6a79a831585dfc274b8d06497d20b84f4f0f567a45a9c981f18e711d1714e0cd,2025-01-02T22:15:10.143000
CVE-2022-37969,0,0,730c88e6266ce922e60fc7a16119f2527fd7c0c5bd8ada716eb5a9782c859004,2024-11-21T07:15:28
CVE-2022-37969,0,1,9d1eadc38cb0600b3949309c7df5f942430e24319949aadeb5b16b38a5e317b3,2025-02-18T15:05:07.903000
CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000
CVE-2022-37970,0,0,e7f565127a61644046a05135c4956f50b7b6d230fb402b297bf3685c102bf1dc,2025-01-02T22:15:10.263000
CVE-2022-37971,0,0,3eed1a5f28bd8db707e5862d22ffbad5d063c63f776130157ef9ee169fa1c3c9,2025-01-02T22:15:10.393000
@ -205622,7 +205622,7 @@ CVE-2022-38902,0,0,0bd5ef2dfe8316484f8c6d7482b1c583413e4573c37fdf89a96403f325086
CVE-2022-3891,0,0,2be78a92b98d47adb36fc65d0ff218706c484f069fbfa886887fecec474e9b83,2024-11-21T07:20:27.710000
CVE-2022-38916,0,0,a11d9ae396e5442a1e1b83293983e520978271a6b8ff587580e4509a9a60d827,2024-11-21T07:17:15.400000
CVE-2022-3892,0,0,d95718c65c426e5ff39e6f74427991f85da1cec4cb39d5907cab3ebcddf469de,2024-11-21T07:20:27.833000
CVE-2022-38922,0,0,804a32ee2520431a69ab5983d5d036a74ac60d2b655bdb43d23b49f311cd8acb,2024-11-21T07:17:15.550000
CVE-2022-38922,0,1,75f26da8291c19cb45af748b522f8547a93a4d05875ae6104d4bc55adad5e809,2025-02-18T16:15:14.143000
CVE-2022-38923,0,0,49de48be827439aad30a1200f1f3b4997a55bea4b903a7990aec70cc1069ef83,2025-02-14T20:15:32.203000
CVE-2022-38928,0,0,6b98a5bb7c0fa08033d7aaa0d401c575e5bf6c62505e34d5677b96483eb9fdf9,2024-11-21T07:17:15.873000
CVE-2022-3893,0,0,169977ea85d0f87efc6cc15872f3136d1ff5790f1b49d91b9e93fa4cc18a8375,2024-11-21T07:20:27.953000
@ -207183,7 +207183,7 @@ CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb
CVE-2022-41045,0,0,2c7746ae8e1e932b2d88ac880d0098f2cc0f1b86f29deb55d7d9973c6c689257,2024-11-21T07:22:30.670000
CVE-2022-41047,0,0,6a0ae7ce4562257b0d603bd01b91f8be796bd6f172a32ffa93b6cd11cdc35e85,2024-11-21T07:22:30.820000
CVE-2022-41048,0,0,480414d14aca950b2941a5ecf68dabd47716cb3806071b62a04418f97fdf5db2,2024-11-21T07:22:30.990000
CVE-2022-41049,0,0,27884c116a645ce71f62becbe9f35ff894f2a2ed0e0b2acece8df2240db3a921,2024-11-21T07:22:31.177000
CVE-2022-41049,0,1,8ccee6a4917e04d77593cb07a5fd9144c6398eed50a20a486b4ea7c3222555d4,2025-02-18T15:02:20.783000
CVE-2022-4105,0,0,cd1b56dce82e30d11c9a21d18fca44a3e88c77944c888fa8e763622943817a5d,2024-11-21T07:34:35.557000
CVE-2022-41050,0,0,b9a7da6a62895ac068765a81a1753cf10ca24d8496ba063a3fb037f63af3ecb4,2024-11-21T07:22:31.310000
CVE-2022-41051,0,0,91f5c37a632e3e8c803acf4d44cacf6e6914c78e08e48fffc960383c791cc77d,2024-11-21T07:22:31.457000
@ -207209,7 +207209,7 @@ CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f
CVE-2022-41078,0,0,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000
CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
CVE-2022-41080,0,0,118ce96839b1c410d17219d24a9d8f3d5178ee213eae751c931efd6882bfa0af,2024-11-21T07:22:34.373000
CVE-2022-41080,0,1,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
CVE-2022-41082,0,0,b6b4e5125804eda18b18c5254fdf07d51e04e80e78d97f6677c805c3c481e123,2025-02-04T18:15:32.070000
CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000
@ -210983,7 +210983,7 @@ CVE-2022-46165,0,0,b52f4e59ab87d9ef826d1b1aa91e6a7d2ddf200190d4f26766b76124199a2
CVE-2022-46166,0,0,12dbb8116693845af5bad0761e01ce8e5a1e7215ce1813d4f82e11aaf281dd95,2024-11-21T07:30:14.600000
CVE-2022-46167,0,0,9fbc7368e3aa4e77dec66e0cd263dbe6cd1e49e34d7c4d09dd2bdc23ec0be5dd,2024-11-21T07:30:14.737000
CVE-2022-46168,0,0,cfb90e24d3dcc101412afd836697be794033b1f4d9d566f7537a84c49dad0fbf,2024-11-21T07:30:14.850000
CVE-2022-46169,0,1,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
CVE-2022-46169,0,0,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
CVE-2022-4617,0,0,8ebdc24048b2debd57a0848e54b1493c0fac1e5b4a06e75da5ac8ae75c06b81d,2024-11-21T07:35:36.497000
CVE-2022-46170,0,0,7d0728aad33cc4004748812cc2b8df0d4850c877dc0ccd5269efed0d41cc4c76,2024-11-21T07:30:15.103000
CVE-2022-46171,0,0,b44f4ea344bc0e6f16aab325e032b48c286c83d7bf551fdc6b86ced5865dcaba,2024-11-21T07:30:15.227000
@ -212326,8 +212326,8 @@ CVE-2022-48217,0,0,2db66377450a2693874a7822c694ae856a4d238b3dbbf8a1729f58effc577
CVE-2022-48219,0,0,1e0a9254f8a4ff75cfb5e8f8a9952b48af204b78dbe1ccd97aec4e82c9b9b99d,2024-11-21T07:32:58.903000
CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bdae,2024-11-21T07:36:00.857000
CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000
CVE-2022-48221,0,0,e232e59ba0cd20bf6c005d06a45b36104abcb33181d532af807e9266804a61cd,2024-11-21T07:32:59.250000
CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c35c,2024-11-21T07:32:59.403000
CVE-2022-48221,0,1,8e2b6ae95b56c1ec354dd13a73e6f16c93f2d3bfd4f5ac2a77c5adbba4615406,2025-02-18T15:15:12.600000
CVE-2022-48222,0,1,672326fbe2ac7aba88e52da31832fdd5a20e47d0b8342cf0cad6c4633e11be9b,2025-02-18T15:15:12.803000
CVE-2022-48223,0,0,27d6b67daff3b23e83f3b18569807a955e5a339f08da09cf3478a30845e757f3,2025-02-14T18:15:22.503000
CVE-2022-48224,0,0,94b36feb3339eccc317c82f96017e292429a84f2f92b12839aa24a95d48e2890,2025-02-14T18:15:22.703000
CVE-2022-48225,0,0,70a21bc233df7974e16705f02ad67bbb6b9de8ee1683ad1cefccc4ef0a022d21,2025-02-14T18:15:22.903000
@ -213404,7 +213404,7 @@ CVE-2023-0220,0,0,e05dc53e7df0257b386411675d30bf07fe2878de7c6c26b2206eb3f6c3f230
CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000
CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000
CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000
CVE-2023-0225,0,0,de83a7dc23a66cd5eda61299e05b2326fbf82eff1268c3e59540b7822737412e,2024-11-21T07:36:46.750000
CVE-2023-0225,0,1,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e85,2025-02-18T16:15:14.343000
CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000
CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000
CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000
@ -219080,7 +219080,7 @@ CVE-2023-24709,0,0,95724b3cdd469490b5d656e22c325de29d60ac897a910128b841653f99d55
CVE-2023-2472,0,0,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000
CVE-2023-24720,0,0,6b8bed746e2c0ccf07d91fd8c0cf084ef06296dda35fea10ff93f652dde8ce24,2025-02-11T20:15:32.117000
CVE-2023-24721,0,0,713c683cf74d5b07e827992264dc10f34b57246cabaf877eef720bd3ce53e5b3,2025-02-11T16:15:32.340000
CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a64f,2024-11-21T07:48:19.893000
CVE-2023-24724,0,1,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f84b,2025-02-18T15:15:13.037000
CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000
CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000
CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000
@ -220806,7 +220806,7 @@ CVE-2023-26822,0,0,962ffff9470d823e1ee37e85ddd889c14bbf8c919a0b61f3b268dbcf52cf8
CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000
CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000
CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
CVE-2023-26830,0,1,683ce7c3beff509b5543a502bd9fd65955fa34b1bc868ad726700b30fe133648,2025-02-18T15:15:13.227000
CVE-2023-26839,0,0,e18b17b8b760de23c33835c07c5d11b0e19565942bcd80c3f25ae67fe72322fd,2025-02-04T15:15:16.863000
CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
@ -220822,7 +220822,7 @@ CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f369
CVE-2023-26855,0,0,72a6531eb988dcf5d74667601b0db11debc7ecc9d10fec80ea6b5e15cf8baf25,2025-02-13T16:15:39.787000
CVE-2023-26856,0,0,bdf472bd0bc53b7d5acfe01fdb6a149a576f0180ff8a4f241faf4d19028918fd,2025-02-13T16:15:39.953000
CVE-2023-26857,0,0,e21e327f166ccc2afbd4492ef259c134b672585fcbee5ca9e205c0ce8e68a712,2025-02-13T16:15:40.150000
CVE-2023-26858,0,0,f09034118f8dcaf7e10aa34738ff0e5feddaaa675e607be064cb131bbbadf4b2,2024-11-21T07:52:00.960000
CVE-2023-26858,0,1,faf3b84a327b91b11bb5f976dc43b4d6846a8075d326d47528ed907e28e1cf49,2025-02-18T15:15:13.423000
CVE-2023-26859,0,0,a179140c87ebd4b86459c9ecbb765889c33de21f0da40c45371354b42d1fc8ca,2024-11-21T07:52:01.090000
CVE-2023-2686,0,0,b0249e40da84fca5e5393ccc5f3eb8ae24ec76d0f3735f9ce1e6cb23621be6b7,2024-11-21T07:59:05.023000
CVE-2023-26860,0,0,e65324dc2f0817d7039700acdb97e67ce3e2cd765240c766ea61aa993b7bb5a5,2025-02-11T17:15:19.957000
@ -220843,7 +220843,7 @@ CVE-2023-2691,0,0,cdad972a5b1dab057475eceea91b8b4e4026bc1b9e8ac8399b2c1d0f44fa14
CVE-2023-26911,0,0,3c699ec1125fd44557b4cc318bbc724cc49305c037cd57a71dc1c77604421632,2024-11-21T07:52:02.973000
CVE-2023-26912,0,0,cc82d907f2264644f2eb78c39d7d27bf176738b96b7b283566a267dc32dd9582,2024-11-21T07:52:03.133000
CVE-2023-26913,0,0,daf6e3585a7ed0249ea37f260c167a69001cd51ef355afc64cddc00b14b53f37,2024-11-21T07:52:03.300000
CVE-2023-26916,0,0,527513a0c9844af104e4d4417b495bc36f57a6328181592ae5b696e463e7568c,2024-11-21T07:52:03.453000
CVE-2023-26916,0,1,52b077727d939243051208ac43aa37f3e6caa024c4d543367793dd5cb31c6890,2025-02-18T15:15:13.617000
CVE-2023-26917,0,0,194a99a53507a39df42526194e8d2506a79a7f17d25af812d6883f6f110580ce,2025-02-11T16:15:36.753000
CVE-2023-26918,0,0,d35475953c7452a05db300575f9a8df61ae7e6e990c6789633f144b55663e74c,2025-02-07T16:15:34.957000
CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884d89,2025-02-11T18:15:25.377000
@ -220853,7 +220853,7 @@ CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef6
CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000
CVE-2023-26923,0,0,a32f0d476b87c565247b808c5771feae62c9104227b5b4c6c5968c4b92a3a400,2024-11-21T07:52:04.503000
CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000
CVE-2023-26925,0,0,60cd794f6ec5fd430e9a06390ff60f215a425a8b1ed6c515e21ffcf1ee0e2aa0,2024-11-21T07:52:04.800000
CVE-2023-26925,0,1,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000
CVE-2023-2693,0,0,63e3f6a21dbf47f13e9b9a150880a4fe740c6c2f1f979959b365464cba000e79,2024-11-21T07:59:05.913000
CVE-2023-26930,0,0,b2fbe64d3a5b0a40857304c5801b3c2cefb7ecf91b0c92157e84a0e74b934da4,2024-11-21T07:52:04.953000
CVE-2023-26931,0,0,1f8040f802c66b9da260204c76dbdf8565875b00e25f3822fb6071b5f692c826,2023-11-07T04:09:44.150000
@ -220918,7 +220918,7 @@ CVE-2023-27019,0,0,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2a
CVE-2023-2702,0,0,89db1f202b02a106932fedf9649fa2fe945911614dd941a764165f7605194bcf,2024-11-21T07:59:07.040000
CVE-2023-27020,0,0,2fd3363eea0280fba0331e4ff9991d28a4ed9e5bab08dd6ea65a0c6a12f1c3fa,2025-02-12T17:15:15.087000
CVE-2023-27021,0,0,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02d6e,2025-02-12T17:15:15.277000
CVE-2023-27025,0,0,df08cdd42c2b6826389279ebc90283d3ef76ee78cbcc3012cc6fc8e1b5db5686,2024-11-21T07:52:12.293000
CVE-2023-27025,0,1,88a8b7825ec2badc1c3157c1cc019bd293aee046f60ee013450cfe3bc87d7baa,2025-02-18T16:15:14.717000
CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000
CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000
CVE-2023-27033,0,0,563e9a589bd884d69713b9513c0ef1e92d34512120fc6cc7fb93b1c346976b4d,2025-02-12T17:15:15.500000
@ -221002,12 +221002,12 @@ CVE-2023-2715,0,0,9fed0daeff41969bcf8004121ebe76307716264f4dbd86f501f34cf8e41f2a
CVE-2023-27150,0,0,a7fb341ea935be349b83ec099c5ae048f809619dabe8dcfb854a9f1420730b42,2024-11-21T07:52:23.410000
CVE-2023-27151,0,0,6ca0ff73b2619a50944c698fbea13cb7d8caa108a58ea5dea5afc824bff683f7,2024-11-21T07:52:23.580000
CVE-2023-27152,0,0,b7060ca5f8d33052be20d58629e10c78d1ac35d9cb5c9bde5643340fccf09668,2024-11-21T07:52:23.777000
CVE-2023-27159,0,0,ed3c8efb78f3f61973976ac04610d200354f14273f04b8df2acff972768a5b28,2024-11-21T07:52:23.917000
CVE-2023-27159,0,1,8a3caa8c77d336a6494d769b7fc3c07c9e059e0a758d024941edd96385f97de6,2025-02-18T15:15:13.813000
CVE-2023-2716,0,0,c75f06874d7c6c43f410fe356c1ef7bc0209b04427c5c0e8715f03873d4fb142,2024-11-21T07:59:09.430000
CVE-2023-27160,0,0,122547e8abe049817524df44380b58496ff0f4900946923a4a9fcaa6baf0882b,2024-11-21T07:52:24.060000
CVE-2023-27161,0,0,c1c225c9c880e409b8a8480b7b198b4a1a1c9251b029153c521538f7810295fc,2024-11-21T07:52:24.213000
CVE-2023-27162,0,0,e4cb3c54985d114e1cae604477a240a9090b16c645a117ec58340d339263a972,2024-11-21T07:52:24.363000
CVE-2023-27163,0,0,6d5a553efc2c4772c2731dbd7d4c3f96573ca7165ec12a29399961cd83791c24,2024-11-21T07:52:24.517000
CVE-2023-27163,0,1,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000
CVE-2023-27164,0,0,92ebbb8e2a47cbcbbfb56a213309c52630a9aa5e012b6519949b14cf38a80c99,2024-11-21T07:52:24.667000
CVE-2023-27167,0,0,3ce9a2589b54172eace8e138ec0b8e990fb54060e9678beb0dda03b6727ed36e,2024-11-21T07:52:24.820000
CVE-2023-27168,0,0,f5ed98440bf9c281464a4cf0da65aedc7cda805ca2bf7d5ca1abd326046c72cf,2024-11-21T07:52:24.970000
@ -222224,12 +222224,12 @@ CVE-2023-2850,0,0,c555fba69c2f5ce171fcaefcbd101aa2733a50819ad9a4570d1194b3fa6064
CVE-2023-28500,0,0,ef554dc6eafe9b1ca470603250cc7f8eed745ad3b97dafe91430386f3a7630aa,2024-11-21T07:55:14.447000
CVE-2023-28501,0,0,915fb292fd9e9e841d488a9ff0fe13831c600d84db3c831b1a27305ff6fdf198,2024-11-21T07:55:14.620000
CVE-2023-28502,0,0,933001f4d8faea1f30dedab9736e82dc5cddfa1df039fae2b2e18dba0615f73a,2024-11-21T07:55:14.753000
CVE-2023-28503,0,0,a153edde766ab2aaaf086940269be326049896bfb8851fc97b89197844fd7807,2024-11-21T07:55:14.880000
CVE-2023-28504,0,0,336fc14d831ebb5fc3d6a25d410331f167608e13edd24193bfa14a692876f46a,2024-11-21T07:55:15.007000
CVE-2023-28505,0,0,110cdb8cd9aa97df861cde46631afed0090be8054dd0a61fea0232b31b7b2847,2024-11-21T07:55:15.137000
CVE-2023-28506,0,0,74895b01b79845872de6371e2cfc0b390f8b252d345ff6aaa42207d24d9deaa1,2024-11-21T07:55:15.257000
CVE-2023-28507,0,0,22a104259aca37459be6603394f9e2524454870e2f2422af5c456268ab7d045e,2024-11-21T07:55:15.387000
CVE-2023-28508,0,0,c2e45e9f637d398bbf5369775f4ddab8686b240d35b965a8540d3402da80356d,2024-11-21T07:55:15.517000
CVE-2023-28503,0,1,ff2bba0e5777e730f90ca8f0e544cf2c6d75016afc60de3ffdc18e9d2b007df8,2025-02-18T16:15:15.190000
CVE-2023-28504,0,1,54b5a4a021f46a0551ce9880d88717dccae938637a077d64f2d63dad7b26b5da,2025-02-18T16:15:15.373000
CVE-2023-28505,0,1,ecfef376552e2183b2a6f5ccfd9a97b196085414f8f6d785b7f4fb8c1bf70b30,2025-02-18T16:15:15.550000
CVE-2023-28506,0,1,005acd927aca933902f81b5fa86d88a73ac9182ea956fd928728a7e41e2fed74,2025-02-18T16:15:15.727000
CVE-2023-28507,0,1,e16a2c80507923fe6466b7e09864d6601b35d8e6ebecbd5619c8aa58b1953d59,2025-02-18T15:15:14.060000
CVE-2023-28508,0,1,f897bf5ede43331bf490f3d7435ddb3131128bd40ce2e27290b464509aa2cee4,2025-02-18T15:15:14.280000
CVE-2023-28509,0,0,d23369db7fab213305e6bcfd0b61e4ffebc8e0434cf6bcc1004e350f64272b38,2024-11-21T07:55:15.647000
CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343ae7,2024-11-21T07:59:25.183000
CVE-2023-28512,0,0,bc046f04a34eb8e9b06ac8b0a405f5510b39eacef271407f3f356b209b2ed0e4,2025-01-29T21:26:57.827000
@ -222814,8 +222814,8 @@ CVE-2023-29134,0,0,397a9f3e630dbbabdab5793eee6ca6dd65adb77983cd6c4b14455eac5113f
CVE-2023-29137,0,0,8076322fcc6d24a14b3a1dde3c14cbc7205520ab126c340729f53f8dfab2206a,2025-02-14T20:15:33.563000
CVE-2023-29139,0,0,8549dc3f6f4453f97357e5aef512d14ab36f212b91bd2c5ca685ffb348e7ddcd,2025-02-14T20:15:33.733000
CVE-2023-2914,0,0,b44613314f82717d0cb07c8662342f435f1919f2f997ab416019a0eadc037663,2024-11-21T07:59:33.587000
CVE-2023-29140,0,0,e37b2af112e53eb00d357840dab905310269c4f245e078006ee7da3ccf653a8a,2024-11-21T07:56:36.620000
CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3eb37,2024-11-21T07:56:36.747000
CVE-2023-29140,0,1,f55a3fbd92333404306e7231f610a5637cfd0c078560aeff8973f3d1cf076b42,2025-02-18T16:15:15.893000
CVE-2023-29141,0,1,5295db62e89c184f386036d95e68902d72b5432991a79960e34002d4d2572d06,2025-02-18T16:15:16.077000
CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000
CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000
@ -222887,7 +222887,7 @@ CVE-2023-29213,0,0,0659d2886cd4363f793e4197b39a7b9d1e21e8f6c5ccf0df28d873a06e45c
CVE-2023-29214,0,0,d695ebe20fd00d2f656f330ff8760ed69ae973785d1517327ff89cd4d04f9abc,2024-11-21T07:56:43.730000
CVE-2023-29215,0,0,1c36bb444821ace92da838cb3ef17e921a87b502ec0676faabef0901c0dabc0a,2025-02-13T17:16:17.720000
CVE-2023-29216,0,0,1e95092c16d53f0529738b1c70a171f74070a0c064e3c012922a63c29a4037fa,2025-02-13T17:16:17.877000
CVE-2023-29218,0,0,16a49299f067929867c61ed96a879b1b62717ef738078058071c4b05f94e5421,2024-11-21T07:56:44.130000
CVE-2023-29218,0,1,3652a7dff068d019905f63b4de3ade0f5e1e9781c786e870980f715d4361105f,2025-02-18T15:15:14.460000
CVE-2023-2922,0,0,6b3cd96fa545989db321db97c7346e47d72663d6eea89a4b0a7fcb4be798cc72,2024-11-21T07:59:34.243000
CVE-2023-2923,0,0,1785972f4d67cc8f83c3ca06db4e8914d84b21d5ccc07e0e55911e9b5fccfc46,2024-11-21T07:59:34.390000
CVE-2023-29234,0,0,e385146e4d7c4c78d2e9cb7adbf33a377f9e20552e4901285521032e1cede747,2025-02-13T17:16:18.023000
@ -238623,7 +238623,7 @@ CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c
CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db123,2025-02-13T18:15:49.103000
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
CVE-2023-50167,0,1,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
@ -245574,7 +245574,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f
CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000
CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
CVE-2024-12314,0,0,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000
CVE-2024-12314,0,1,c3752972466cca307bd35c84eef94c7242b54d78ea2bb12694801d320e65e43a,2025-02-18T15:15:14.687000
CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
@ -245978,7 +245978,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
CVE-2024-12797,0,1,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
@ -246709,6 +246709,7 @@ CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be531
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
CVE-2024-13689,1,1,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
@ -247071,7 +247072,7 @@ CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7ac
CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000
CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000
CVE-2024-1696,0,1,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
CVE-2024-1696,0,0,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
CVE-2024-1697,0,0,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000
@ -248883,7 +248884,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6
CVE-2024-21677,0,0,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000
CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000
CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000
CVE-2024-2168,0,0,3461f696aab79988d4e87234d76a778efc4506b3056dd37de5dffa764a6ba6a7,2024-11-21T09:09:10.260000
CVE-2024-2168,0,1,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000
CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000
CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
@ -249160,7 +249161,7 @@ CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c
CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000
CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000
CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000
CVE-2024-22011,0,1,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
CVE-2024-22011,0,0,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000
CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000
CVE-2024-22014,0,0,4cfec9b3d2520e43390c367346e4fcec3fa28706e41a48543905fc5c1d8c3d45,2024-11-21T08:55:23.560000
@ -250060,7 +250061,7 @@ CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa
CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000
CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000
CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000
CVE-2024-2332,0,0,304de721ecdbe8cab233056d0e153a006f00a79af5e1adc8c9aeb46c3b898c39,2024-11-21T09:09:31.410000
CVE-2024-2332,0,1,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000
CVE-2024-23320,0,0,5358fceafc65b7c895824a066eb3639945e8b03f1c69910f4d447f806474bf37,2025-02-13T18:17:01.897000
CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000
CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000
@ -250642,7 +250643,7 @@ CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2c
CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000
CVE-2024-23928,0,0,aa893d0bd03b0fc4eec222c87d3670cc0bd053b0b68fc8887badbad0acd19fb1,2025-01-31T17:15:13.030000
CVE-2024-23929,0,0,f24b814b1ed24e572e44263ae81453a6c749c950d9f79f981f97ff46f8081fe5,2025-01-31T17:15:13.177000
CVE-2024-2393,0,0,0458f4543c8a844640151e34e9bc015928e878b95038e499e97f09aef67aa751,2024-11-21T09:09:39.413000
CVE-2024-2393,0,1,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000
CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000
CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000
CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000
@ -250780,7 +250781,7 @@ CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2
CVE-2024-24160,0,0,e19b8014b49c30329495072f174bac90c20d64ed22c36b21f9d4c3477741d674,2024-11-21T08:59:00.147000
CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e8440e,2024-11-21T08:59:00.290000
CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000
CVE-2024-2418,0,0,154509dd2d91315c00067f4186c9636530cc59e8e86ab27eb13226ae6ce7d6ef,2024-11-21T09:09:42.670000
CVE-2024-2418,0,1,a754a85317d98b9c2f5e469fa90178131735d4897cc7aa17f5aaf089859f272f,2025-02-18T16:22:50.640000
CVE-2024-24186,0,0,07767a469bb9f886899dec5f70186dd871757234273491c05682334a187b13be,2024-11-21T08:59:00.440000
CVE-2024-24188,0,0,c6ea63f8b5a602ecddf385c0ed8349db234fffb3df07bfe2900c73a158dad28d,2024-11-21T08:59:00.590000
CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000
@ -250818,8 +250819,8 @@ CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
CVE-2024-24272,0,0,5864839a910b3cf34f75bdf7fd1f937bb6e6ec5b97bf46e24e0cf397dc23313c,2024-11-21T08:59:05.650000
CVE-2024-24275,0,1,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
CVE-2024-24276,0,1,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
CVE-2024-24275,0,0,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
CVE-2024-24276,0,0,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000
CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000
CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000
@ -251661,20 +251662,20 @@ CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52
CVE-2024-25527,0,0,2feec88a1a9765ad44469f5aec4158d93cab6f4269704036d841801342c53cda,2024-11-21T09:00:57.100000
CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000
CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000
CVE-2024-2553,0,0,574625102f38d8b2819cc74581faca98e0492649008616ccf5e43d086bdb38f9,2024-11-21T09:09:59.753000
CVE-2024-2553,0,1,0428c7caac4c14b66d42abc7e2c263763f56e7b075b21c530f6512b1c928cc0b,2025-02-18T16:24:04.587000
CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000
CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000
CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000
CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000
CVE-2024-2554,0,0,e205e9f72b72219de437b4511d9094a43e4fe790b95a7f65bbd3f50b303b2486,2024-11-21T09:09:59.897000
CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000
CVE-2024-2555,0,0,ca30b0e0943c5e8180a8434458a5fd7575e43e7d110383aabef1392203068ca9,2024-11-21T09:10:00.033000
CVE-2024-2555,0,1,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000
CVE-2024-25551,0,0,650440c21f088bef59f5c6a3697f7b30ab533966a389f6fad3ff6f66329da998,2024-11-21T09:00:58.770000
CVE-2024-25552,0,0,c29492323c9c7ee00969f36b8fb3dece7caae4dcab3dbfec3c6b1f51d7fb887c,2024-11-21T09:00:58.990000
CVE-2024-25553,0,0,d425d147501fa8006dbadf60a3ee6d0e30ea870822653a9e9b85ebafb1bf219a,2024-03-01T08:15:37.950000
CVE-2024-25554,0,0,5ebde31c21d4e190368d0ea561a226f998eab9ab1a3ffbf4889f3384c5f1c9da,2024-03-01T08:15:38.107000
CVE-2024-25559,0,0,d15ef6a8292ff4e3cc5d05413efc5a3e9dcb2e2f4913411a9a6afc4ea649c703,2024-11-21T09:00:59.190000
CVE-2024-2556,0,0,8b07973e8f6662324da1b1c114f86aae4f8bb1f4ae0d6ebd9100cba43f42f425,2024-11-21T09:10:00.173000
CVE-2024-2556,0,1,f4c80da7407f04757bd46e076f7f4e3a185b6829aa0c1e9a0fee27adafa78c35,2025-02-18T16:50:19.370000
CVE-2024-25560,0,0,7b2f14a389c4855e094fced0bf47660aa6960a07e134b3de37af09c260a2b69b,2024-11-21T09:00:59.380000
CVE-2024-25561,0,0,dea1d7704dde6d0a5306f95f9d4da9e3b9249ef4c0186b054ad470185ea987be,2024-09-12T18:50:32.413000
CVE-2024-25562,0,0,a56e4e3ba7171dbd525020e765b8f1e1293c9793670b4770b9e6bb6db8c89d53,2024-08-31T03:40:47.857000
@ -252781,7 +252782,7 @@ CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c
CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000
CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000
CVE-2024-26899,0,0,b25c468fdd9a5dde607d7e60e93a4f4378e05bbaed78a1b87031bd334bf1cf78,2024-11-21T09:03:20.160000
CVE-2024-2690,0,0,cb8394cf256eaae4e0bb95e296623bc5e9883d493c3bc191cade85f8fd8f451e,2024-11-21T09:10:18.073000
CVE-2024-2690,0,1,f54be296cda9442e3719694faf713502364bcd62ae99daa0e6de3ce951368fba,2025-02-18T16:54:08.043000
CVE-2024-26900,0,0,89eb36b4021cc9aa920b6f52a26d6c2b349256cf670208b8b8832bd853f9efc2,2024-11-21T09:03:20.300000
CVE-2024-26901,0,0,ce718d6c1afabba164002b2247fbc0f74d9cb4434a3cc5019738d6e3fcfac2ba,2024-11-21T09:03:20.453000
CVE-2024-26902,0,0,3fd3400946dbfe9fc533be7b14f34ebccba35c6430809af9d495947e583d5c1e,2024-11-21T09:03:20.690000
@ -253119,7 +253120,7 @@ CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfa
CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
CVE-2024-27217,0,0,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000
CVE-2024-27218,0,1,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
CVE-2024-27218,0,0,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000
CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000
CVE-2024-27220,0,0,4ee101d4577b781f601dfca4d5026ead710e942a600f8f26b9599978224cc5ac,2024-11-21T09:04:07.860000
@ -253129,9 +253130,9 @@ CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f58
CVE-2024-27224,0,0,f785a013141b3d88fe26f11eac326de71e5d58c27726e6d6328a3f861f1bfcdb,2024-11-21T09:04:08.610000
CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892ac7e,2024-11-21T09:04:08.790000
CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000
CVE-2024-27227,0,1,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
CVE-2024-27227,0,0,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000
CVE-2024-27229,0,1,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
CVE-2024-27229,0,0,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000
CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000
CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000
@ -253140,7 +253141,7 @@ CVE-2024-27233,0,0,619ec8955cdc02f44102a12e814b0558d5d674c6696f24a4298c3a1d2ebf1
CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49510,2024-11-21T09:04:10.320000
CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000
CVE-2024-27237,0,1,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
CVE-2024-27237,0,0,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000
CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000
CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000
@ -253392,7 +253393,7 @@ CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab04
CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
CVE-2024-2754,0,0,7d8d4f5a2d4f72cb98a0a5ce1488f82fcaee7d8e42d70a3878c3fdc55b64191f,2024-11-21T09:10:26.530000
CVE-2024-2754,0,1,f140b41aa53fbf6da0848ed003e2956f3ebbfb41a25f4725ef2371f5e6a35873,2025-02-18T16:56:54.550000
CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000
CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000
CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000
@ -254063,7 +254064,7 @@ CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f72
CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000
CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000
CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000
CVE-2024-2849,0,0,80bbcec0e80b63db2644b6fb7139b90a8664f7a4ff1e3076cb89ee2bdc2f8e32,2024-11-21T09:10:40.303000
CVE-2024-2849,0,1,b781d1db4ca087a28951b4b33976b64e85895536411670722d7577d4c6b63e42,2025-02-18T16:57:52.660000
CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000
CVE-2024-2851,0,0,f1913ee0996b40befd8b28b4cfd22ff585e0781b3db3dfac02bb2a05a881b3ea,2024-11-21T09:10:40.600000
CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6a01,2024-11-21T09:06:24.533000
@ -254669,7 +254670,7 @@ CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524
CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000
CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000
CVE-2024-2930,0,0,6664f147975063a07dcc29c53c207c9ea3b0aed5e2de65f4ee1816ba878242e1,2024-11-21T09:10:51.980000
CVE-2024-2930,0,1,238cd69f670566e1da09828c2344e755e710e55c00ffa65a462cdefa17cc700d,2025-02-18T17:00:05.117000
CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066114,2024-11-21T09:07:55.647000
CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000
CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000
@ -255994,7 +255995,7 @@ CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376
CVE-2024-31141,0,0,d3e6234dd5f7853dd5cc5624c4460d246120bc3e8971c692c1eba3ffde4baa26,2025-01-31T15:15:12.987000
CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000
CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000
CVE-2024-31144,0,0,0da39fc58fadd919fbb3c54e78b2ad673d11fbf4b9dd11741c5f891c34e967b0,2025-02-14T21:15:15.107000
CVE-2024-31144,0,1,27a5393bd8842a69656663a336180c002b70f462f45ce2ade6ba3fb63880e732,2025-02-18T15:15:16.050000
CVE-2024-31145,0,0,f3ca8145921f17e384184f2a401130163f6a98a09ec4c0f02db53b87f0633d0f,2024-11-21T09:12:55.410000
CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e65a,2024-11-21T09:12:55.600000
CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56
@ -261074,9 +261075,9 @@ CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9
CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000
CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000
CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000
CVE-2024-37601,0,1,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
CVE-2024-37601,0,0,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000
CVE-2024-37603,0,1,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
CVE-2024-37603,0,0,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
@ -264046,7 +264047,7 @@ CVE-2024-41707,0,0,a3d7b79aeb6433d50f291b767e35dfd30d5dd12d277a3c66604231c335206
CVE-2024-41708,0,0,445b65b3721f3d8f292337791cbf935557797b1033365e761cbc9951f26720b4,2024-09-26T14:35:13.827000
CVE-2024-41709,0,0,2cc1be93865d85286340548125958805b824c1daf6221d632f91b966c6c7e81d,2024-11-21T09:33:01.840000
CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000
CVE-2024-41710,0,0,b2646ae91df501710cbb001f176f9aebe73d77fcfa56108df2a061c06367e83e,2025-02-13T02:00:01.817000
CVE-2024-41710,0,1,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
@ -267677,7 +267678,7 @@ CVE-2024-46737,0,0,3ee0b00f46177dd2e3466e1a5953938cc8fa9136f768d3d578bb135b417c3
CVE-2024-46738,0,0,d194bba9468d71cf8cb190e63cfdaff20aa02ce1a672ea5f9529f704abdc7079,2024-09-20T18:35:04.373000
CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5584,2024-09-20T18:34:29.957000
CVE-2024-4674,0,0,c78832d047e3b643eaebb0eafa9c8550e597c99fc5040f942eff298210cabe1a,2024-11-21T09:43:21.190000
CVE-2024-46740,0,0,fb8bdbed16eb197f8cd7c7e64523a2ac5097b982e7119d6bcd3057213c03f398,2024-09-20T18:34:08.163000
CVE-2024-46740,0,1,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000
CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000
CVE-2024-46742,0,0,e4d9f0987a00835c8bd748f38250c558eb8edfed3f4f73ca7bbb79f2a8e020c8,2024-09-20T18:32:34.303000
CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000
@ -270203,7 +270204,7 @@ CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2
CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000
CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000
CVE-2024-5009,0,0,2a7f1a61c4ffe3ca1ccb9712403aacf784aadd4f5cfd32895abd79408baca925,2024-11-21T09:46:46.377000
CVE-2024-50090,0,0,ece231635574952850a8a7cafcbb4c2ad2a3187a224874e6aed563866f68fa20,2024-11-12T21:41:16.620000
CVE-2024-50090,0,1,b5d118883ae2a075a773a8abb27764bfe656c1915eaf2e89a5c58d42a2a84f45,2025-02-18T16:15:17.740000
CVE-2024-50091,0,0,1cb67bb828a90348a73a47095c7317641327edd2ebb55312c01ecfbc931cad87,2024-11-12T21:44:39.210000
CVE-2024-50092,0,0,8323f00a1fe325c784efe7c468f127281c29668dbe20794e7154d6c8e52c9fc7,2024-11-13T00:40:23.183000
CVE-2024-50093,0,0,6179b05561fba7cfa8e5286e363f283cb3de5666a14724b7b49f82dfcf76c0ed,2024-11-08T16:49:33.143000
@ -270412,7 +270413,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a
CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000
CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000
CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000
CVE-2024-50282,0,0,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000
CVE-2024-50282,0,1,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000
CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000
CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
@ -272276,7 +272277,7 @@ CVE-2024-53058,0,0,a8028d3d287474ecf90a26d70790957c2683a9b9f2fe3dc113a472bf0e206
CVE-2024-53059,0,0,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000
CVE-2024-5306,0,0,6337c3272526323f63fae57a5b84d48fae4f8a9830fd7394fefa4365a042d105,2024-11-21T09:47:23.970000
CVE-2024-53060,0,0,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000
CVE-2024-53061,0,0,6bfb33181350cd4c9af27d4c991c8f4d2296790e1921bf746f7816f409205ec3,2024-11-22T17:51:45.817000
CVE-2024-53061,0,1,3f3710a4f90ffd2cdcd03ef4626770b2408a5fbec497576b6679fa5d5efde367,2025-02-18T16:15:18.113000
CVE-2024-53062,0,0,e2e51fc1a396224017bf00dfccc16b8ddb176bd1ee88f9b39b170be10d48afa8,2024-11-22T17:47:43.337000
CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3aa6,2024-11-25T21:08:23.697000
CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000
@ -272418,7 +272419,7 @@ CVE-2024-53188,0,0,87bab49dbc3d18e6d91d22cbed039a405ce14263e56845387115216180a2f
CVE-2024-53189,0,0,7db5b520eec87b3d5cf3a4268bb96f973425e7266589752714a0bff057fca02c,2024-12-27T14:15:26.400000
CVE-2024-53190,0,0,153fa3f9259ec5968429531d7a41d372c24290865137d294e4746b162c77afe4,2024-12-27T14:15:26.530000
CVE-2024-53191,0,0,ab633ea293d90a9c139efda5afaef33c6071f53aa9f4d2b47925752d6bb90931,2025-01-31T16:00:01.843000
CVE-2024-53192,0,0,e8827c0a12c1ed7067fbeef26e856b81373011b74742175a86819343dd916ee6,2024-12-27T14:15:26.780000
CVE-2024-53192,0,1,7f07a134a8b5b31f722552e3f9310d84dc06bc43a45fe02a415c4b339ce4b412,2025-02-18T16:15:18.313000
CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841dd6d,2024-12-27T14:15:26.897000
CVE-2024-53194,0,0,9b3c6499c47db7a3faff7ac9925971ccc55eb1886170e79f1466f6516399f844,2025-02-11T16:15:41.640000
CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000
@ -272660,7 +272661,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
CVE-2024-53704,0,0,646c05bf19a8b546c4b27150a74eade3fe883efa2fa4dd38843e1e36cfbef051,2025-01-09T15:15:18.640000
CVE-2024-53704,0,1,ea9d5a987657b3006054c783a63425772026bf58d4e6daa2a4625dbb969a9b56,2025-02-18T15:15:16.290000
CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000
CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000
CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000
@ -273965,7 +273966,7 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e
CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000
CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
CVE-2024-56180,0,0,859a0a214e880c431d953ea42b93fc75dbc38729b9f116959536aa113f3fa28e,2025-02-14T17:15:16.317000
CVE-2024-56180,0,1,3a1561e3486ac1bb040fb6a34e878854d4f9896bca194a84398b4784453d60f5,2025-02-18T15:15:16.500000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000
@ -274239,7 +274240,7 @@ CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030
CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000
CVE-2024-56555,0,0,27d859f187620a0e53806d8ddb970b864190f9d6d5d8bd618c07bfbaa01a7d68,2024-12-27T15:15:14.297000
CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000
CVE-2024-56557,0,0,b094055cd23182d8b8134730a2178a00894d62ddcf24adba7c906422ed13179a,2024-12-27T15:15:14.520000
CVE-2024-56557,0,1,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000
CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000
CVE-2024-56559,0,0,353853da3e898d4bba88a08653e9a07b493a01962873d91259b7435d27f07afe,2024-12-27T15:15:14.760000
CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000
@ -274333,7 +274334,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf
CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000
CVE-2024-56640,0,0,10f0b2a3aaf12df52ffd0999892bf36d19f534ecac7e8924491df7836872b181,2025-02-11T16:15:46.470000
CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000
CVE-2024-56642,0,0,0dca8c301b88ee62830f0130813b46b2f13788c16ba6198c40b80f2a4204fe28,2025-02-11T16:15:46.650000
CVE-2024-56642,0,1,8abe8530351fb237277e113d6f46693243b7bf833dd01f5d3daea39a3120bb14,2025-02-18T16:15:18.770000
CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000
CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000
CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000
@ -274592,6 +274593,10 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de
CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
CVE-2024-57045,1,1,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000
CVE-2024-57046,1,1,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000
CVE-2024-57049,1,1,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000
CVE-2024-57050,1,1,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000
CVE-2024-57064,0,0,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000
@ -274656,7 +274661,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
CVE-2024-57241,0,1,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
@ -274874,7 +274879,7 @@ CVE-2024-57721,0,0,2848dad2c2b609041733157af3749bc2705ed04a630325793e55f87a8c15a
CVE-2024-57722,0,0,cc12b04f9055359b9f59d1fb9351a1dc5f896d626ba1ab2353434d622e66c018,2025-01-23T15:15:12.610000
CVE-2024-57723,0,0,8dfe124ae30760a599d5a92653aea7bf25ab7fabdd29029a0d6962e3146e832c,2025-01-23T15:15:12.820000
CVE-2024-57724,0,0,80b6486449089b1abee894f99cbdee8ef8e8a7c83dc4631c3181139e769eeda6,2025-01-23T15:15:13.020000
CVE-2024-57725,0,0,c498f9bcfb13503eba996e676be1e0c89d527282fd27cfff492633db6d1d9137,2025-02-14T21:15:16.033000
CVE-2024-57725,0,1,27c6ae24c439cdb14d5e3d88f037e70f1d1e4712d4ba24364db40248ce2a4e12,2025-02-18T15:15:17.067000
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
CVE-2024-57727,0,0,e4677a15ae16ec0ebae3eb2021b05fa3f0029b408f389dd592fbd8ecc2109cf2,2025-02-14T02:00:02.377000
CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000
@ -274902,7 +274907,7 @@ CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485
CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000
CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000
CVE-2024-57778,0,0,2b62091443e50e0aa11cddaf50af38cf82a924e836011a0f4c93d74197ed8f0c,2025-02-14T21:15:16.373000
CVE-2024-57778,0,1,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000
CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
@ -274977,22 +274982,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000
CVE-2024-57905,0,1,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
CVE-2024-57906,0,1,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
CVE-2024-57907,0,1,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
CVE-2024-57908,0,1,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
CVE-2024-57909,0,1,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
CVE-2024-57905,0,0,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
CVE-2024-57912,0,1,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000
CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000
CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000
CVE-2024-57916,0,1,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
CVE-2024-57916,0,0,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
CVE-2024-57919,0,1,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
@ -275046,7 +275051,7 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000
CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000
CVE-2024-57970,0,0,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000
CVE-2024-57970,0,1,7c0875f2d20f0c5e1f382717358d28b61ebe8a0a2bfb0f2c818ee7d95f28a926,2025-02-18T15:15:17.343000
CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
@ -276670,7 +276675,7 @@ CVE-2024-7587,0,0,905f1e2769f930482ddb7f6e8ea78290401663df4ac22d8bf86420647d5839
CVE-2024-7588,0,0,1358b20a23caea616b44e7d1fe9b2d36965a9414c7baff3fbe2639297f0ac95b,2024-08-14T13:00:37.107000
CVE-2024-7589,0,0,4a4abde1139ff2d724dfc63d85f01201c50a76c0c99327051fb78ce9046dd2da,2024-11-21T09:51:46.310000
CVE-2024-7590,0,0,1533bedd8671f69add27338b97b679c389b63d7adf3d74a6b1d24d9f2d72c2c0,2024-08-13T12:58:25.437000
CVE-2024-7591,0,0,3981556d61b5d492202f1f69870bd6896666aa7faf47c350af2b715310e14220,2025-02-17T17:15:09.300000
CVE-2024-7591,0,1,041f4eda84f2c8a6fc5bb4d14a322e4df44b8c9f4b7f6dff3915a52ba4bbd6ad,2025-02-18T16:15:19.110000
CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000
CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000
CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000
@ -279352,11 +279357,11 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000
CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000
CVE-2025-1269,1,1,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000
CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000
CVE-2025-1298,0,1,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000
CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000
CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000
@ -279372,7 +279377,7 @@ CVE-2025-1354,0,0,3d7667bfcb2c0b251ddb0a6e2cd2d09c76acedbca3edf8c1b754b383822407
CVE-2025-1355,0,0,2b32faeae86cf10a841d554d3f1028e038f2f84a86d16604e50e5f2d459277b4,2025-02-16T17:15:07.973000
CVE-2025-1356,0,0,ad47206c360f81c88d742a140cb46365165054af6533ecf378500f5e98562fa1,2025-02-16T18:15:07.383000
CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857bd,2025-02-16T19:15:09.500000
CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000
CVE-2025-1358,0,1,9cc206366a5cf3c6fd36dca7ea305ebd259d86e92a5cfd3942bb4b274e8c43ad,2025-02-18T15:15:18.157000
CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000
CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000
CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000
@ -279398,7 +279403,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b
CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
CVE-2025-1414,1,1,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
CVE-2025-1414,0,0,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -279730,7 +279735,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
CVE-2025-21401,0,0,2e24ce0f54684c9309cfe6f1adac5a5a8a1682c152140c2d76a9e52198e7f90f,2025-02-15T00:15:27.163000
CVE-2025-21401,0,1,df0f74dcda8fafe80cdce4c22148075892d97eed204201d20b25f487dd51c8fe,2025-02-18T15:15:18.357000
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000
CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000
@ -279929,6 +279934,8 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1
CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000
CVE-2025-21700,0,0,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000
CVE-2025-21701,0,0,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000
CVE-2025-21702,1,1,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000
CVE-2025-21703,1,1,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
@ -279954,6 +279961,7 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8
CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a7380917346d,2025-02-04T18:15:35.247000
CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000
CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000
CVE-2025-22207,1,1,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000
CVE-2025-22208,0,0,55682c702be57115138b9836a7ae27c0c6ea10f7b8b4845e2269e3fb48a78e9f,2025-02-15T09:15:11.043000
CVE-2025-22209,0,0,f0ef35082d3ac11b8f37aa95511370b4c1ef70485b50313f4e611683562ad393,2025-02-15T09:15:11.237000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
@ -280927,7 +280935,7 @@ CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
CVE-2025-24031,0,0,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000
CVE-2025-24032,0,1,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
CVE-2025-24032,0,0,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
@ -281506,7 +281514,7 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673
CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000
CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000
CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000
CVE-2025-25530,0,0,80f36605b63569036b66acb5263c199af5b962300f8a88d6532226521bf2cf87,2025-02-11T20:15:39.327000
CVE-2025-25530,0,1,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000
CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
CVE-2025-25742,0,0,44a73b49255ee9adcf82a52f384eb5c222198ebf34b2a31793c5bb7b83755521,2025-02-12T17:15:24.150000
@ -281514,18 +281522,18 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a
CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
CVE-2025-25897,0,0,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000
CVE-2025-25898,0,1,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
CVE-2025-25897,0,1,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000
CVE-2025-25898,0,0,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,1,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000
CVE-2025-25990,0,1,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000
CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497276,2025-02-14T19:15:14.633000
CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000
CVE-2025-25994,0,0,6bec65e408b077c95d438b99a20cddf302d68b2ed2a6a207d98d1bd92f9a888b,2025-02-14T20:15:37.390000
CVE-2025-25997,0,0,76f87d459e5781a855c01da7ce8c838760a817361c8faf2da21d279ede1a1fd5,2025-02-14T19:15:14.903000
CVE-2025-25994,0,1,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000
CVE-2025-25997,0,1,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000
CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000
CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000
CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000

Can't render this file because it is too large.