mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-04-22T04:00:19.563485+00:00
This commit is contained in:
parent
8db7e801a8
commit
47ac111e13
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-9419",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T01:15:10.210",
|
||||
"lastModified": "2024-11-21T05:40:36.300",
|
||||
"lastModified": "2025-04-22T03:15:17.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-9420",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T01:15:10.273",
|
||||
"lastModified": "2024-11-21T05:40:36.447",
|
||||
"lastModified": "2025-04-22T03:15:17.693",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3106",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-14T21:15:11.747",
|
||||
"lastModified": "2024-11-21T07:18:50.303",
|
||||
"lastModified": "2025-04-22T03:15:17.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44910",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T18:15:22.317",
|
||||
"lastModified": "2024-11-21T07:28:31.880",
|
||||
"lastModified": "2025-04-22T03:15:18.257",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45688",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-13T15:15:11.267",
|
||||
"lastModified": "2024-11-21T07:29:35.553",
|
||||
"lastModified": "2025-04-22T03:15:18.457",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46061",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-13T14:15:10.237",
|
||||
"lastModified": "2024-11-21T07:30:04.830",
|
||||
"lastModified": "2025-04-22T03:15:18.677",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46062",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-13T17:15:17.357",
|
||||
"lastModified": "2024-11-21T07:30:04.983",
|
||||
"lastModified": "2025-04-22T03:15:18.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46071",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T18:15:22.627",
|
||||
"lastModified": "2024-11-21T07:30:05.390",
|
||||
"lastModified": "2025-04-22T03:15:19.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46072",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T18:15:22.900",
|
||||
"lastModified": "2024-11-21T07:30:05.583",
|
||||
"lastModified": "2025-04-22T03:15:19.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46073",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T17:15:11.433",
|
||||
"lastModified": "2024-11-21T07:30:05.753",
|
||||
"lastModified": "2025-04-22T03:15:19.437",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46074",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T17:15:11.640",
|
||||
"lastModified": "2024-11-21T07:30:05.910",
|
||||
"lastModified": "2025-04-22T03:15:19.630",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T17:15:11.840",
|
||||
"lastModified": "2024-11-21T07:30:08.390",
|
||||
"lastModified": "2025-04-22T03:15:19.820",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46350",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-12-13T16:15:25.667",
|
||||
"lastModified": "2024-11-21T07:30:26.423",
|
||||
"lastModified": "2025-04-22T03:15:19.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46351",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-12-13T16:15:25.730",
|
||||
"lastModified": "2024-11-21T07:30:26.550",
|
||||
"lastModified": "2025-04-22T03:15:20.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46352",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-12-13T16:15:25.793",
|
||||
"lastModified": "2024-11-21T07:30:26.673",
|
||||
"lastModified": "2025-04-22T03:15:20.370",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46353",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-12-13T16:15:25.853",
|
||||
"lastModified": "2024-11-21T07:30:26.800",
|
||||
"lastModified": "2025-04-22T03:15:20.540",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46363",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-12-13T15:15:11.677",
|
||||
"lastModified": "2024-11-21T07:30:27.900",
|
||||
"lastModified": "2025-04-22T03:15:20.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46364",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-12-13T17:15:17.587",
|
||||
"lastModified": "2024-11-21T07:30:28.037",
|
||||
"lastModified": "2025-04-22T03:15:20.907",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1731.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1731.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1731",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2025-04-22T03:15:21.177",
|
||||
"lastModified": "2025-04-22T03:15:21.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect permission assignment vulnerability in the PostgreSQL commands of the USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
|
||||
"source": "security@zyxel.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1732.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1732.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1732",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2025-04-22T03:15:21.337",
|
||||
"lastModified": "2025-04-22T03:15:21.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper privilege management vulnerability in the recovery function of the USG FLEX H series uOS firmware version V1.31 and earlier could allow an authenticated local attacker with administrator privileges to upload a crafted configuration file and escalate privileges on a vulnerable device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
|
||||
"source": "security@zyxel.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2025/CVE-2025-35xx/CVE-2025-3577.json
Normal file
67
CVE-2025/CVE-2025-35xx/CVE-2025-3577.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2025-3577",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2025-04-22T03:15:21.637",
|
||||
"lastModified": "2025-04-22T03:15:21.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "**UNSUPPORTED WHEN ASSIGNED** A path traversal vulnerability in the web management interface of the Zyxel\u00a0AMG1302-T10B firmware version\u00a02.00(AAJC.16)C0 could allow an authenticated attacker with\u00a0administrator privileges to\u00a0access restricted directories by sending a crafted HTTP request to an affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jiangxiazhe/IOT_Vulnerability/blob/main/README.md",
|
||||
"source": "security@zyxel.com.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zyxel.com/service-provider/global/en/security-advisories/end-of-life",
|
||||
"source": "security@zyxel.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-22T02:00:19.663954+00:00
|
||||
2025-04-22T04:00:19.563485+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-22T01:15:18.737000+00:00
|
||||
2025-04-22T03:15:21.637000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291012
|
||||
291015
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-58250](CVE-2024/CVE-2024-582xx/CVE-2024-58250.json) (`2025-04-22T01:15:17.270`)
|
||||
- [CVE-2025-2987](CVE-2025/CVE-2025-29xx/CVE-2025-2987.json) (`2025-04-22T00:15:13.747`)
|
||||
- [CVE-2025-3849](CVE-2025/CVE-2025-38xx/CVE-2025-3849.json) (`2025-04-22T00:15:13.917`)
|
||||
- [CVE-2025-3850](CVE-2025/CVE-2025-38xx/CVE-2025-3850.json) (`2025-04-22T01:15:18.227`)
|
||||
- [CVE-2025-3854](CVE-2025/CVE-2025-38xx/CVE-2025-3854.json) (`2025-04-22T01:15:18.397`)
|
||||
- [CVE-2025-3855](CVE-2025/CVE-2025-38xx/CVE-2025-3855.json) (`2025-04-22T01:15:18.570`)
|
||||
- [CVE-2025-3856](CVE-2025/CVE-2025-38xx/CVE-2025-3856.json) (`2025-04-22T01:15:18.737`)
|
||||
- [CVE-2025-1731](CVE-2025/CVE-2025-17xx/CVE-2025-1731.json) (`2025-04-22T03:15:21.177`)
|
||||
- [CVE-2025-1732](CVE-2025/CVE-2025-17xx/CVE-2025-1732.json) (`2025-04-22T03:15:21.337`)
|
||||
- [CVE-2025-3577](CVE-2025/CVE-2025-35xx/CVE-2025-3577.json) (`2025-04-22T03:15:21.637`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `18`
|
||||
|
||||
- [CVE-2025-30406](CVE-2025/CVE-2025-304xx/CVE-2025-30406.json) (`2025-04-22T01:00:01.653`)
|
||||
- [CVE-2020-9419](CVE-2020/CVE-2020-94xx/CVE-2020-9419.json) (`2025-04-22T03:15:17.490`)
|
||||
- [CVE-2020-9420](CVE-2020/CVE-2020-94xx/CVE-2020-9420.json) (`2025-04-22T03:15:17.693`)
|
||||
- [CVE-2022-3106](CVE-2022/CVE-2022-31xx/CVE-2022-3106.json) (`2025-04-22T03:15:17.877`)
|
||||
- [CVE-2022-44910](CVE-2022/CVE-2022-449xx/CVE-2022-44910.json) (`2025-04-22T03:15:18.257`)
|
||||
- [CVE-2022-45688](CVE-2022/CVE-2022-456xx/CVE-2022-45688.json) (`2025-04-22T03:15:18.457`)
|
||||
- [CVE-2022-46061](CVE-2022/CVE-2022-460xx/CVE-2022-46061.json) (`2025-04-22T03:15:18.677`)
|
||||
- [CVE-2022-46062](CVE-2022/CVE-2022-460xx/CVE-2022-46062.json) (`2025-04-22T03:15:18.883`)
|
||||
- [CVE-2022-46071](CVE-2022/CVE-2022-460xx/CVE-2022-46071.json) (`2025-04-22T03:15:19.080`)
|
||||
- [CVE-2022-46072](CVE-2022/CVE-2022-460xx/CVE-2022-46072.json) (`2025-04-22T03:15:19.267`)
|
||||
- [CVE-2022-46073](CVE-2022/CVE-2022-460xx/CVE-2022-46073.json) (`2025-04-22T03:15:19.437`)
|
||||
- [CVE-2022-46074](CVE-2022/CVE-2022-460xx/CVE-2022-46074.json) (`2025-04-22T03:15:19.630`)
|
||||
- [CVE-2022-46117](CVE-2022/CVE-2022-461xx/CVE-2022-46117.json) (`2025-04-22T03:15:19.820`)
|
||||
- [CVE-2022-46350](CVE-2022/CVE-2022-463xx/CVE-2022-46350.json) (`2025-04-22T03:15:19.990`)
|
||||
- [CVE-2022-46351](CVE-2022/CVE-2022-463xx/CVE-2022-46351.json) (`2025-04-22T03:15:20.190`)
|
||||
- [CVE-2022-46352](CVE-2022/CVE-2022-463xx/CVE-2022-46352.json) (`2025-04-22T03:15:20.370`)
|
||||
- [CVE-2022-46353](CVE-2022/CVE-2022-463xx/CVE-2022-46353.json) (`2025-04-22T03:15:20.540`)
|
||||
- [CVE-2022-46363](CVE-2022/CVE-2022-463xx/CVE-2022-46363.json) (`2025-04-22T03:15:20.727`)
|
||||
- [CVE-2022-46364](CVE-2022/CVE-2022-463xx/CVE-2022-46364.json) (`2025-04-22T03:15:20.907`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
55
_state.csv
55
_state.csv
@ -164375,8 +164375,8 @@ CVE-2020-9415,0,0,ef76646fa0b2ca980bcbb3f258d5c81af4b28f4a866fa9262968fd28abe315
|
||||
CVE-2020-9416,0,0,678ee7fdffefb8122f98d2d2fa07fff9c04704c33af6a96f318b387be286f5b0,2024-11-21T05:40:35.917000
|
||||
CVE-2020-9417,0,0,3cc516023e70e6a935c8865c4731c48989f86d7cbb7ab77eafb6da55985bfdaf,2024-11-21T05:40:36.043000
|
||||
CVE-2020-9418,0,0,bf19abcf13fe44d4c640b13ee8aa6bba6037a9e15bb831b98897ff160269e409,2024-11-21T05:40:36.167000
|
||||
CVE-2020-9419,0,0,0c1a1cfc67fbc1c58af6a39112bda97096bd94f4243a5b7e252ae4e01088ef6a,2024-11-21T05:40:36.300000
|
||||
CVE-2020-9420,0,0,0d75c89ec90bed06f070eb3a94339f40bb51d27888c1e7d5d1dbc914cfb3d72b,2024-11-21T05:40:36.447000
|
||||
CVE-2020-9419,0,1,3e31c1f00ec37a28a973a2beadb514eaffb1aae45ccbeece47087b5df0c336e2,2025-04-22T03:15:17.490000
|
||||
CVE-2020-9420,0,1,7795d44992372db85450a85517f440ef5cbb15ef438b125efd1189d57a20d80c,2025-04-22T03:15:17.693000
|
||||
CVE-2020-9423,0,0,d1917d65387e05fc106529e94c9253e649eb443df3fa0f1ab4a15d833e041c04,2024-11-21T05:40:36.580000
|
||||
CVE-2020-9425,0,0,82ce627c6cb82beb4075cb5606c5505dcf53ba00b2270ae6f2986543c56ae652,2024-11-21T05:40:36.720000
|
||||
CVE-2020-9426,0,0,48c99c5427b01e47061aa2848a9ca5e6963b24e2c3e3a561ab6e685b55758253,2024-11-21T05:40:36.860000
|
||||
@ -199495,7 +199495,7 @@ CVE-2022-31056,0,0,06eed9959d681e6f572377b20bac5ea47153bab1d7d91cfe5b1df10c5847f
|
||||
CVE-2022-31057,0,0,dbe8afeb454290f2ebbc1f2f756d0a76a25349ec26ed73d2623981acf6046774,2024-11-21T07:03:48.270000
|
||||
CVE-2022-31058,0,0,4b27e4b703492e727552948e80c9415dc6bb35a7522efe08685b698f0b2f47ec,2024-11-21T07:03:48.397000
|
||||
CVE-2022-31059,0,0,841ea1ac846d576ca620bde28a5debcf5f890e98f7c423b3705f03c564b85aa4,2024-11-21T07:03:48.520000
|
||||
CVE-2022-3106,0,0,c7547f002f4111e9c61e1adf975b48465f6923de95a4a66968e32fee797c4d8c,2024-11-21T07:18:50.303000
|
||||
CVE-2022-3106,0,1,70cd450bd5d89f46cdb662d431dcfc3827fafe8e972b19d9846ef19c98689818,2025-04-22T03:15:17.877000
|
||||
CVE-2022-31060,0,0,88e1013792412a9ffaa918423f78f897121d9622bdd586f8dbce64b5c45a9d01,2024-11-21T07:03:48.653000
|
||||
CVE-2022-31061,0,0,1d7f03926b27da2e5bcb13dc33e9ab7fcb1c5ac6be7db8c176cd8f02e088a211,2024-11-21T07:03:48.790000
|
||||
CVE-2022-31062,0,0,a3eef6bb1a70b448b6b51e2ade575c39e8c74091cd30f9157a87f1d75a0b3a71,2024-11-21T07:03:48.917000
|
||||
@ -210251,7 +210251,7 @@ CVE-2022-44897,0,0,f2ce2222aad98b15722e805eaf7ff574143cc8421ca9aa5c80a27ceafc26b
|
||||
CVE-2022-44898,0,0,e598ff335afcba3db9b3c480d0a934b2f1404512710eff58974c561277ec04a2,2024-11-21T07:28:31.563000
|
||||
CVE-2022-44900,0,0,4273656bcc7ff880ee5d763e12d79f06dddcceec1d544b43fdb0767b6e6abbf4,2024-11-21T07:28:31.730000
|
||||
CVE-2022-4491,0,0,7f5f8254bee14988a2744d87aaae4cbfa4cf44402a87bfb5b3dd5cd3a21468c3,2025-04-09T19:15:46.247000
|
||||
CVE-2022-44910,0,0,986011568a2b62abd84f72f28fb4a64463dbedc809f3a51164412282ebb3091a,2024-11-21T07:28:31.880000
|
||||
CVE-2022-44910,0,1,7f798590a89b32f025652aa7a56477f7d1417476759842e78237d89ba4507368,2025-04-22T03:15:18.257000
|
||||
CVE-2022-4492,0,0,eeb9adcb39c8c54bf51bc51faf131aeaccc620b1e27842fd0d5d7d5689789ab3,2025-03-12T15:15:38.020000
|
||||
CVE-2022-44928,0,0,572ba273c786a7fe62c949e507f941e2444bd4cc8e8457464a9738e248f29990,2024-11-21T07:28:32.020000
|
||||
CVE-2022-44929,0,0,0ff05fbc331896c20ecb2f389ce52bd42f3e3d3fe3dc7d71d21c779c9bf59173,2024-11-21T07:28:32.170000
|
||||
@ -210790,7 +210790,7 @@ CVE-2022-45674,0,0,580031b9954cf940fff84360cd66195abd3dcb8e388dfd965c100f8ba0740
|
||||
CVE-2022-45677,0,0,43919b690ca911b467815606707b1186a37bc08bcec4c57689a4e4e1708d83c1,2025-03-14T19:15:39.943000
|
||||
CVE-2022-4568,0,0,ee6ffc57bf7a69ab5e6be1a916004699612e2373f90b2f7d4925230d76802177,2025-01-30T16:15:28.620000
|
||||
CVE-2022-45685,0,0,00c004a5d1bc9bc9ee3a7d4a6dbab72cc8ff47765568898ab640257016353f57,2024-11-21T07:29:35.377000
|
||||
CVE-2022-45688,0,0,e84beb6b5e6221dbe254b4da8056cfcb30e6a47ff988ff305fa753750d577932,2024-11-21T07:29:35.553000
|
||||
CVE-2022-45688,0,1,f7a87c81feb967e52f819d86ab276782335eae8e157e1b7ca1ca0a3e74c8939e,2025-04-22T03:15:18.457000
|
||||
CVE-2022-45689,0,0,d279eb426897f1a5c4c640557c1d2cd4d189cd451fee6c89666245857dc180d2,2024-11-21T07:29:35.707000
|
||||
CVE-2022-4569,0,0,4a2599063fefb513ab23f360a9f2529d620d0c97fa1dc35085c7a5a3cf63116b,2024-11-21T07:35:30.753000
|
||||
CVE-2022-45690,0,0,60bd70496b899e82c07add93ab398ff18b0fed1cb0600805d08475850b553aef,2024-11-21T07:29:35.860000
|
||||
@ -211031,14 +211031,14 @@ CVE-2022-46051,0,0,e186846ccdb834553ce45fa6c1479268f81f4de95a904b93ba3d4bc4aa366
|
||||
CVE-2022-46058,0,0,1ee8ca09badf49f4f8d633c558019211cadc0ab4bf5bd93ba52ed68435a34f89,2024-11-21T07:30:04.527000
|
||||
CVE-2022-46059,0,0,633fba6fcc71b6e12afc1583834d50baca4ec55c55cd99b8f15cce3280f86cbe,2024-11-21T07:30:04.677000
|
||||
CVE-2022-4606,0,0,beac2a53e583b356feec7e0dd5b9faebcc7522f5fb76726d2953e036f6e17cec,2024-11-21T07:35:35.153000
|
||||
CVE-2022-46061,0,0,e58fd9263d0ae08ee55689580601971bcab6fbca6c14ba770bc9b8c8ce897a46,2024-11-21T07:30:04.830000
|
||||
CVE-2022-46062,0,0,54e05f909770e4c216c99a09d19df911aaa0c24f1573777ab37f43301651b20d,2024-11-21T07:30:04.983000
|
||||
CVE-2022-46061,0,1,ce8050425bf28bebc9ee9d05a212e6f4919aaba789f7ea904651722c801370e2,2025-04-22T03:15:18.677000
|
||||
CVE-2022-46062,0,1,d82385cc979d034738d3fb9baba114270ab11c9dac5eb978463b15dc065f3a7a,2025-04-22T03:15:18.883000
|
||||
CVE-2022-4607,0,0,936ba49505ee78cee0b1bacfea62faeccf31c340eceb7731d55d13ff31d00a0d,2024-11-21T07:35:35.267000
|
||||
CVE-2022-46070,0,0,bdd1aa796f03fd1a6d97b18406c747c4dc5cb3e2b6c9802a5f1455aa139b7786,2024-11-21T07:30:05.137000
|
||||
CVE-2022-46071,0,0,06cf0e32005ad54f36d222eeb16cca6c3917a030164eb8f9f5163922d4fbbfd9,2024-11-21T07:30:05.390000
|
||||
CVE-2022-46072,0,0,d199b9b426f95fca22764d2c7a4018cbfd5ebb97ad2e453676da34511f390dd8,2024-11-21T07:30:05.583000
|
||||
CVE-2022-46073,0,0,80d36d822ef62e78f23e7654145243718f1e9d79fb4a38713545ed8b8dc300e8,2024-11-21T07:30:05.753000
|
||||
CVE-2022-46074,0,0,cef2b2808e50ea89d69e7fabb2a41df61d021dafa1447e45b450fd5bd67ef529,2024-11-21T07:30:05.910000
|
||||
CVE-2022-46071,0,1,6a4812bf22c2592b39b26d18f1e1bd17223c17698ec2ef39992743ca6071b027,2025-04-22T03:15:19.080000
|
||||
CVE-2022-46072,0,1,d5c1ed1e141e0b375438aceb0f5adf10697a4a61a3ec2a2e6e97c76ba2ef8c49,2025-04-22T03:15:19.267000
|
||||
CVE-2022-46073,0,1,e8d368f51265e46e47693baee9f2b0807624ea8730c789fb3ac73ca4dedc8225,2025-04-22T03:15:19.437000
|
||||
CVE-2022-46074,0,1,4788d35b98e1ea6fa3895a7dde451e80e004f2457cc546e434d991913724aa40,2025-04-22T03:15:19.630000
|
||||
CVE-2022-46076,0,0,d8ca5395c9172594a40906a90b11f75fe055db1008b3fe8b60e625ee8e935c68,2025-04-17T14:15:22.443000
|
||||
CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d980,2024-11-21T07:35:35.383000
|
||||
CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000
|
||||
@ -211056,7 +211056,7 @@ CVE-2022-46101,0,0,7cf06e60fd5e4c3fc548ed2e8806771294f729a20a1cbbcf5b426d13bc4f2
|
||||
CVE-2022-46102,0,0,4c00a7a0a9d764a286d900594ac7cdb1f274427bbbe466a7f8ba751dff829741,2025-04-15T15:16:05.360000
|
||||
CVE-2022-46109,0,0,4118e1dba5a13c2589463e26dbcd054fafe051bcd884bc8ce6cfde3af445d9bb,2025-04-17T18:15:44.560000
|
||||
CVE-2022-4611,0,0,e7ac0deadc94e1429edc607c065ffeb7559f1b9634b4fa7eb0189eb24e1bba3f,2024-11-21T07:35:35.763000
|
||||
CVE-2022-46117,0,0,16d1e4a88a7bbf2646f4483b9f7d92c865cb83066ac19ead545ab74e29241da3,2024-11-21T07:30:08.390000
|
||||
CVE-2022-46117,0,1,58fdee83e2054653e48d8ad73266964ed4359908bf5626b7f5adeb9a138a18e6,2025-04-22T03:15:19.820000
|
||||
CVE-2022-46118,0,0,2bd1f413a4d8819d8cca325ad7a1cd8651117c7401d2c56a571689372bb00bef,2024-11-21T07:30:08.530000
|
||||
CVE-2022-46119,0,0,b24a6af81571913eb5cc008925f89ef6b665ddb6ae30e6f47d571b699fd2c3ec,2024-11-21T07:30:08.667000
|
||||
CVE-2022-4612,0,0,78b49419ee681703024b9b4d6006354881534a73d1642ee07adbe89c373ec39e,2024-11-21T07:35:35.887000
|
||||
@ -211269,10 +211269,10 @@ CVE-2022-46346,0,0,43dbfc33fecd7a9ffc1be49ecdeea19ccfa0baaa8828a418a681fb1d72664
|
||||
CVE-2022-46347,0,0,cc66d83c79f3e44218c12a0b35b7e55cacad6ed89947cf74b4d04d9df27ffa19,2024-11-21T07:30:26.033000
|
||||
CVE-2022-46348,0,0,b3b3c1c66b630027d0435e28cfbea60f295b340d9c6c2d048fb841d160e7633e,2024-11-21T07:30:26.163000
|
||||
CVE-2022-46349,0,0,566c5c39bfe05770f73a863860b81dc2e15ce7d4b6742e6a1f7705feeac17242,2024-11-21T07:30:26.293000
|
||||
CVE-2022-46350,0,0,a0acaa613de16b6e529018231b3ce8fd35d412bcb6d4fd0ed44085c0227a72b2,2024-11-21T07:30:26.423000
|
||||
CVE-2022-46351,0,0,cbd5767cdc4db945cb0ba43cd7688d196bd29a43d77efaf50a133f4067e3d21e,2024-11-21T07:30:26.550000
|
||||
CVE-2022-46352,0,0,00a13155dc5b8ed7b035aa6118159b19d015bd5bbf2970a852fb90f56d755153,2024-11-21T07:30:26.673000
|
||||
CVE-2022-46353,0,0,fa817b94ddb190f2f70356e68449128669d0ac6f4734acfa383e1e6cac4ada12,2024-11-21T07:30:26.800000
|
||||
CVE-2022-46350,0,1,12975a8ab0cf772e1f1063fc4e9282bcca357c7f9bf9ca90d73da56cec2ae134,2025-04-22T03:15:19.990000
|
||||
CVE-2022-46351,0,1,4b765e4ca8981e8ad350b5383d09a4e7abb742ec057a9e8c9934342c94588f5e,2025-04-22T03:15:20.190000
|
||||
CVE-2022-46352,0,1,707c3915f028a9d4ae8a8aa45820c54e93763f1abb162b8eb5af678d30349c71,2025-04-22T03:15:20.370000
|
||||
CVE-2022-46353,0,1,a40da2d3ede62484b698631af7fae6e9663263708bb7f0d2fa6df4f033d99a68,2025-04-22T03:15:20.540000
|
||||
CVE-2022-46354,0,0,b54e101d98bcc7bdf3369d8e22b533068f967b06511fa3684503bc3291cd0106,2024-11-21T07:30:26.940000
|
||||
CVE-2022-46355,0,0,305a6a49c47ba6f068e02b03054bb94be666adcbdda42b6f54058d176f63c547,2024-11-21T07:30:27.060000
|
||||
CVE-2022-46356,0,0,17ca9ad9399acc0a981ea70d03ac8944e2e5914be2c741108861286b4fe17cd2,2025-03-28T16:15:21.900000
|
||||
@ -211282,8 +211282,8 @@ CVE-2022-46359,0,0,7ac9438195587de5deff727fa278ba53c3fc732d2777d85361d36e310b96e
|
||||
CVE-2022-4636,0,0,62b2b9a320d3f7c1b1e6d8c5b7aeab8c8de6365fed0e24bb64bd90fcb920bb46,2024-11-21T07:35:38.497000
|
||||
CVE-2022-46360,0,0,3efe47f1fb225b5eac0554f57801b8add832b1c9193a194a7f7bf29a04d85091,2025-04-10T17:15:36.407000
|
||||
CVE-2022-46361,0,0,8123416efbf539917e595ae1846ae046080e1a9d1d86d394dc85bef02bcb6e74,2024-11-21T07:30:27.763000
|
||||
CVE-2022-46363,0,0,11bf4080c5119e3de59053a93e081168e64a55f6f5be7ad2e04203a89699dde6,2024-11-21T07:30:27.900000
|
||||
CVE-2022-46364,0,0,bf2da06870cb78dfa9d7f6fcb66b0c2944fe3d32f8bd394e486f01443b65c12f,2024-11-21T07:30:28.037000
|
||||
CVE-2022-46363,0,1,e7370406d3b0e934f4b33a41e88b599b6f49ecd32baa7922e5a5834ec071474c,2025-04-22T03:15:20.727000
|
||||
CVE-2022-46364,0,1,b1228f25e96ebc84bfcbc182b1a08976e1e40c7e83bb8c1d983f338939133b3c,2025-04-22T03:15:20.907000
|
||||
CVE-2022-46365,0,0,3adbb9427147951a7db969b9e813a9ba8a41c016e073bc9da1dde0142401e072,2024-11-21T07:30:28.150000
|
||||
CVE-2022-46366,0,0,0333a609c61f9c7f8c01fdb3ba6c785fd18686d7d18505535fd58dcd81898c6a,2024-11-21T07:30:28.337000
|
||||
CVE-2022-46367,0,0,286e3428ff7fcaad8f6a809b1ff608eb4e66ae8548b5beeca32bd9fab4e7cbcb,2024-11-21T07:30:28.533000
|
||||
@ -277482,7 +277482,7 @@ CVE-2024-5824,0,0,e1bcdf6d43e3da8ae6ba6ab7de5f8d3f3eaee723b9a1ed9af8e8dbb46b2110
|
||||
CVE-2024-58248,0,0,61da7a85b05c06a8c0af31ff84c50aa7cbce10a0c387cc01c16d82528c130432,2025-04-17T20:22:16.240000
|
||||
CVE-2024-58249,0,0,6dd099183450ed4d63d99317401203db2f85417f3bb56d45d02c724b904877dc,2025-04-17T20:22:16.240000
|
||||
CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000
|
||||
CVE-2024-58250,1,1,62561e9f7788e1baf846a65ee8adbb795fa02feaee8e1ca73bf6dd457a840038,2025-04-22T01:15:17.270000
|
||||
CVE-2024-58250,0,0,62561e9f7788e1baf846a65ee8adbb795fa02feaee8e1ca73bf6dd457a840038,2025-04-22T01:15:17.270000
|
||||
CVE-2024-5826,0,0,676ce5cec2202232492aeb7a31cb471cd0485dd44f0bad4d2271201c9d98c0de,2024-11-21T09:48:24.490000
|
||||
CVE-2024-5827,0,0,12cdd01c3634b5f2da13128a187bc2d1c8d9fa87429a9aed8ec50812f82df183,2024-11-21T09:48:24.607000
|
||||
CVE-2024-5828,0,0,73069a2f9dbd005f637a8c432d288f4c861c4d147da919c5c71f3de2432e48cd,2025-01-08T21:25:28.967000
|
||||
@ -282518,6 +282518,8 @@ CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847
|
||||
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
|
||||
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
|
||||
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
|
||||
CVE-2025-1731,1,1,2f40495e32e09da2e64ba27ddfa196f47244e2685c7b62bab3d78f1fd2b240f8,2025-04-22T03:15:21.177000
|
||||
CVE-2025-1732,1,1,217f780632beee8266b8e15000d9d6c361c42c7b0d0e33184c2e6177d5b9b064,2025-04-22T03:15:21.337000
|
||||
CVE-2025-1734,0,0,30fc1fb2735b5f2600cc56424de4c5b2acf076d3cbcb8f2f5e0f5cad4b061c05,2025-04-01T20:26:30.593000
|
||||
CVE-2025-1736,0,0,88a51c283f4d0834bbf11d46dc4103f7cba768043b28133bff6d571f4b16f08b,2025-04-01T20:26:30.593000
|
||||
CVE-2025-1738,0,0,88cd928ab6b3e7b21edc6d43e0b3a3d2962b8b23417ddd8c84224e61394ebbde,2025-02-27T13:15:11.720000
|
||||
@ -288441,7 +288443,7 @@ CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fd
|
||||
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
|
||||
CVE-2025-2987,1,1,7a6947d9cf28f34f85c723a7212ef3dab3685a0221f1d2ad5adcc3fe6f90da63,2025-04-22T00:15:13.747000
|
||||
CVE-2025-2987,0,0,7a6947d9cf28f34f85c723a7212ef3dab3685a0221f1d2ad5adcc3fe6f90da63,2025-04-22T00:15:13.747000
|
||||
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
|
||||
CVE-2025-2989,0,0,0766747cb0e01c92c737981bb238f9adb3ab95fb53aa49cc63ece17dfe385650,2025-04-07T14:15:04.880000
|
||||
CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000
|
||||
@ -288702,7 +288704,7 @@ CVE-2025-3038,0,0,7234e6f6a94363915d71af8eaa721ba5266f9fea3f40b45b2439e5206630fa
|
||||
CVE-2025-3039,0,0,846a42b19421afceedab84a2e86fa6d7400b7dcea08d5d7721ac60a629dd9b39,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3040,0,0,a1e6fbe8160fa81005d502057842330cb2ae7690c502ccb75ab1e381046694f9,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000
|
||||
CVE-2025-30406,0,1,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b94709d,2025-04-22T01:00:01.653000
|
||||
CVE-2025-30406,0,0,51db6be098d64837005d45fe4610c9b1d0c7620f15fc2620b87328ad3b94709d,2025-04-22T01:00:01.653000
|
||||
CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000
|
||||
CVE-2025-3041,0,0,d5b21b6b78f2a401c9e8e108885b1916a2f3aafca95b7fffa55c4525e86b27e1,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3042,0,0,670ae0eb437b93f09d8021319b85476af0f31022941a26149d0aeb898aac3fc2,2025-04-01T20:26:11.547000
|
||||
@ -290693,6 +290695,7 @@ CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae5
|
||||
CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3576,0,0,fcfdd1e678fdad628e7417f5b3843fb736313985ccb3419de0d7118ddd040472,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3577,1,1,09785f673afbf3e63833e0fb9935fb61d41b58f6b4fcc2199cc9778b18043fc7,2025-04-22T03:15:21.637000
|
||||
CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3585,0,0,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000
|
||||
@ -290824,11 +290827,11 @@ CVE-2025-3845,0,0,7b7a76e07ff212126c7183642251a09134e6a925524b02b7668ff89f8b133c
|
||||
CVE-2025-3846,0,0,691cf979796425587ae8b252fcf2c0420010db88cd30aa600bdf74688c1aa482,2025-04-21T23:15:14.397000
|
||||
CVE-2025-3847,0,0,b94d0ad63e1b8960bfabba95c842ba5fb8b1ca794cbc80eb78adfa492c5eb421,2025-04-21T23:15:15.383000
|
||||
CVE-2025-38479,0,0,a2b90799a09f2b7e52ed1787c3494708d7e13fc4455320246b953d2a3bbf149e,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3849,1,1,fb8ce419acb179781e70c07aaf215942360199b9e1fecb61115d3e91f2673644,2025-04-22T00:15:13.917000
|
||||
CVE-2025-3850,1,1,9692f89e0f9d5453a794cae2ca1ca81024f067084881ee7bf926b92a8b7fa651,2025-04-22T01:15:18.227000
|
||||
CVE-2025-3854,1,1,c45b9eab6891260e60b5d472ee89d46e0f2b399e0e2a0cfa425a1ca68ca5c124,2025-04-22T01:15:18.397000
|
||||
CVE-2025-3855,1,1,0c1017d5ee7638cff7eee4bade9c587f1f75d0c864bd28e6d1ce7389de870412,2025-04-22T01:15:18.570000
|
||||
CVE-2025-3856,1,1,1363b7b9ebd2c70ad798e965f136214355264b0161e261b750c13e14fbbcd0b2,2025-04-22T01:15:18.737000
|
||||
CVE-2025-3849,0,0,fb8ce419acb179781e70c07aaf215942360199b9e1fecb61115d3e91f2673644,2025-04-22T00:15:13.917000
|
||||
CVE-2025-3850,0,0,9692f89e0f9d5453a794cae2ca1ca81024f067084881ee7bf926b92a8b7fa651,2025-04-22T01:15:18.227000
|
||||
CVE-2025-3854,0,0,c45b9eab6891260e60b5d472ee89d46e0f2b399e0e2a0cfa425a1ca68ca5c124,2025-04-22T01:15:18.397000
|
||||
CVE-2025-3855,0,0,0c1017d5ee7638cff7eee4bade9c587f1f75d0c864bd28e6d1ce7389de870412,2025-04-22T01:15:18.570000
|
||||
CVE-2025-3856,0,0,1363b7b9ebd2c70ad798e965f136214355264b0161e261b750c13e14fbbcd0b2,2025-04-22T01:15:18.737000
|
||||
CVE-2025-3857,0,0,51449bd38475a3b17060ab26660c1388ea275f57bf7d679c955fccd3040afb55,2025-04-21T16:15:54.907000
|
||||
CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user