mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-21T20:00:20.002873+00:00
This commit is contained in:
parent
73c253644e
commit
4b00ac3fd7
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:15.860",
|
||||
"lastModified": "2024-11-21T06:13:50.583",
|
||||
"lastModified": "2025-04-21T19:15:16.303",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:15.913",
|
||||
"lastModified": "2024-11-21T06:13:50.730",
|
||||
"lastModified": "2025-04-21T19:15:16.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:15.967",
|
||||
"lastModified": "2024-11-21T06:19:30.820",
|
||||
"lastModified": "2025-04-21T19:15:16.643",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39427",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:16.017",
|
||||
"lastModified": "2024-11-21T06:19:31.007",
|
||||
"lastModified": "2025-04-21T19:15:16.803",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:16.073",
|
||||
"lastModified": "2024-11-21T06:19:31.187",
|
||||
"lastModified": "2025-04-21T19:15:16.963",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2021-47668",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-17T18:15:43.623",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:41:27.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_restart: fix use after free bug\n\nAfter calling netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is accessed\nafter the netif_rx_ni() in:\n stats->rx_bytes += cf->len;\n\nReordering the lines solves the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: dev: can_restart: fix use after free bug. Tras llamar a netif_rx_ni(skb), desreferenciar skb no es seguro. En particular, se accede al cf can_frame, que crea un alias de memoria skb, despu\u00e9s de netif_rx_ni() en: stats->rx_bytes += cf->len;. Reordenar las l\u00edneas soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,34 +51,129 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.31",
|
||||
"versionEndExcluding": "4.4.254",
|
||||
"matchCriteriaId": "B3F43128-3AF7-45BD-8292-35295A09235B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.254",
|
||||
"matchCriteriaId": "828B5BA1-E6D5-4D92-A2FD-7186908DE07C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.218",
|
||||
"matchCriteriaId": "31F3AA41-450C-45A7-A1D3-FB2D8C212890"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.171",
|
||||
"matchCriteriaId": "E048F4A6-F5E6-41BF-BCD6-49274CA46915"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.93",
|
||||
"matchCriteriaId": "3F19E9ED-75CE-4576-98F5-2746C9189696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.11",
|
||||
"matchCriteriaId": "B62A8CB5-77B4-40A9-8B60-AF691EC1FB99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18B1C9CE-F7E4-426B-A770-79F86AB5CC38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A70E596-2EF7-4651-B2EF-2CEE31DB6893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18C82C96-2853-4DFE-93AD-F6E59B4129CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A330B043-47EA-4D06-82BF-153A1735FC11"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03f16c5075b22c8902d2af739969e878b0879c94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/08ab951787098ae0b6c0364aeea7a8138226f234",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/260925a0b7d2da5449f8ecfd02c1405e0c8a45b8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/593c072b7b3c4d7044416eb039d9ad706bedd67a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/92668d28c7e6a7a2ba07df287669ffcdf650c421",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ac48ef15826e83f4206c47add61072e8fc76d328",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bbc6847b9b8978b520f62fbc7c68c54ef0f8d282",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2021-47669",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-17T18:15:43.730",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:41:22.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: vxcan: vxcan_xmit: fix use after free bug\n\nAfter calling netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the canfd_frame cfd which aliases skb memory is accessed\nafter the netif_rx_ni()."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: vxcan: vxcan_xmit: correcci\u00f3n del error \"use after free\". Tras llamar a netif_rx_ni(skb), desreferenciar skb no es seguro. En particular, se accede al cfd canfd_frame, que crea un alias de memoria skb, despu\u00e9s de netif_rx_ni()."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,26 +51,101 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.12",
|
||||
"versionEndExcluding": "4.14.218",
|
||||
"matchCriteriaId": "D55AC4D7-E3A8-42B4-AD78-C7E85336E00A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.171",
|
||||
"matchCriteriaId": "E048F4A6-F5E6-41BF-BCD6-49274CA46915"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.93",
|
||||
"matchCriteriaId": "3F19E9ED-75CE-4576-98F5-2746C9189696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.11",
|
||||
"matchCriteriaId": "B62A8CB5-77B4-40A9-8B60-AF691EC1FB99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18B1C9CE-F7E4-426B-A770-79F86AB5CC38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A70E596-2EF7-4651-B2EF-2CEE31DB6893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18C82C96-2853-4DFE-93AD-F6E59B4129CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A330B043-47EA-4D06-82BF-153A1735FC11"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75854cad5d80976f6ea0f0431f8cedd3bcc475cb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b820875a32a3443d67bfd368e93038354e98052",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a24476b37167816e6352ca1a2cf3769847774f70",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e771a874076115df8bff27d325edfd2340e4ec69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2021-47670",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-17T18:15:43.833",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:41:16.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_usb: fix use after free bugs\n\nAfter calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is accessed\nafter the peak_usb_netif_rx_ni().\n\nReordering the lines solves the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: peak_usb: correcci\u00f3n de errores de use after free. Tras llamar a peak_usb_netif_rx_ni(skb), desreferenciar skb no es seguro. En particular, se accede al cf can_frame, que crea un alias de memoria skb, despu\u00e9s de peak_usb_netif_rx_ni(). Reordenar las l\u00edneas soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndExcluding": "4.19.171",
|
||||
"matchCriteriaId": "D3C55539-9CAA-416E-913C-68BEF9E80C35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.93",
|
||||
"matchCriteriaId": "3F19E9ED-75CE-4576-98F5-2746C9189696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.11",
|
||||
"matchCriteriaId": "B62A8CB5-77B4-40A9-8B60-AF691EC1FB99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18B1C9CE-F7E4-426B-A770-79F86AB5CC38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A70E596-2EF7-4651-B2EF-2CEE31DB6893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18C82C96-2853-4DFE-93AD-F6E59B4129CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A330B043-47EA-4D06-82BF-153A1735FC11"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50aca891d7a554db0901b245167cd653d73aaa71",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ddd1416f44130377798c1430b76503513b7497c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec939c13c3fff2114479769c8380b7f1a54feca9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2021-47671",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-17T18:15:43.933",
|
||||
"lastModified": "2025-04-17T20:21:05.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:40:48.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path\n\nIn es58x_rx_err_msg(), if can->do_set_mode() fails, the function\ndirectly returns without calling netif_rx(skb). This means that the\nskb previously allocated by alloc_can_err_skb() is not freed. In other\nterms, this is a memory leak.\n\nThis patch simply removes the return statement in the error branch and\nlet the function continue.\n\nIssue was found with GCC -fanalyzer, please follow the link below for\ndetails."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: etas_es58x: es58x_rx_err_msg(): corrige p\u00e9rdida de memoria en la ruta de error. En es58x_rx_err_msg(), si can->do_set_mode() falla, la funci\u00f3n retorna directamente sin llamar a netif_rx(skb). Esto significa que el skb previamente asignado por alloc_can_err_skb() no se libera. En otras palabras, se trata de una p\u00e9rdida de memoria. Este parche simplemente elimina la instrucci\u00f3n de retorno en la rama de error y permite que la funci\u00f3n contin\u00fae. Se encontr\u00f3 un problema con GCC -fanalyzer; siga el enlace a continuaci\u00f3n para obtener m\u00e1s informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,18 +51,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.13",
|
||||
"versionEndExcluding": "5.14.19",
|
||||
"matchCriteriaId": "D23D4C9E-D61A-4C7A-8EB4-2351743A8350"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.3",
|
||||
"matchCriteriaId": "83F73FEF-14B1-40D4-9A9D-2FCF409F26AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f389e1276a5389c92cef860c9fde8e1c802a871",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7eb0881aec26099089f12ae850aebd93190b1dfe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d9447f768bc8c60623e4bb3ce65b8f4654d33a50",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32833",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-12-15T19:15:17.777",
|
||||
"lastModified": "2024-11-21T07:07:03.040",
|
||||
"lastModified": "2025-04-21T19:15:17.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32860",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-12-15T19:15:17.863",
|
||||
"lastModified": "2024-11-21T07:07:06.693",
|
||||
"lastModified": "2025-04-21T19:15:17.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-32916",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-12-15T19:15:17.950",
|
||||
"lastModified": "2024-11-21T07:07:13.857",
|
||||
"lastModified": "2025-04-21T19:15:17.537",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40004",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T23:15:10.337",
|
||||
"lastModified": "2024-11-21T07:20:43.090",
|
||||
"lastModified": "2025-04-21T18:15:17.107",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42830",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-11-01T20:15:24.510",
|
||||
"lastModified": "2024-11-21T07:25:25.977",
|
||||
"lastModified": "2025-04-21T18:15:18.270",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46996",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T15:15:10.777",
|
||||
"lastModified": "2024-11-21T07:31:22.417",
|
||||
"lastModified": "2025-04-21T19:15:17.693",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-912"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46997",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T15:15:10.837",
|
||||
"lastModified": "2024-11-21T07:31:22.603",
|
||||
"lastModified": "2025-04-21T19:15:17.860",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-912"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47406",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:13.710",
|
||||
"lastModified": "2024-11-21T07:31:53.790",
|
||||
"lastModified": "2025-04-21T19:15:18.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:13.987",
|
||||
"lastModified": "2024-11-21T07:31:53.930",
|
||||
"lastModified": "2025-04-21T19:15:18.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:14.247",
|
||||
"lastModified": "2024-11-21T07:31:54.070",
|
||||
"lastModified": "2025-04-21T19:15:18.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47409",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:14.393",
|
||||
"lastModified": "2024-11-21T07:31:54.210",
|
||||
"lastModified": "2025-04-21T19:15:18.443",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:14.540",
|
||||
"lastModified": "2024-11-21T07:31:54.370",
|
||||
"lastModified": "2025-04-21T19:15:18.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-14T21:15:14.753",
|
||||
"lastModified": "2024-11-21T07:31:54.523",
|
||||
"lastModified": "2025-04-21T19:15:18.707",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
25
CVE-2024/CVE-2024-573xx/CVE-2024-57394.json
Normal file
25
CVE-2024/CVE-2024-573xx/CVE-2024-57394.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-21T18:15:18.457",
|
||||
"lastModified": "2025-04-21T18:15:18.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The quarantine - restore function in Qi-ANXIN Tianqing Endpoint Security Management System v10.0 allows user to restore a malicious file to an arbitrary file path. Attackers can write malicious DLL to system path and perform privilege escalation by leveraging Windows DLL hijacking vulnerabilities."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.qianxin.com/product/detail/165",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cwjchoi01/CVE-2024-57394",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21582",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:53.687",
|
||||
"lastModified": "2025-04-16T21:15:46.527",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:46:45.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:crm_technical_foundation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "09FCBA79-74C7-4284-B6BF-BF220054FE29"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21584",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:53.910",
|
||||
"lastModified": "2025-04-16T20:15:16.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:47:14.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21585",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:54.037",
|
||||
"lastModified": "2025-04-16T20:15:17.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:46:58.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22927",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T13:15:42.773",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-21T19:15:18.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en OS4ED openSIS v8.0 a v9.1 permite a los atacantes ejecutar un directory traversal enviando una solicitud POST manipulada a /Modules.php?modname=messaging/Inbox.php&modfunc=save&filename."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OS4ED/openSIS-Classic",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22928",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T13:15:42.883",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-21T19:15:19.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que OS4ED openSIS v7.0 a v9.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro cp_id en /modules/messages/Inbox.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OS4ED/openSIS-Classic",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22929",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T14:15:29.467",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-21T19:15:19.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que OS4ED openSIS v7.0 a v9.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro filter_id en /students/StudentFilters.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OS4ED/openSIS-Classic",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22930",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T14:15:29.650",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-21T19:15:19.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que OS4ED openSIS v7.0 a v9.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro groupid en /messaging/Group.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OS4ED/openSIS-Classic",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22931",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T14:15:29.823",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-21T19:15:19.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una referencia de objeto directo (IDOR) insegura en el componente /assets/stafffiles de OS4ED openSIS v7.0 a v9.1 permite que atacantes no autenticados accedan a archivos cargados por miembros del personal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OS4ED/openSIS-Classic",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24446",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:20.417",
|
||||
"lastModified": "2025-04-18T18:15:43.913",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:40:25.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24447",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:20.573",
|
||||
"lastModified": "2025-04-18T18:15:44.503",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:39:51.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-25234",
|
||||
"sourceIdentifier": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||
"published": "2025-04-17T15:15:54.120",
|
||||
"lastModified": "2025-04-17T20:21:48.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:35:58.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Omnissa UAG contains a Cross-Origin Resource Sharing (CORS) bypass vulnerability.\u00a0A malicious actor with network access to UAG may be able to bypass administrator-configured CORS restrictions to gain access to sensitive networks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Omnissa UAG contiene una vulnerabilidad de Cross-Origin Resource Sharing (CORS) bypass. Un atacante con acceso a la red de UAG podr\u00eda eludir las restricciones de CORS configuradas por el administrador para acceder a redes sensibles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -47,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:omnissa:unified_access_gateway:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2503",
|
||||
"matchCriteriaId": "CD61CDB8-AA9D-42CE-A650-81C83D48067F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://static.omnissa.com/sites/default/files/OMSA-2025-0002.pdf",
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.omnissa.com/omnissa-security-response/",
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52"
|
||||
"source": "de5a6978-88fe-4c27-a7df-d0d5b52d5b52",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-270xx/CVE-2025-27086.json
Normal file
21
CVE-2025/CVE-2025-270xx/CVE-2025-27086.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-27086",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-04-21T18:15:21.113",
|
||||
"lastModified": "2025-04-21T19:15:19.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the HPE Performance Cluster Manager (HPCM) GUI could allow an attacker to bypass authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04842en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-21T17:15:23.710",
|
||||
"lastModified": "2025-04-21T17:15:23.710",
|
||||
"lastModified": "2025-04-21T18:15:22.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (XSS) vulnerability in flaskBlog v2.6.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the postContent parameter at /createpost."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/coleak2021/edbd6e0766227ee96a7a4601e50773eb",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/DogukanUrker/flaskBlog/issues/130",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DogukanUrker/flaskBlog/issues/130",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-281xx/CVE-2025-28103.json
Normal file
25
CVE-2025/CVE-2025-281xx/CVE-2025-28103.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-28103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-21T18:15:22.353",
|
||||
"lastModified": "2025-04-21T18:15:22.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in laskBlog v2.6.1 allows attackers to arbitrarily delete user accounts via a crafted request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/coleak2021/77895b7a7b335ae17eb57390f4a94917",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DogukanUrker/flaskBlog/issues/130",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-281xx/CVE-2025-28104.json
Normal file
25
CVE-2025/CVE-2025-281xx/CVE-2025-28104.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-28104",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-21T18:15:22.520",
|
||||
"lastModified": "2025-04-21T18:15:22.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in laskBlog v2.6.1 allows attackers to access all usernames via a crafted input."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/coleak2021/d5fea0f7d32a2de38130da089f4fb735",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DogukanUrker/flaskBlog/issues/130",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28219",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T14:15:20.253",
|
||||
"lastModified": "2025-03-28T18:11:40.180",
|
||||
"lastModified": "2025-04-21T19:15:19.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Netgear DC112A V1.0.0.64 tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en usb_adv.cgi, que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro \"deviceName\" pasado al binario a trav\u00e9s de una solicitud POST."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DC112A_V1.0.0.64/sub_69600.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28220",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T14:15:20.377",
|
||||
"lastModified": "2025-03-28T18:11:40.180",
|
||||
"lastModified": "2025-04-21T19:15:19.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda W6_S v1.0.0.4_510 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n setcfm, que permite a atacantes remotos provocar el bloqueo del servidor web a trav\u00e9s del par\u00e1metro funcpara1 pasado al binario mediante una solicitud POST."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/setcfm.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28221",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T14:15:20.483",
|
||||
"lastModified": "2025-03-28T18:11:40.180",
|
||||
"lastModified": "2025-04-21T19:15:19.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda W6_S v1.0.0.4_510 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n set_local_time, que permite a atacantes remotos provocar un bloqueo del servidor web a trav\u00e9s del par\u00e1metro time pasado al binario mediante una solicitud POST."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/time.pdf",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29015",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T14:15:27.997",
|
||||
"lastModified": "2025-04-17T20:21:48.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:30:44.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Code Astro Internet Banking System 2.0.0 is vulnerable to Cross Site Scripting (XSS) via the name parameter in /admin/pages_account.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Code Astro Internet Banking System 2.0.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro de nombre en /admin/pages_account.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeastro:internet_banking_system:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27C97746-82F1-4368-AB3F-043BC3B5C506"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/b1tm4r/CVE-2025-29015",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cvedetails.com/vulnerability-list/opxss-1/cross-site-scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.387",
|
||||
"lastModified": "2025-04-18T16:15:20.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:39:38.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en dlink DIR 832x 240802 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del valor de la clave target_addr y la funci\u00f3n 0x41737c"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-832x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A95905C-8E6C-470F-A0DC-F9BE8A4831BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-832x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D215FF9C-55FD-438B-82EE-EF0E8B628444"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/b3bebe4967a3093951273738f0be45ce",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_ping-target_addr-CommandInjection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_ping-target_addr-CommandInjection",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.520",
|
||||
"lastModified": "2025-04-18T16:15:20.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:40:47.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en dlink DIR 832x 240802 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del valor de la clave target_addr y la funci\u00f3n 0x41710c"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:dir-832x_firmware:240802:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A95905C-8E6C-470F-A0DC-F9BE8A4831BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:dir-832x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D215FF9C-55FD-438B-82EE-EF0E8B628444"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/101b7308bdf8618d8be30bd1d09ddd38",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_nslookup-target_addr-CommandInjection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/en/security-bulletin/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Dlink-dir-823x-diag_nslookup-target_addr-CommandInjection",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29044",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.717",
|
||||
"lastModified": "2025-04-18T13:15:57.460",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:42:48.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en Netgear- R61 router V1.0.1.28 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del valor de la clave QUERY_STRING"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netgear:r6100_firmware:1.0.1.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AE887C4-EBED-40E9-816D-BE5B30128D49"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F44A123-B256-428B-98C2-17570F2F32DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T15:15:54.877",
|
||||
"lastModified": "2025-04-18T13:15:57.650",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:47:56.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the newap_text_0 key value"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en ALFA_CAMPRO-co-2.29 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s del valor de clave newap_text_0"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,22 +51,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:alfa:wifi_camppro_firmware:2.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E2A952F-7468-4360-9BD6-E0C73EAB7B4A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:alfa:wifi_camppro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4771E3E-72D4-4E14-BFF9-5CF39FC73788"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/16f6b44ef062374bc32c12952c7b81f8",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-APSecurity-newap_text_0",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/xyqer1/16f6b44ef062374bc32c12952c7b81f8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-APSecurity-newap_text_0",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29453",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T22:15:14.960",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:15:22.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en personal-management-system Personal Management System 1.4.65 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente my-contacts-settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/pgg9q7kdbkggtq08",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T21:15:50.830",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:15:22.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en personal-management-system Personal Management System 1.4.65 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de carga."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/cyql4n0xiubspntl",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T21:15:50.940",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:15:23.093",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en personal-management-system Personal Management System 1.4.65 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n \"Ideas de viaje\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/hfonnxwggi2kfgmw",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29456",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-17T22:15:15.077",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-21T18:15:23.260",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en personal-management-system Personal Management System 1.4.65 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de creaci\u00f3n de notas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/ckogwt5qwnkd821k",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T21:15:47.460",
|
||||
"lastModified": "2025-04-17T20:21:48.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:25:05.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Company Website CMS 1.0 contains a file upload vulnerability via the \"Create Services\" file /dashboard/Services."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SourceCodester Company Website CMS 1.0 contiene una vulnerabilidad de carga de archivos a trav\u00e9s del archivo \"Crear servicios\" /dashboard/Services."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sourcecodester:company_website_cms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBBA9CB2-F01B-4589-82CB-9DFD54196469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/CVE-2025-29708.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29709",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T21:15:47.570",
|
||||
"lastModified": "2025-04-17T20:21:48.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:26:07.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Company Website CMS 1.0 has a File upload vulnerability via the \"Create portfolio\" file /dashboard/portfolio."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SourceCodester Company Website CMS 1.0 tiene una vulnerabilidad de carga de archivos a trav\u00e9s del archivo \"Crear portfolio\" /dashboard/portfolio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sourcecodester:company_website_cms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBBA9CB2-F01B-4589-82CB-9DFD54196469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/CVE-2025-29709.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29710",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T21:15:47.673",
|
||||
"lastModified": "2025-04-18T12:15:15.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T18:29:36.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SourceCodester Company Website CMS 1.0 is vulnerable to Cross Site Scripting (XSS) via /dashboard/Services."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SourceCodester Company Website CMS 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de /dashboard/Services."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sourcecodester:company_website_cms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBBA9CB2-F01B-4589-82CB-9DFD54196469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/CVE-2025-29710.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS3.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30282",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:25.820",
|
||||
"lastModified": "2025-04-18T18:15:49.340",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:39:25.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30284",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:25.980",
|
||||
"lastModified": "2025-04-18T18:15:49.690",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:38:24.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30285",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:26.127",
|
||||
"lastModified": "2025-04-18T18:15:50.150",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:38:08.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30286",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:26.273",
|
||||
"lastModified": "2025-04-18T18:15:50.587",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:38:02.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30287",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:26.430",
|
||||
"lastModified": "2025-04-18T18:15:51.050",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:37:56.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30288",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:26.583",
|
||||
"lastModified": "2025-04-18T18:15:51.563",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:33:41.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30289",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:26.737",
|
||||
"lastModified": "2025-04-18T18:15:52.200",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:33:09.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
@ -39,22 +39,22 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30291",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:27.057",
|
||||
"lastModified": "2025-04-18T18:15:52.673",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:32:52.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -39,22 +39,22 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30293",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:27.363",
|
||||
"lastModified": "2025-04-18T18:15:53.157",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:39:13.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30294",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:27.527",
|
||||
"lastModified": "2025-04-18T19:15:46.087",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-21T18:38:58.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
@ -39,23 +39,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30682",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.347",
|
||||
"lastModified": "2025-04-16T20:15:18.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:47:25.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30683",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.447",
|
||||
"lastModified": "2025-04-16T19:15:54.427",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:47:43.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30684",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.560",
|
||||
"lastModified": "2025-04-16T18:16:05.883",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:47:51.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30685",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.670",
|
||||
"lastModified": "2025-04-16T16:15:32.263",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:33:19.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30686",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.787",
|
||||
"lastModified": "2025-04-16T16:15:32.373",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:37:30.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "19.1.0",
|
||||
"versionEndIncluding": "19.7",
|
||||
"matchCriteriaId": "FA63369F-D9B6-4ABF-B35E-516DB30A344F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30687",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:57.903",
|
||||
"lastModified": "2025-04-16T16:15:32.480",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:38:21.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30688",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:58.013",
|
||||
"lastModified": "2025-04-16T16:15:32.590",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:38:32.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30694",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:58.697",
|
||||
"lastModified": "2025-04-16T20:15:18.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:38:43.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:xml_database:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "19.3",
|
||||
"versionEndIncluding": "19.26",
|
||||
"matchCriteriaId": "3D3C15E3-503E-4FAD-B9C9-07DC5BEED250"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:xml_database:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "21.3",
|
||||
"versionEndIncluding": "21.17",
|
||||
"matchCriteriaId": "B90ED8F2-6080-4EFB-BBCB-D3B02BD549EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:xml_database:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.4",
|
||||
"versionEndIncluding": "23.7",
|
||||
"matchCriteriaId": "C35A2CEB-5BB9-44F2-B1ED-A146B7A4A47A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30695",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:58.810",
|
||||
"lastModified": "2025-04-16T20:15:18.283",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:38:53.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30697",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:59.030",
|
||||
"lastModified": "2025-04-16T20:15:18.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:25:34.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF191D4F-3D54-4525-AAF5-B70D3FD2F818"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18F15FC6-947A-462A-8329-C52907799A7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.62:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF0E4EFC-096B-4861-8D55-D8DAA37A21E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30699",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:59.247",
|
||||
"lastModified": "2025-04-16T20:15:18.507",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:25:44.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30700",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:59.357",
|
||||
"lastModified": "2025-04-16T20:15:18.620",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:26:03.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30701",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:15:59.470",
|
||||
"lastModified": "2025-04-16T15:16:10.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:26:34.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:ras_security:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "19.3",
|
||||
"versionEndIncluding": "19.26",
|
||||
"matchCriteriaId": "BE31B0DA-D01F-40FD-B2E7-F9BEE249AC83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:ras_security:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "21.3",
|
||||
"versionEndIncluding": "21.17",
|
||||
"matchCriteriaId": "28751D7F-1D7F-4CC7-9CAC-9B1438F238AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:ras_security:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.4",
|
||||
"versionEndIncluding": "23.7",
|
||||
"matchCriteriaId": "5F56F4F7-E5C7-41E8-BB25-541F2C7058BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30706",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:00.043",
|
||||
"lastModified": "2025-04-19T01:15:44.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:27:55.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "D2A6A10E-39E1-4471-92CD-495AD72BCA09"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250418-0007/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30707",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:00.163",
|
||||
"lastModified": "2025-04-16T20:15:18.743",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:28:08.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:istore:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "EE111491-D24E-435E-9DF9-467450A7C183"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30715",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:01.080",
|
||||
"lastModified": "2025-04-16T14:15:25.150",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:54:56.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.41",
|
||||
"matchCriteriaId": "BC7FEA08-A23D-4037-BBDB-C7FC6B533D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.4.0",
|
||||
"versionEndIncluding": "8.4.4",
|
||||
"matchCriteriaId": "3787EB95-8CCD-4905-B247-DC09A0D30899"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndIncluding": "9.2.0",
|
||||
"matchCriteriaId": "B0FBFCEC-D8B3-4364-9594-BF11D7A8322C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30716",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:01.193",
|
||||
"lastModified": "2025-04-16T14:15:25.270",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:55:07.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:common_applications:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "0A728EDA-EBBF-4480-951E-0B0A10D049D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30724",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:02.103",
|
||||
"lastModified": "2025-04-16T16:15:33.977",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:55:24.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,36 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB270CE9-4B22-4AF9-9CF6-92B078B644EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "274A0CF5-41E8-42E0-9931-F7372A65B9C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30725",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:02.217",
|
||||
"lastModified": "2025-04-16T16:15:34.090",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:55:50.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:7.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DB515F-F899-4637-BB15-A01765D3E9B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30726",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:02.327",
|
||||
"lastModified": "2025-04-16T16:15:34.193",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:56:07.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:application_object_library:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "3BDE5266-B565-424E-80CC-349EE6DB6DE7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30728",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:02.563",
|
||||
"lastModified": "2025-04-16T14:15:25.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:56:38.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:configurator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "5CC0EA09-3974-4A14-8724-27020AECB5A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30731",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:02.907",
|
||||
"lastModified": "2025-04-16T15:16:10.727",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:15:56.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:applications_technology_stack:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "065E9448-D16E-4A8E-999A-DF8D0C3B516B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30732",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:03.013",
|
||||
"lastModified": "2025-04-16T15:16:10.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:16:08.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:application_object_library:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.3",
|
||||
"versionEndIncluding": "12.2.14",
|
||||
"matchCriteriaId": "3BDE5266-B565-424E-80CC-349EE6DB6DE7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30733",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:03.133",
|
||||
"lastModified": "2025-04-16T15:16:10.940",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:16:19.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "19.3",
|
||||
"versionEndIncluding": "19.26",
|
||||
"matchCriteriaId": "E362AD7D-FB82-4DE9-90B2-74399D673C38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "21.3",
|
||||
"versionEndIncluding": "21.17",
|
||||
"matchCriteriaId": "684B945B-072A-4413-8D1B-2D8A10B2FB83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:rdbms_listener:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.4",
|
||||
"versionEndIncluding": "23.7",
|
||||
"matchCriteriaId": "2CD6F3E1-172D-4F6C-9BD3-4FD616E629ED"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30735",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:03.247",
|
||||
"lastModified": "2025-04-16T15:16:11.060",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:16:40.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cc_common_application_objects:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00225E21-0942-4006-9AEE-0B1EEDB98199"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30736",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:03.360",
|
||||
"lastModified": "2025-04-16T15:16:11.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:16:54.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "19.3",
|
||||
"versionEndIncluding": "19.26",
|
||||
"matchCriteriaId": "B32F5B2A-9EE1-43D9-91B4-BE968BD8FB4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "21.3",
|
||||
"versionEndIncluding": "21.17",
|
||||
"matchCriteriaId": "FED127C9-9735-4EE7-897C-53306843CEA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:java_virtual_machine:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.4",
|
||||
"versionEndIncluding": "23.7",
|
||||
"matchCriteriaId": "28CC0119-88F7-47E8-9068-2A7DA0312EF3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30740",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-04-15T21:16:03.597",
|
||||
"lastModified": "2025-04-16T15:16:11.343",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-21T19:17:51.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2.0.0",
|
||||
"versionEndIncluding": "9.2.9.2",
|
||||
"matchCriteriaId": "83A6C64E-C1C1-41BA-ABFD-40F750378B3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-32102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-15T13:15:54.783",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"lastModified": "2025-04-21T18:15:23.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.crushftp.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Apr/17",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-21T18:00:20.170718+00:00
|
||||
2025-04-21T20:00:20.002873+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-21T17:33:07.750000+00:00
|
||||
2025-04-21T19:56:38.777000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
290992
|
||||
290996
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-12543](CVE-2024/CVE-2024-125xx/CVE-2024-12543.json) (`2025-04-21T16:15:53.777`)
|
||||
- [CVE-2025-23174](CVE-2025/CVE-2025-231xx/CVE-2025-23174.json) (`2025-04-21T17:15:23.270`)
|
||||
- [CVE-2025-28099](CVE-2025/CVE-2025-280xx/CVE-2025-28099.json) (`2025-04-21T17:15:23.550`)
|
||||
- [CVE-2025-28102](CVE-2025/CVE-2025-281xx/CVE-2025-28102.json) (`2025-04-21T17:15:23.710`)
|
||||
- [CVE-2025-28367](CVE-2025/CVE-2025-283xx/CVE-2025-28367.json) (`2025-04-21T16:15:54.373`)
|
||||
- [CVE-2025-29446](CVE-2025/CVE-2025-294xx/CVE-2025-29446.json) (`2025-04-21T17:15:23.883`)
|
||||
- [CVE-2025-32431](CVE-2025/CVE-2025-324xx/CVE-2025-32431.json) (`2025-04-21T16:15:54.610`)
|
||||
- [CVE-2025-32793](CVE-2025/CVE-2025-327xx/CVE-2025-32793.json) (`2025-04-21T16:15:54.753`)
|
||||
- [CVE-2025-3857](CVE-2025/CVE-2025-38xx/CVE-2025-3857.json) (`2025-04-21T16:15:54.907`)
|
||||
- [CVE-2025-43922](CVE-2025/CVE-2025-439xx/CVE-2025-43922.json) (`2025-04-21T16:15:55.250`)
|
||||
- [CVE-2024-57394](CVE-2024/CVE-2024-573xx/CVE-2024-57394.json) (`2025-04-21T18:15:18.457`)
|
||||
- [CVE-2025-27086](CVE-2025/CVE-2025-270xx/CVE-2025-27086.json) (`2025-04-21T18:15:21.113`)
|
||||
- [CVE-2025-28103](CVE-2025/CVE-2025-281xx/CVE-2025-28103.json) (`2025-04-21T18:15:22.353`)
|
||||
- [CVE-2025-28104](CVE-2025/CVE-2025-281xx/CVE-2025-28104.json) (`2025-04-21T18:15:22.520`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `54`
|
||||
Recently modified CVEs: `87`
|
||||
|
||||
- [CVE-2024-20151](CVE-2024/CVE-2024-201xx/CVE-2024-20151.json) (`2025-04-21T17:13:45.390`)
|
||||
- [CVE-2024-20152](CVE-2024/CVE-2024-201xx/CVE-2024-20152.json) (`2025-04-21T17:12:10.883`)
|
||||
- [CVE-2024-35241](CVE-2024/CVE-2024-352xx/CVE-2024-35241.json) (`2025-04-21T16:15:54.053`)
|
||||
- [CVE-2024-42195](CVE-2024/CVE-2024-421xx/CVE-2024-42195.json) (`2025-04-21T16:50:52.820`)
|
||||
- [CVE-2024-42699](CVE-2024/CVE-2024-426xx/CVE-2024-42699.json) (`2025-04-21T16:15:54.203`)
|
||||
- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-04-21T17:00:09.550`)
|
||||
- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-04-21T16:59:38.920`)
|
||||
- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-04-21T16:59:07.287`)
|
||||
- [CVE-2024-52724](CVE-2024/CVE-2024-527xx/CVE-2024-52724.json) (`2025-04-21T16:51:44.970`)
|
||||
- [CVE-2024-54774](CVE-2024/CVE-2024-547xx/CVE-2024-54774.json) (`2025-04-21T17:00:56.877`)
|
||||
- [CVE-2024-55341](CVE-2024/CVE-2024-553xx/CVE-2024-55341.json) (`2025-04-21T17:02:56.393`)
|
||||
- [CVE-2024-56365](CVE-2024/CVE-2024-563xx/CVE-2024-56365.json) (`2025-04-21T16:57:39.707`)
|
||||
- [CVE-2024-56366](CVE-2024/CVE-2024-563xx/CVE-2024-56366.json) (`2025-04-21T16:57:02.417`)
|
||||
- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-04-21T16:58:23.370`)
|
||||
- [CVE-2024-56409](CVE-2024/CVE-2024-564xx/CVE-2024-56409.json) (`2025-04-21T17:14:40.833`)
|
||||
- [CVE-2024-56431](CVE-2024/CVE-2024-564xx/CVE-2024-56431.json) (`2025-04-21T16:53:13.917`)
|
||||
- [CVE-2024-56828](CVE-2024/CVE-2024-568xx/CVE-2024-56828.json) (`2025-04-21T17:10:54.567`)
|
||||
- [CVE-2024-57760](CVE-2024/CVE-2024-577xx/CVE-2024-57760.json) (`2025-04-21T17:32:32.837`)
|
||||
- [CVE-2025-0434](CVE-2025/CVE-2025-04xx/CVE-2025-0434.json) (`2025-04-21T17:30:52.300`)
|
||||
- [CVE-2025-0435](CVE-2025/CVE-2025-04xx/CVE-2025-0435.json) (`2025-04-21T17:30:01.157`)
|
||||
- [CVE-2025-0436](CVE-2025/CVE-2025-04xx/CVE-2025-0436.json) (`2025-04-21T17:33:07.750`)
|
||||
- [CVE-2025-22983](CVE-2025/CVE-2025-229xx/CVE-2025-22983.json) (`2025-04-21T17:05:08.097`)
|
||||
- [CVE-2025-32408](CVE-2025/CVE-2025-324xx/CVE-2025-32408.json) (`2025-04-21T17:15:24.117`)
|
||||
- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-04-21T17:15:24.330`)
|
||||
- [CVE-2025-43920](CVE-2025/CVE-2025-439xx/CVE-2025-43920.json) (`2025-04-21T16:15:55.137`)
|
||||
- [CVE-2025-30685](CVE-2025/CVE-2025-306xx/CVE-2025-30685.json) (`2025-04-21T19:33:19.260`)
|
||||
- [CVE-2025-30686](CVE-2025/CVE-2025-306xx/CVE-2025-30686.json) (`2025-04-21T19:37:30.357`)
|
||||
- [CVE-2025-30687](CVE-2025/CVE-2025-306xx/CVE-2025-30687.json) (`2025-04-21T19:38:21.510`)
|
||||
- [CVE-2025-30688](CVE-2025/CVE-2025-306xx/CVE-2025-30688.json) (`2025-04-21T19:38:32.510`)
|
||||
- [CVE-2025-30694](CVE-2025/CVE-2025-306xx/CVE-2025-30694.json) (`2025-04-21T19:38:43.103`)
|
||||
- [CVE-2025-30695](CVE-2025/CVE-2025-306xx/CVE-2025-30695.json) (`2025-04-21T19:38:53.270`)
|
||||
- [CVE-2025-30697](CVE-2025/CVE-2025-306xx/CVE-2025-30697.json) (`2025-04-21T19:25:34.773`)
|
||||
- [CVE-2025-30699](CVE-2025/CVE-2025-306xx/CVE-2025-30699.json) (`2025-04-21T19:25:44.283`)
|
||||
- [CVE-2025-30700](CVE-2025/CVE-2025-307xx/CVE-2025-30700.json) (`2025-04-21T19:26:03.440`)
|
||||
- [CVE-2025-30701](CVE-2025/CVE-2025-307xx/CVE-2025-30701.json) (`2025-04-21T19:26:34.843`)
|
||||
- [CVE-2025-30706](CVE-2025/CVE-2025-307xx/CVE-2025-30706.json) (`2025-04-21T19:27:55.310`)
|
||||
- [CVE-2025-30707](CVE-2025/CVE-2025-307xx/CVE-2025-30707.json) (`2025-04-21T19:28:08.797`)
|
||||
- [CVE-2025-30715](CVE-2025/CVE-2025-307xx/CVE-2025-30715.json) (`2025-04-21T19:54:56.163`)
|
||||
- [CVE-2025-30716](CVE-2025/CVE-2025-307xx/CVE-2025-30716.json) (`2025-04-21T19:55:07.253`)
|
||||
- [CVE-2025-30724](CVE-2025/CVE-2025-307xx/CVE-2025-30724.json) (`2025-04-21T19:55:24.077`)
|
||||
- [CVE-2025-30725](CVE-2025/CVE-2025-307xx/CVE-2025-30725.json) (`2025-04-21T19:55:50.000`)
|
||||
- [CVE-2025-30726](CVE-2025/CVE-2025-307xx/CVE-2025-30726.json) (`2025-04-21T19:56:07.200`)
|
||||
- [CVE-2025-30728](CVE-2025/CVE-2025-307xx/CVE-2025-30728.json) (`2025-04-21T19:56:38.777`)
|
||||
- [CVE-2025-30731](CVE-2025/CVE-2025-307xx/CVE-2025-30731.json) (`2025-04-21T19:15:56.913`)
|
||||
- [CVE-2025-30732](CVE-2025/CVE-2025-307xx/CVE-2025-30732.json) (`2025-04-21T19:16:08.687`)
|
||||
- [CVE-2025-30733](CVE-2025/CVE-2025-307xx/CVE-2025-30733.json) (`2025-04-21T19:16:19.500`)
|
||||
- [CVE-2025-30735](CVE-2025/CVE-2025-307xx/CVE-2025-30735.json) (`2025-04-21T19:16:40.527`)
|
||||
- [CVE-2025-30736](CVE-2025/CVE-2025-307xx/CVE-2025-30736.json) (`2025-04-21T19:16:54.987`)
|
||||
- [CVE-2025-30740](CVE-2025/CVE-2025-307xx/CVE-2025-30740.json) (`2025-04-21T19:17:51.487`)
|
||||
- [CVE-2025-32102](CVE-2025/CVE-2025-321xx/CVE-2025-32102.json) (`2025-04-21T18:15:23.430`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
304
_state.csv
304
_state.csv
@ -179545,8 +179545,8 @@ CVE-2021-36568,0,0,a952ccdec770fdc83b079c16d6d470df969509480e88398c84522b58a3ddf
|
||||
CVE-2021-36569,0,0,72999071b6fb2141ff09fda65fb8be5d9342a639c5163f4e02ffbd2dad0c7104,2025-03-26T17:15:22.617000
|
||||
CVE-2021-3657,0,0,abbd1af5936642fe3d787664d7fe523d58aa8da730097bba26cf4e63f9c977e5,2024-11-21T06:22:05.373000
|
||||
CVE-2021-36570,0,0,b0541187470b0b6ea0ef6739cf659ced1866cddb7a53eca933b32e08b457b105,2025-03-26T17:15:22.847000
|
||||
CVE-2021-36572,0,0,93eb86e94e0149b6889e4d0c2a948468c4bfcceebb6a34380eccff071777865d,2024-11-21T06:13:50.583000
|
||||
CVE-2021-36573,0,0,0c106fba4c4cf62b7ec259b29da13f99a72c37c679ab3b0dbcb8e613effd98ee,2024-11-21T06:13:50.730000
|
||||
CVE-2021-36572,0,1,33370b8debfbe035432f30bdbc03e5bf61e4be2ff86d8159c231decde25ee56d,2025-04-21T19:15:16.303000
|
||||
CVE-2021-36573,0,1,57fb9a6aabed226160db12684566c039a9bda0a1d0f416db34045805c341abdc,2025-04-21T19:15:16.490000
|
||||
CVE-2021-3658,0,0,4d2cf8e025253422f575b6b9984ccea8c20783efe494852d04fb24019ba14467,2024-11-21T06:22:05.527000
|
||||
CVE-2021-36580,0,0,07f7b2375958048607f8798a5bb2579af4555cc4c16ad17a47b0dd318528f688,2024-11-21T06:13:50.873000
|
||||
CVE-2021-36581,0,0,b9843e514e0ec56c74b38b612a1e385784bd7c53175824e2f39c521615618dca,2024-11-21T06:13:51.047000
|
||||
@ -181805,9 +181805,9 @@ CVE-2021-3942,0,0,b586dc3f38ed3f44a4ba39657666298524f48ed824e3bac6cb5e455ba80c18
|
||||
CVE-2021-39420,0,0,ca5fe4bcdd6c80d0651fb79a0db334f344478d3997b2b4d70ef9b061c5f3c7e0,2024-11-21T06:19:30.260000
|
||||
CVE-2021-39421,0,0,0dfef81b16f8d9eee53f03efe795cacf269f83511628741de0a0289c801ca7c5,2024-11-21T06:19:30.450000
|
||||
CVE-2021-39425,0,0,0b7dd99e118f32040fea3978e1ed88008f9891d913085a878f38a17971229546,2024-11-21T06:19:30.637000
|
||||
CVE-2021-39426,0,0,f8bea1698b5191f0517e06bac0cf1032e8896ee67c5f60073f819f0a400106e5,2024-11-21T06:19:30.820000
|
||||
CVE-2021-39427,0,0,eb584129a3f5c3f9172a54a15a3a96471da6d2c356de674f23e3a4a7bc908544,2024-11-21T06:19:31.007000
|
||||
CVE-2021-39428,0,0,a6e6da62499debc240f0417b6cd9c6d20df102fbcaac1fe3813ad7ef58aa1dd9,2024-11-21T06:19:31.187000
|
||||
CVE-2021-39426,0,1,289f069a38c32da6e7075396e11662187f1e41afa9531aa56126912362f81c9a,2025-04-21T19:15:16.643000
|
||||
CVE-2021-39427,0,1,a2bec99685b8d49b87923f86053aa420b8f2b31ec941f2498fd5e5fb5d40e3f0,2025-04-21T19:15:16.803000
|
||||
CVE-2021-39428,0,1,8d989f170cc04f484e9de62ace3f454351a6b1cd1beb317147d709cfec284ac2,2025-04-21T19:15:16.963000
|
||||
CVE-2021-3943,0,0,e516bd3d9c80ce523f28750c607e1e326db695a0d8316ce5676b4988f3043306,2024-11-21T06:23:12.547000
|
||||
CVE-2021-39432,0,0,e9c93eff1713f50edd4ae55c79c99f63bf7f5277b21736715c26e387ab58c419,2024-11-21T06:19:31.373000
|
||||
CVE-2021-39433,0,0,c9162c1759b251093107bccbdddd4f9e1475c73af0182563bd982fe28fefe4e0,2024-11-21T06:19:31.557000
|
||||
@ -187964,10 +187964,10 @@ CVE-2021-47658,0,0,40cee62fe59cbcad55bfa583a2a783321bfe2aa50e6ba27a98aa5e5272260
|
||||
CVE-2021-47659,0,0,5aa899f756953f035092f7b1fe4153c0d3304e0ff38c8b4cdec0e8f319d19fd3,2025-02-26T06:37:07.640000
|
||||
CVE-2021-47660,0,0,e59321e11599e4443f5093be84e3c1ac718be1209a0746e320294c82fef27666,2025-03-18T18:50:52.930000
|
||||
CVE-2021-47667,0,0,ab7ee7ce106aad31615be0e1d295240a98943ba26d00c5d1a1ab07e7a99ad66f,2025-04-07T17:15:32.873000
|
||||
CVE-2021-47668,0,0,ecdbc871c1e08fb07aa1b8121ef40c743611d1829bf1d53112e3239f4790b141,2025-04-17T20:21:05.203000
|
||||
CVE-2021-47669,0,0,c66715e8c8187e01b2148f025cfb05e8b92111c5e52c7f9350c584f9b358b414,2025-04-17T20:21:05.203000
|
||||
CVE-2021-47670,0,0,754781bd1dbacd34f2e1c87d69e2903d37f60ce03732c21cebdbaef8cae5238e,2025-04-17T20:21:05.203000
|
||||
CVE-2021-47671,0,0,1067423d6aa6dbcdf8337d2db68f48551c00f70259f9eddbc4a0310f6678811b,2025-04-17T20:21:05.203000
|
||||
CVE-2021-47668,0,1,71ad95bb6049d6590adac2b19370d9b39463f424f971fb5ac24ddfb8fceae0e0,2025-04-21T18:41:27.987000
|
||||
CVE-2021-47669,0,1,ae001276e0c286503806b09a6f182e58c1c94e4f23d321d103a9b4b9b9702013,2025-04-21T18:41:22.637000
|
||||
CVE-2021-47670,0,1,fba68a34a6b09e65ce3cbc930cdd33939a22463b16b224179b27ff21b11b4825,2025-04-21T18:41:16.860000
|
||||
CVE-2021-47671,0,1,774d9560d702868ba2705e0672bba40beaf6ffdcbb15493f556974f62893bb89,2025-04-21T18:40:48.773000
|
||||
CVE-2022-0001,0,0,4861ed23367706f73be950406ea7a4bb1674e2afa946c770c3197e5622ea5e9c,2025-04-01T17:15:42.023000
|
||||
CVE-2022-0002,0,0,8109a7e42c2476389a26f4b576e048bf54a0f7b87a24a41ab958cd97937ab177,2024-11-21T06:37:45.933000
|
||||
CVE-2022-0004,0,0,76e2034631db671c6d78b8f053274466d56a4afd5cff5cbbea3a9413334df9ae,2024-11-21T06:37:46.137000
|
||||
@ -201015,7 +201015,7 @@ CVE-2022-3283,0,0,d1204956320a18ccf0743af39c24c2947ddbf240c9e5c142c7c281554a9cf4
|
||||
CVE-2022-32830,0,0,6d3e0d63f5dbd5cd367ef09eb8e7bb5ae1e197dc407d36d1ddda947c5295660e,2024-11-21T07:07:02.587000
|
||||
CVE-2022-32831,0,0,689c01e33b959429839160644ff6b553ea4f16b7f55ee43065a0d76b21e1d800,2024-11-21T07:07:02.730000
|
||||
CVE-2022-32832,0,0,29f98a77f60fadeb0c8dc8830ec961c6e7b2725ae344b838e7476b9ea95903d2,2024-11-21T07:07:02.880000
|
||||
CVE-2022-32833,0,0,7dbf03198fc751bcfb93a1d693bbbc066b81facb423ce6274a156ee2eade460e,2024-11-21T07:07:03.040000
|
||||
CVE-2022-32833,0,1,6920275122996597ff489adf273fd4ad96f538c3a12810747ce24be7bdf90d1e,2025-04-21T19:15:17.227000
|
||||
CVE-2022-32834,0,0,4ed216909cdb81f972f3ec9ae88b807ecf46f0c19e17e04fd50405a7933f1248,2024-11-21T07:07:03.177000
|
||||
CVE-2022-32835,0,0,c4e4790392a83d528102c4e97d47eb8baa461ebd360d09bf0c699cd3dc049614,2024-11-21T07:07:03.343000
|
||||
CVE-2022-32836,0,0,4038a11d71076a38c1db2ebf2f93eeee122b3bb736cd7405e785b9e725262952,2025-03-11T17:15:40.753000
|
||||
@ -201045,7 +201045,7 @@ CVE-2022-32857,0,0,27e62f84a19b6b544543242111345192d39ef025757516739cfd970f339b1
|
||||
CVE-2022-32858,0,0,b1d1127b02ead7febeacccd17f986ce2e64720fdb06babe74eb66c023d6487f3,2024-11-21T07:07:06.440000
|
||||
CVE-2022-32859,0,0,98e5afbbba3baac0194888623b49ecb2eed79f4b196f928841ee8ef21780d430,2024-11-21T07:07:06.570000
|
||||
CVE-2022-3286,0,0,0813aa29ee9179bbe1c562d5b5fb2e12a78bc9896bafb6a15d57a4bd9ecabc46,2024-11-21T07:19:13.300000
|
||||
CVE-2022-32860,0,0,0eb73be863d7308c58ab022fddb1ac76af8e2494d208982d7f5bb5199c108bea,2024-11-21T07:07:06.693000
|
||||
CVE-2022-32860,0,1,1c8176ff3f5f86312c39323fe7597d33e982035bcc85446588ac1976f5c3a1e2,2025-04-21T19:15:17.380000
|
||||
CVE-2022-32861,0,0,07bed7c75ea0e8cf7d41b677e2eaa95522b2ed8f735afd53076d55cb992b218b,2024-11-21T07:07:06.837000
|
||||
CVE-2022-32862,0,0,dcf21fd18ba3aad93d5a27a9cf79f1ad926ee6edd933f27602ecce66c630fd78,2024-11-21T07:07:06.967000
|
||||
CVE-2022-32863,0,0,ecd7183d3d6f555f844f10b323375944022cab57fd1e92bbad0d7c5979bfbfe7,2024-11-21T07:07:07.110000
|
||||
@ -201104,7 +201104,7 @@ CVE-2022-32912,0,0,d3f5bb99d909695a87f03b60a7cc33f17228642e83f1a8bab41a97470b05b
|
||||
CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fcfef,2024-11-21T07:07:13.460000
|
||||
CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000
|
||||
CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000
|
||||
CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000
|
||||
CVE-2022-32916,0,1,80d2920aa7d433c5b75ca964f442e235b96177678a306e604262e2603fbcd1e5,2025-04-21T19:15:17.537000
|
||||
CVE-2022-32917,0,0,bb44d71a87b54dc125559c26e8e9a75de3ebd4dd0c6dff8b1d1ddb0376796d3c,2025-02-28T14:57:06.120000
|
||||
CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000
|
||||
CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000
|
||||
@ -201132,10 +201132,10 @@ CVE-2022-32939,0,0,7af0849b539feeee0815fc2cdc65caf9782cdc62991410283c23178950d68
|
||||
CVE-2022-3294,0,0,08170e09a0571b833c603e2fce9d110ce85106eb3761c32a5d57339916b69cde,2024-11-21T07:19:14.187000
|
||||
CVE-2022-32940,0,0,fd726d4c5097faa969d7bdc5dda02183ea82ea38ac6f9a79e41ad654bb754543,2024-11-21T07:07:16.670000
|
||||
CVE-2022-32941,0,0,927f5e1e351aadbffe5dd647d9ab5f294d543556b927ec2564fb65476bffb0cc,2024-11-21T07:07:16.810000
|
||||
CVE-2022-32942,0,1,d199302231675df17b5a94f40a16e2cb55f1d35f3e97e4a31b699ea533dbf9b7,2025-04-21T16:15:49.367000
|
||||
CVE-2022-32943,0,1,a7f950d46037fdd1ed9b9d9f554bdff2d6bce1e6a366df8dd266fae11156679e,2025-04-21T16:15:50.193000
|
||||
CVE-2022-32942,0,0,d199302231675df17b5a94f40a16e2cb55f1d35f3e97e4a31b699ea533dbf9b7,2025-04-21T16:15:49.367000
|
||||
CVE-2022-32943,0,0,a7f950d46037fdd1ed9b9d9f554bdff2d6bce1e6a366df8dd266fae11156679e,2025-04-21T16:15:50.193000
|
||||
CVE-2022-32944,0,0,885451c90d37e713ca36a56afd83297d6fd8e26e12df8ca022447b26bc1a1061,2024-11-21T07:07:17.243000
|
||||
CVE-2022-32945,0,1,c0525d91c3719239ac1e4940233f3e7a9b41eee9f5ea3af3c941aa29c96e2938,2025-04-21T16:15:50.357000
|
||||
CVE-2022-32945,0,0,c0525d91c3719239ac1e4940233f3e7a9b41eee9f5ea3af3c941aa29c96e2938,2025-04-21T16:15:50.357000
|
||||
CVE-2022-32946,0,0,098d9b64d706b903b082642fd67e744bb327d935ca9b2927b077aeb99721ca12,2024-11-21T07:07:17.527000
|
||||
CVE-2022-32947,0,0,a5c5ad6833927dbbfe280a4483c6024d5ac18fa19f8d7d1ad7b054400b312fa6,2024-11-21T07:07:17.653000
|
||||
CVE-2022-32948,0,0,f6a35858894fed51d3b452096af160175b067efbade023d6cb22f0fecf700230,2025-04-18T20:15:15.570000
|
||||
@ -206454,10 +206454,10 @@ CVE-2022-3999,0,0,571a1816800574cbd80fb145285b2033bb26f6b7b06f41b2b54bc32c95c9e5
|
||||
CVE-2022-39996,0,0,68142def67fc8eea22147f7c5fcf85c2d8d207b5f060a7771cbd7aeb2d185b94,2024-08-30T15:17:40.717000
|
||||
CVE-2022-39997,0,0,83812d35c7b8f7ac5e2ccfc93842f8cdae7fd34c8e4a34faf2289335c67b9482,2024-08-28T14:35:01.570000
|
||||
CVE-2022-4000,0,0,1a5c0073628a44761b23d02296b410024ee5d2c69eb3f32038d46f1a46d81d79,2024-11-21T07:34:25.327000
|
||||
CVE-2022-40000,0,1,5ef12db80bd48a0ecf4c67cb511b3c3c8b61626aff68cb9924034e1ad874bdd1,2025-04-21T16:15:50.587000
|
||||
CVE-2022-40001,0,1,3b562c8836c45a95230e8f4f41d28baf92160998dfb0f26bf0b3c754ddb56f31,2025-04-21T16:15:50.793000
|
||||
CVE-2022-40002,0,1,ca7beefb9896cf299331217c37721f24e078c0248ebd0989ff92f0a588c7bee0,2025-04-21T16:15:50.970000
|
||||
CVE-2022-40004,0,0,d951c442a8c6b12bd2f7a25c23242917cece4b1486418ed4bac1b9ba70ac4dc5,2024-11-21T07:20:43.090000
|
||||
CVE-2022-40000,0,0,5ef12db80bd48a0ecf4c67cb511b3c3c8b61626aff68cb9924034e1ad874bdd1,2025-04-21T16:15:50.587000
|
||||
CVE-2022-40001,0,0,3b562c8836c45a95230e8f4f41d28baf92160998dfb0f26bf0b3c754ddb56f31,2025-04-21T16:15:50.793000
|
||||
CVE-2022-40002,0,0,ca7beefb9896cf299331217c37721f24e078c0248ebd0989ff92f0a588c7bee0,2025-04-21T16:15:50.970000
|
||||
CVE-2022-40004,0,1,d56f53df22ea57f9e2d448cdddebb7b5b7e1998f239f134267662a83e7305f97,2025-04-21T18:15:17.107000
|
||||
CVE-2022-40005,0,0,e928ba9cc22f3465f0f12a42100843b16ac4fcc3bf0e12cd208ff95734ec24a0,2025-04-14T19:15:31.250000
|
||||
CVE-2022-40008,0,0,840b1eb1174364e3fbac1db8e4ab3ea73e710cde64889af409ac0b9babe28b2e,2024-11-21T07:20:43.390000
|
||||
CVE-2022-40009,0,0,26c0350798515d24962c84f26b250922fe5a90143ac50486e2d208571371ae83,2024-11-21T07:20:43.537000
|
||||
@ -208720,7 +208720,7 @@ CVE-2022-42801,0,0,2a67325cb0f588175b58cf45c0a4fba29e074879b3d0f910989a4e30cccb7
|
||||
CVE-2022-42802,0,0,6cd477344e7afaa3cae3d8040097a49f69d4e7b18b79dadfa673bee6a6c34e41,2023-11-07T03:53:35.360000
|
||||
CVE-2022-42803,0,0,e5530e505663bd4d38bb565c1e95fb83e8e8a7036d84b3cf82907f79fc5d6974,2024-11-21T07:25:22.807000
|
||||
CVE-2022-42804,0,0,7ad07265a1dbd23848c67cb5f7ae35a783b7bcacb37b71cfb0cfce76be4518db,2023-11-07T03:53:35.837000
|
||||
CVE-2022-42805,0,1,83996d0086cb7b1eab55a07e7d4f67dcfc26ab438bed5cc458a9479e06942385,2025-04-21T17:15:19.353000
|
||||
CVE-2022-42805,0,0,83996d0086cb7b1eab55a07e7d4f67dcfc26ab438bed5cc458a9479e06942385,2025-04-21T17:15:19.353000
|
||||
CVE-2022-42806,0,0,76a7c554c0765c98c6c7bab682663bc440ad90147322f4806a61a3c5458b02fa,2024-11-21T07:25:23.100000
|
||||
CVE-2022-42807,0,0,a29a0d1e49344c8e051603e50443d8ffa0163fe130ddb3d62de566d6cabd8f27,2024-12-06T19:15:09.130000
|
||||
CVE-2022-42808,0,0,e1b49a88551f045375012edf65da2bca4537eb41cdf388890dbaedede7391310,2024-11-21T07:25:23.350000
|
||||
@ -208737,31 +208737,31 @@ CVE-2022-42818,0,0,e44ebc28be2c01be2935f3682e8ba58fba5469b455b724e2772b8779278ee
|
||||
CVE-2022-42819,0,0,6a4098e1178f96c725e19cb3756650e31eb59ac4724a69a55c38f4b201e40386,2024-11-21T07:25:24.670000
|
||||
CVE-2022-4282,0,0,8d01fbb34a405827c74b12fccb0c4ab29910f631ada62bc2bcf2830184948186,2024-11-21T07:34:56.240000
|
||||
CVE-2022-42820,0,0,60b6b3ad8355d6b86a37e559645cd6f379c146e5ca0e892767a00ffe14a620c2,2024-11-21T07:25:24.787000
|
||||
CVE-2022-42821,0,1,f9653df43499ebb9f0f0716c05fbadf374a6ac66d058282ca3408aa6221781a9,2025-04-21T17:15:21.177000
|
||||
CVE-2022-42821,0,0,f9653df43499ebb9f0f0716c05fbadf374a6ac66d058282ca3408aa6221781a9,2025-04-21T17:15:21.177000
|
||||
CVE-2022-42822,0,0,67bbc2542a632a1720052dfa2dcc2ec8cda2381ddc4abbf51e0a406addb8a4c1,2023-11-07T03:53:36.440000
|
||||
CVE-2022-42823,0,1,49fc78d549e92fe999d68ef243995033e57966ef041fcc437f0c3fb9649501f1,2025-04-21T16:15:51.220000
|
||||
CVE-2022-42824,0,1,6c90c9b36aea74225595bb731b6c26281e07919e4fe0a478067caf0d28855ca8,2025-04-21T16:15:51.440000
|
||||
CVE-2022-42825,0,1,036eaad63339fddefe78546773ea3e6f86d0918826ec6fc2248fb574ae674509,2025-04-21T16:15:51.623000
|
||||
CVE-2022-42823,0,0,49fc78d549e92fe999d68ef243995033e57966ef041fcc437f0c3fb9649501f1,2025-04-21T16:15:51.220000
|
||||
CVE-2022-42824,0,0,6c90c9b36aea74225595bb731b6c26281e07919e4fe0a478067caf0d28855ca8,2025-04-21T16:15:51.440000
|
||||
CVE-2022-42825,0,0,036eaad63339fddefe78546773ea3e6f86d0918826ec6fc2248fb574ae674509,2025-04-21T16:15:51.623000
|
||||
CVE-2022-42826,0,0,a3db93b6acc795d6f94f901a4da2959143f2f1df1d41d8a4377b77c2f10dc1bc,2024-11-21T07:25:25.490000
|
||||
CVE-2022-42827,0,0,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000
|
||||
CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000
|
||||
CVE-2022-42829,0,0,60b7d93b772d03e8943ccdbb49b71d351a7499a5bf19d49948ac08d4b6c96b4c,2024-11-21T07:25:25.853000
|
||||
CVE-2022-4283,0,0,27a9ccef858f1b55dd303113243ca1b93474519017aa26fd4c4f0e5e0e04ab05,2025-04-14T19:15:34.943000
|
||||
CVE-2022-42830,0,0,72972a3ba5fc43556b715b18e4356769de4615c3248b9cf605d32df462fdaf81,2024-11-21T07:25:25.977000
|
||||
CVE-2022-42831,0,1,cb6951312ae9ace004d9bab0f100207bfdf6c59e80b35159bc752e0d49331012,2025-04-21T17:15:21.477000
|
||||
CVE-2022-42832,0,1,c43b1e6307810da0648bfc4e270548d6cea60d7dc4efde7dc8b611c27d0071df,2025-04-21T17:15:21.760000
|
||||
CVE-2022-42830,0,1,b497c94b33a3d833e330b12cb23797ca823e5ff5f03185e01d866600bdc20db3,2025-04-21T18:15:18.270000
|
||||
CVE-2022-42831,0,0,cb6951312ae9ace004d9bab0f100207bfdf6c59e80b35159bc752e0d49331012,2025-04-21T17:15:21.477000
|
||||
CVE-2022-42832,0,0,c43b1e6307810da0648bfc4e270548d6cea60d7dc4efde7dc8b611c27d0071df,2025-04-21T17:15:21.760000
|
||||
CVE-2022-42833,0,0,44dae1b926e235a8164c976a941f96bd5498caa8b8b6fc9669e4e701ea6e3206,2024-11-21T07:25:26.350000
|
||||
CVE-2022-42834,0,0,7cc72717124f49509300124985c6b62b511e7b7ebf1230231ee662ec8d15b091,2024-12-10T17:15:06.870000
|
||||
CVE-2022-42835,0,0,34bac917090ddc63215055da666f1dfea60d81961d5293909944173ff834242a,2023-11-07T03:53:37.373000
|
||||
CVE-2022-42837,0,1,8c71273a4284cabbd548c255a2f32dd010026b3e5f91efa8643c240169b71a3e,2025-04-21T17:15:22.027000
|
||||
CVE-2022-42837,0,0,8c71273a4284cabbd548c255a2f32dd010026b3e5f91efa8643c240169b71a3e,2025-04-21T17:15:22.027000
|
||||
CVE-2022-42838,0,0,cf64ba8da1b8f4aa6a29aea4419be05020ed9f4ac01fe862828092310044f81b,2024-11-21T07:25:26.787000
|
||||
CVE-2022-42839,0,0,178b055f70f0ab66f140130e7a6f3976a591a968012996c927663753a74e7b65,2025-04-17T16:15:25.663000
|
||||
CVE-2022-4284,0,0,9060d650bc4d3cd13597dd3540a66e3bd6aafec1e308b9e97a5a419a42e8e79c,2023-11-07T03:57:25.193000
|
||||
CVE-2022-42840,0,1,ad709a4b836d6910d90b1396622dbd48b0dd6b455a1e99fd7779ffc482f9aad5,2025-04-21T17:15:22.337000
|
||||
CVE-2022-42841,0,1,bb553adec132089b851bfe1acb4a495713c6c0fe19c9c4359e2dacdeac403187,2025-04-21T17:15:22.683000
|
||||
CVE-2022-42842,0,1,17aaf55f149ad7c8a87bd85ae458d2b3533790a004b1e57197d83ff8ffb44c43,2025-04-21T17:15:22.967000
|
||||
CVE-2022-42843,0,1,c1b082c6d017d29eb034e5bc2ebbdd045169bc2a3bfa72f23ea8c8bbc053c39f,2025-04-21T16:15:51.813000
|
||||
CVE-2022-42844,0,1,6ef0e9d2b564c9a8abfba1e17dbeefd24ed0ec6ec582a6e3c8b20ffc6127e04b,2025-04-21T16:15:52.007000
|
||||
CVE-2022-42840,0,0,ad709a4b836d6910d90b1396622dbd48b0dd6b455a1e99fd7779ffc482f9aad5,2025-04-21T17:15:22.337000
|
||||
CVE-2022-42841,0,0,bb553adec132089b851bfe1acb4a495713c6c0fe19c9c4359e2dacdeac403187,2025-04-21T17:15:22.683000
|
||||
CVE-2022-42842,0,0,17aaf55f149ad7c8a87bd85ae458d2b3533790a004b1e57197d83ff8ffb44c43,2025-04-21T17:15:22.967000
|
||||
CVE-2022-42843,0,0,c1b082c6d017d29eb034e5bc2ebbdd045169bc2a3bfa72f23ea8c8bbc053c39f,2025-04-21T16:15:51.813000
|
||||
CVE-2022-42844,0,0,6ef0e9d2b564c9a8abfba1e17dbeefd24ed0ec6ec582a6e3c8b20ffc6127e04b,2025-04-21T16:15:52.007000
|
||||
CVE-2022-42845,0,0,ba96f911d4826192fdd765e5c74013b5f0b767ef72565d153822de4b54afda45,2025-04-21T15:15:52.020000
|
||||
CVE-2022-42846,0,0,5df569978e05253d53761f78faf7ec3334aa271a6a3bde34fb3bd5c154540cf9,2025-04-21T15:15:52.260000
|
||||
CVE-2022-42847,0,0,0a8a860a98af1e35272c20fc596f3591d4bdd3bcdbe71181d2b65c35d46e0640,2025-04-21T15:15:52.423000
|
||||
@ -208773,16 +208773,16 @@ CVE-2022-42851,0,0,db14733fc043cd7dd41681af528ecec93b9bb413822d9f1126bd61905062e
|
||||
CVE-2022-42852,0,0,2831fbe989522801ef2d951a068742d21bc4bcf38de31818f493967a25278104,2025-04-21T15:15:53.250000
|
||||
CVE-2022-42853,0,0,583ecb07499cce9a877325e7ac2bb5633ef0d7e07b8f530a0fa0f060b02814c6,2025-04-21T15:15:53.440000
|
||||
CVE-2022-42854,0,0,881b08e3a0eebcf2c48f3b7fb74863bae653b607fdf1c4ee20ddea2c9d37de4d,2025-04-21T15:15:53.603000
|
||||
CVE-2022-42855,0,1,0014f785e5d63d0215d759791dc8fa6471d0df0169981a7cb71c9ce0d677fbd6,2025-04-21T16:15:52.180000
|
||||
CVE-2022-42855,0,0,0014f785e5d63d0215d759791dc8fa6471d0df0169981a7cb71c9ce0d677fbd6,2025-04-21T16:15:52.180000
|
||||
CVE-2022-42856,0,0,e38afc622efa8426f6b752bc1a97e913cc6c81b673a1118416d6016374566019,2025-02-28T14:53:03.590000
|
||||
CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000
|
||||
CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000
|
||||
CVE-2022-42859,0,0,691ac48765bc1b2a4c70e8a3d071f4d8f5a264d9aa1a2d61a5e295eed77df058,2025-04-21T15:15:53.767000
|
||||
CVE-2022-4286,0,0,1fd0db637c20a5af6d2ad08e01d6abd54827ebadf0f62562b6d8c5c3a54c6a57,2024-11-21T07:34:56.647000
|
||||
CVE-2022-42860,0,0,f07f01093947dd5a1be267c1670c5e33c77da8c29b0b1395fb35d023c1840997,2024-12-05T18:15:19.930000
|
||||
CVE-2022-42861,0,1,1b955d220e765221bb01fee67f1391018eb727d036964784c6ce3b38c65e5a76,2025-04-21T16:15:52.370000
|
||||
CVE-2022-42862,0,1,becbbe593afbfd9fb5eb1fec657a4f65fa3510c747a6a92bf831020974bc024d,2025-04-21T16:15:52.550000
|
||||
CVE-2022-42863,0,1,147d83234790459c17b55c43cc6cf771969c8a63eacdff758377b7502518c90e,2025-04-21T16:15:52.727000
|
||||
CVE-2022-42861,0,0,1b955d220e765221bb01fee67f1391018eb727d036964784c6ce3b38c65e5a76,2025-04-21T16:15:52.370000
|
||||
CVE-2022-42862,0,0,becbbe593afbfd9fb5eb1fec657a4f65fa3510c747a6a92bf831020974bc024d,2025-04-21T16:15:52.550000
|
||||
CVE-2022-42863,0,0,147d83234790459c17b55c43cc6cf771969c8a63eacdff758377b7502518c90e,2025-04-21T16:15:52.727000
|
||||
CVE-2022-42864,0,0,14cbd5a7749222311df8e273e33b983841feddec759d7d7e1892d1c925558b83,2024-11-21T07:25:30.310000
|
||||
CVE-2022-42865,0,0,60fdc46a607764f05b9cc2c70833d6da8100473b9333cf9f234baddae1ed7aab,2025-04-21T15:15:53.933000
|
||||
CVE-2022-42866,0,0,6f81bcaba8a72525c82d0866eaafd7afcc6e383cb28c6fed52efa44cbc345ca0,2025-04-21T15:15:54.133000
|
||||
@ -211450,8 +211450,8 @@ CVE-2022-46622,0,0,9cfe0b8b815e2c19a392cf79da33f11068101c28cdfe88d1a3b68a8e75b32
|
||||
CVE-2022-46623,0,0,ed30c1295bad798f95bb9adb26a06bcbf3b85c5f204aff3c14e4234e510c32ee,2025-04-08T15:15:47.120000
|
||||
CVE-2022-46624,0,0,d360f63da190a2be1b2abf479fc7dc5ff5cecd323efba91bcbb7ab38c6f2798d,2025-04-01T16:15:17.553000
|
||||
CVE-2022-4663,0,0,569973116472f7ed53f2f258dfc32b934af6dff10c588ff046de4025087878ef,2024-11-21T07:35:41.520000
|
||||
CVE-2022-46631,0,1,9c2afcce766571855cf7f4e267eaa5781d501c91df0710e451dd73f18b31ee48,2025-04-21T16:15:52.913000
|
||||
CVE-2022-46634,0,1,5f86208a8c8164110316599c5016a192e7449c14037576c0c2c20e8f595ef477,2025-04-21T16:15:53.133000
|
||||
CVE-2022-46631,0,0,9c2afcce766571855cf7f4e267eaa5781d501c91df0710e451dd73f18b31ee48,2025-04-21T16:15:52.913000
|
||||
CVE-2022-46634,0,0,5f86208a8c8164110316599c5016a192e7449c14037576c0c2c20e8f595ef477,2025-04-21T16:15:53.133000
|
||||
CVE-2022-46637,0,0,3316e94a574910ab8d9266596348b15b3754b105862bab317982373052ac2d4d,2025-03-14T19:15:40.160000
|
||||
CVE-2022-46639,0,0,a360618ef141ea5a3652c872665ca84132de6ed1de18e0eb04fc0ef2a904569e,2025-04-03T15:15:42.657000
|
||||
CVE-2022-4664,0,0,7108ff471bb92067c29df502bdc1cc308cf1ac51eff5abfb173023fb44692ab5,2025-03-25T21:15:38.820000
|
||||
@ -211498,7 +211498,7 @@ CVE-2022-46685,0,0,24ffab03771ebd98ee5402cf47c5d78c4704d163860137f14a759f99f3a5d
|
||||
CVE-2022-46686,0,0,3ba9480262c8aa6cb470f5b49b51211031e7edfb8e61aab63c354bba254224e1,2024-11-21T07:30:54.083000
|
||||
CVE-2022-46687,0,0,ae102190b6be467b3d28abd0cd2efb52d1d74f67a858f9a8499edd3101c9ecd9,2024-11-21T07:30:54.203000
|
||||
CVE-2022-46688,0,0,bd911fcd3f821332f547325407f4403a559598345f52e0221d366b4c6cef8196,2024-11-21T07:30:54.327000
|
||||
CVE-2022-46689,0,1,58ab6f1e1a83c155285c0afd0ab067bb51c70baca432214601d3fe657fc9d54f,2025-04-21T16:15:53.313000
|
||||
CVE-2022-46689,0,0,58ab6f1e1a83c155285c0afd0ab067bb51c70baca432214601d3fe657fc9d54f,2025-04-21T16:15:53.313000
|
||||
CVE-2022-4669,0,0,734ff270e1f23c66b600f77279dc21ea2707e629b970d64c091bff7bc86ec34e,2025-03-12T17:15:37.700000
|
||||
CVE-2022-46690,0,0,55ecfff40e3859723722a77ef26d92733ccb2e9b676eaf832f677661d7ecad71,2025-04-21T14:15:33.530000
|
||||
CVE-2022-46691,0,0,808b386849ee9b6d91df1c53f939d7e73c364979d250403da909ee2e18e94231,2025-04-21T15:15:56.303000
|
||||
@ -211631,7 +211631,7 @@ CVE-2022-46829,0,0,a92f051800b1449178f1fa52286fe6681e4d8c457ceb6a3009e9f34eb4bc3
|
||||
CVE-2022-4683,0,0,786b20242caf0980d025230b275b394eed4618137c89d5d8d797556868510f7f,2024-11-21T07:35:43.680000
|
||||
CVE-2022-46830,0,0,04dd95497571553652188d100f56cbb63dbba824ac35278ebeec11972cde2dd4,2024-11-21T07:31:08.050000
|
||||
CVE-2022-46831,0,0,114fe3d8b100e455842f61fc42da0c756c9da64c139bdce0b213b8646de9e3fd,2024-11-21T07:31:08.173000
|
||||
CVE-2022-46832,0,1,5299c41f123fd9fefefd065f242cb3828167e83b8de3379cf73e52916d3baab3,2025-04-21T16:15:53.493000
|
||||
CVE-2022-46832,0,0,5299c41f123fd9fefefd065f242cb3828167e83b8de3379cf73e52916d3baab3,2025-04-21T16:15:53.493000
|
||||
CVE-2022-46833,0,0,871672df89dd109cdc0a7a431dea9e23afa77523572cfb59d1ab993b3bd8a583,2024-11-21T07:31:08.473000
|
||||
CVE-2022-46834,0,0,ca1a90b5be2c06dbd4e86ac51c8a41ba0ae74db46ef935ac88794e6efcd3c563,2024-11-21T07:31:08.637000
|
||||
CVE-2022-46835,0,0,950f453b766bb49c19de99ea1c474962e39f43a2b0f512d5f6ced1a9ed8d6f74,2024-11-21T07:31:08.867000
|
||||
@ -211738,8 +211738,8 @@ CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983e
|
||||
CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000
|
||||
CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000
|
||||
CVE-2022-4699,0,0,c8bc5b8a0186d69242d063b94e21a13563a8ec47131d958d441152d82ec9d2ae,2025-04-21T13:58:19.353000
|
||||
CVE-2022-46996,0,0,984b54bc9341b35701fe20f31b56222296aa8090a9e5105f4e5975e85a224e16,2024-11-21T07:31:22.417000
|
||||
CVE-2022-46997,0,0,d6b3106b43331cebd5b1808146e05d47adf2d8cd5cff8a2c65ce6c9922721726,2024-11-21T07:31:22.603000
|
||||
CVE-2022-46996,0,1,766705438c5a30fdd0a2464ca88cfd0e001b3044b02d4e0c13cab86d2cd05bd1,2025-04-21T19:15:17.693000
|
||||
CVE-2022-46997,0,1,6206cbcebfb64451df460e11afbdba04fe414024a663480dcf9d6b023bbaa0f1,2025-04-21T19:15:17.860000
|
||||
CVE-2022-46998,0,0,50a1b25a7a563377910f79acbd285a111a28468a5fe14912a387a2924c8575cd,2025-04-01T16:15:18.060000
|
||||
CVE-2022-46999,0,0,8cd05d982f69465b6b537e5be90a4d8cdc3429b3963dfb6d8a5ad2ec70e3e6c3,2025-04-01T16:15:18.310000
|
||||
CVE-2022-4700,0,0,3081104e04e4076cd01f8c33f9c865fd5b11dfe67a7af5f08583b0c7dc50285c,2024-11-21T07:35:45.670000
|
||||
@ -212001,13 +212001,13 @@ CVE-2022-47402,0,0,125a1d9afc3f8bef7add90cb9fe38d8f87255744e71e65401b7ba809c7ae8
|
||||
CVE-2022-47403,0,0,291612ab510ef787e017eb8d96e84b4bebd2741781f4ad58e84d6c5eec1e19af,2025-03-17T23:15:15.950000
|
||||
CVE-2022-47404,0,0,1fe3030d35f2e332defcb397a9089a7b6189a25efe2152e1a7a5d8da3739ebc6,2025-03-17T23:15:16.013000
|
||||
CVE-2022-47405,0,0,54bdc921f5fb59995098fdab26e6a93c1b85e0a31675e3724a42ea017169d707,2025-03-17T23:15:16.077000
|
||||
CVE-2022-47406,0,0,8d65fd64fb7c11e4b2f8bc59df9dbca116f86de6ab02cbf2ce4972d4f78676d3,2024-11-21T07:31:53.790000
|
||||
CVE-2022-47407,0,0,c9595bc0da8a1081a052a523e6311156ba6697f57e4e0dde1fc313e3918edec3,2024-11-21T07:31:53.930000
|
||||
CVE-2022-47408,0,0,650479fce80c939c88a7c82ace0f9905382dd193a33fa2c24c8ad11166a03572,2024-11-21T07:31:54.070000
|
||||
CVE-2022-47409,0,0,4fd25a3aaad76c015858b32bf6fcdea1ebacb5ab3a3a7b2b25350f9e97e988f6,2024-11-21T07:31:54.210000
|
||||
CVE-2022-47406,0,1,6cab6348592010c4be54d1999988f34f1d488721358f5cca87593c73e3c98d78,2025-04-21T19:15:18.030000
|
||||
CVE-2022-47407,0,1,153443e9c6e555753efffa31831bb4859856ba1a04a788f84e72e52a60003906,2025-04-21T19:15:18.177000
|
||||
CVE-2022-47408,0,1,0c2cce7cb8584ce0c3d8232bc91687998490503684d97bc16075f2fd31c542e9,2025-04-21T19:15:18.310000
|
||||
CVE-2022-47409,0,1,260b9b83ea19bc49daddcc7b4d849aaba0fc95f6cb26387061ccf2d6e5953c00,2025-04-21T19:15:18.443000
|
||||
CVE-2022-4741,0,0,b52ad19577ada77dbb25d63b112b9f3fc7f3608a78d617e01691e5c5929b262d,2024-11-21T07:35:51.100000
|
||||
CVE-2022-47410,0,0,348ca8fce6a77e827fbf973cf787b56208ea7a7b3161596eb4e92188146346fd,2024-11-21T07:31:54.370000
|
||||
CVE-2022-47411,0,0,8c720121984f7473eb7bf89b0c020f7281f951028fc2ddd2b5616b8da95c66bf,2024-11-21T07:31:54.523000
|
||||
CVE-2022-47410,0,1,4183d598761efb1dabb6f263027fa9bf4214a7c4b0124e981b5a973bce0d5b56,2025-04-21T19:15:18.577000
|
||||
CVE-2022-47411,0,1,d4476a43d28eca1d61b6087046b59bb713303eaca18692a2811edf87aed01654,2025-04-21T19:15:18.707000
|
||||
CVE-2022-47412,0,0,a19efb314ad05f7693c96588b0a0d70c4f6cfb13186f82d70fb5131568f2f965,2025-03-25T15:15:16.910000
|
||||
CVE-2022-47413,0,0,b1d47f0a52c0b0efe8c4159a4f1bcbbfa401dfbcb8c6029f4836e7c87e9194b0,2025-03-25T15:15:17.083000
|
||||
CVE-2022-47414,0,0,7e500daed2fdd087f8ba461470917532f9e007a92782c00aa6b26b616767a064,2025-03-25T15:15:17.250000
|
||||
@ -247069,7 +247069,7 @@ CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c
|
||||
CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000
|
||||
CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000
|
||||
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
|
||||
CVE-2024-12543,1,1,4959c46c92d1ebbb6de99e085f7b21fbd20980ce36fe91d0448720554066c2df,2025-04-21T16:15:53.777000
|
||||
CVE-2024-12543,0,0,4959c46c92d1ebbb6de99e085f7b21fbd20980ce36fe91d0448720554066c2df,2025-04-21T16:15:53.777000
|
||||
CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000
|
||||
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
|
||||
CVE-2024-12546,0,0,895adf7079eb7d42851f25be99f9e5b1cbd12f9ba402ae98b4e0a49362989478,2025-03-13T03:15:34.597000
|
||||
@ -247232,7 +247232,7 @@ CVE-2024-12712,0,0,9554afe0660aaeb94d322c68f376b4049a1c78b9e06148cca4a5ca650e943
|
||||
CVE-2024-12713,0,0,1dd49dc5e03b350467b5dcea4c6874a20628cdfedb6c7a59c15e947cc9533d45,2025-01-08T04:15:06.967000
|
||||
CVE-2024-12714,0,0,7148cdec6f8b212fef9fce024e81921849f016f20d04016c2915f69292998cb6,2025-01-09T16:15:36.200000
|
||||
CVE-2024-12715,0,0,c108391047bdc5cb3a30ab729c489c01e29510a155fea37302079b85e271c130,2025-01-09T16:15:36.360000
|
||||
CVE-2024-12717,0,1,154dca6e7c3997c611d8bf724a605e850f7ca5cd826b6b3b708c332cefe51032,2025-04-21T17:09:36.177000
|
||||
CVE-2024-12717,0,0,154dca6e7c3997c611d8bf724a605e850f7ca5cd826b6b3b708c332cefe51032,2025-04-21T17:09:36.177000
|
||||
CVE-2024-12719,0,0,c34442f4a2a9e42bf0beba4200827e8cdf35e75eae83c71d20db9392843712f7,2025-03-13T17:23:01.420000
|
||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||
CVE-2024-12720,0,0,64cad461a43fc8f5d0410c610c99186515778fe2e8eacf77eec51f5a2921a1e2,2025-03-20T14:15:18.290000
|
||||
@ -247242,7 +247242,7 @@ CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e
|
||||
CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000
|
||||
CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000
|
||||
CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000
|
||||
CVE-2024-12731,0,1,2914819d97d6e424976c64691845c001bec3fd620e1c18db3c5a1ee5a5baae03,2025-04-21T17:09:16.927000
|
||||
CVE-2024-12731,0,0,2914819d97d6e424976c64691845c001bec3fd620e1c18db3c5a1ee5a5baae03,2025-04-21T17:09:16.927000
|
||||
CVE-2024-12736,0,0,27dc2dca8ca80ab2c2f7728100c1c2ef462b0b1d9d1f7583591ae4131d8f4fb2,2025-01-09T16:15:36.680000
|
||||
CVE-2024-12737,0,0,c553412f8547626ac6415dc6171d111137c4bb469993894078556f9de4d9a57d,2025-02-26T15:15:22.363000
|
||||
CVE-2024-12738,0,0,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658897,2025-01-07T13:15:07.357000
|
||||
@ -249163,8 +249163,8 @@ CVE-2024-20148,0,0,020b2cd09e91f8beac0c9caedb7ae42dc4f322034d76d3f8252025922b8dc
|
||||
CVE-2024-20149,0,0,568ee02819888360cfcfe668f6e33aef2b41d5b7206273582d0fafdca3736f77,2025-01-06T15:15:12.523000
|
||||
CVE-2024-2015,0,0,4b2b7166fa9575a7c1050901ca90dd43f109899611c303f2828bf2e2cf52681a,2024-11-21T09:08:48.950000
|
||||
CVE-2024-20150,0,0,019897895214741b7ee34daf20bc8579076cc9f1ae352d10ac2c45b1594317b1,2025-01-06T15:15:12.707000
|
||||
CVE-2024-20151,0,1,d04bbcef870cc61ec04ed8901f4506bcc530c2158aa6f3a373421e76d733682b,2025-04-21T17:13:45.390000
|
||||
CVE-2024-20152,0,1,9c99dd824aebbc709d06cec2fa1a75a18ade6c8ff9ae76f5f8fb93d76ddbfb73,2025-04-21T17:12:10.883000
|
||||
CVE-2024-20151,0,0,d04bbcef870cc61ec04ed8901f4506bcc530c2158aa6f3a373421e76d733682b,2025-04-21T17:13:45.390000
|
||||
CVE-2024-20152,0,0,9c99dd824aebbc709d06cec2fa1a75a18ade6c8ff9ae76f5f8fb93d76ddbfb73,2025-04-21T17:12:10.883000
|
||||
CVE-2024-20153,0,0,e167e5a4f372d1993cd50bcde2902a5a41097ebede83c7cb6f8dc0db1653bbd9,2025-01-06T15:15:13.173000
|
||||
CVE-2024-20154,0,0,84fa7592f528b0fbeafd784633abdf1205542c3bd45b4f3f4f0d20bcbb68b2d2,2025-01-06T15:15:13.343000
|
||||
CVE-2024-2016,0,0,0a76e7b2522ebfe55ed8955c44da83c1e8d58430e6a8d9e2f2e7fd6c0d9d0b3c,2024-11-21T09:08:49.083000
|
||||
@ -260805,7 +260805,7 @@ CVE-2024-35238,0,0,2a8fe03f6ee35e14c28b18637cc4e70825b3987608d37e9f3bdd77f1e21a8
|
||||
CVE-2024-35239,0,0,9fc6812fc4452a57481ef1ecc19fd19af671434dfd81c255831b2e27b6681b08,2024-11-21T09:20:00.020000
|
||||
CVE-2024-3524,0,0,0e90e9862052f2f2e951a5353e2b5d071ea54439f859bff93b543e4aa50ce11c,2025-02-27T19:56:01.580000
|
||||
CVE-2024-35240,0,0,1ac23918dd3dc76c5661e94756d6b494136b5466658192152e22c7ce170bfad2,2024-11-21T09:20:00.163000
|
||||
CVE-2024-35241,0,1,3e27c863646ce3d70525099bfaf7e62045ef6916aebf808f0b8288d6b1d615c8,2025-04-21T16:15:54.053000
|
||||
CVE-2024-35241,0,0,3e27c863646ce3d70525099bfaf7e62045ef6916aebf808f0b8288d6b1d615c8,2025-04-21T16:15:54.053000
|
||||
CVE-2024-35242,0,0,c28eed7ea5f4e421a5e1e167fa425a5df0a61f28f8b262d91eb6a0e728caac7f,2025-02-13T18:18:05.910000
|
||||
CVE-2024-35244,0,0,41b1eedacafd9e05546287a51f11afcf02350cf76e17fdd93878f8cd00f3f14e,2025-01-27T18:15:38.900000
|
||||
CVE-2024-35245,0,0,6dc7099bd2a20355e744712dde1a35c4370adb2c7d467a26fd9cfeb11a73298a,2024-11-15T14:00:09.720000
|
||||
@ -266252,7 +266252,7 @@ CVE-2024-42189,0,0,e7b7c7acb940f790abe786406958a41f711525d4b7b58b2364ea753522f57
|
||||
CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000
|
||||
CVE-2024-42193,0,0,d496336e10e290c03b4d9d1ca9b765852bf46abc8e173adc595ed636cba288c3,2025-04-16T13:25:59.640000
|
||||
CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000
|
||||
CVE-2024-42195,0,1,e6096f9dc2f9722c72b059c5d253725037975b1bafcc67e37418fa8cf4e4bea3,2025-04-21T16:50:52.820000
|
||||
CVE-2024-42195,0,0,e6096f9dc2f9722c72b059c5d253725037975b1bafcc67e37418fa8cf4e4bea3,2025-04-21T16:50:52.820000
|
||||
CVE-2024-42196,0,0,86572e299010ed9c933dd6e15fc8f817087307b7b1acb778fb2306342762ea6d,2025-04-14T17:16:43.817000
|
||||
CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000
|
||||
CVE-2024-42200,0,0,66659188c246db72ae2036019c20cdc2a8be48b55af2e6c3eb8bec75ca164066,2025-04-15T18:39:27.967000
|
||||
@ -266674,7 +266674,7 @@ CVE-2024-42681,0,0,6833e1284f21aff4cea3291d87abe85804de118f6260add0e7925ca0f2033
|
||||
CVE-2024-4269,0,0,bd7fc75d53cf98fd156bc2e6c8c500570e4fddf5651b9c7bab8314ba4ad020b2,2024-11-21T09:42:30.873000
|
||||
CVE-2024-42697,0,0,362de23f2f8052625f6eec6570d781729ea23f898b9d22d3829caec51d414160,2024-09-26T13:32:55.343000
|
||||
CVE-2024-42698,0,0,dd4ca7fb95dd4b411a7b375b9d3e2b51afc3cbb6f0394f50d3862a96c3ec56e4,2025-03-18T19:15:44.043000
|
||||
CVE-2024-42699,0,1,8f637f97d39999c19e883913746afdef36931de7e3f80630061743e5065112ff,2025-04-21T16:15:54.203000
|
||||
CVE-2024-42699,0,0,8f637f97d39999c19e883913746afdef36931de7e3f80630061743e5065112ff,2025-04-21T16:15:54.203000
|
||||
CVE-2024-4270,0,0,46f72d2eeac4fc036097376936047967a198c4be730ba6b2d31d6d9187d4821f,2025-03-24T16:15:19.240000
|
||||
CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1dc,2024-11-21T09:42:31.173000
|
||||
CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000
|
||||
@ -267540,9 +267540,9 @@ CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65
|
||||
CVE-2024-43763,0,0,5fc0aea13a5c27635b964fa8715260e456055530c368ff45c3238134e512d142,2025-03-17T17:15:29.567000
|
||||
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
|
||||
CVE-2024-43765,0,0,8cf84ea44310579bb0c818dc4d80dbe0989c2ce9c97d8153c88912a96cf20e68,2025-03-18T14:15:39.920000
|
||||
CVE-2024-43767,0,1,61df9e37f87eb839be7381851ac197e79c037fd5becd27a9b7147888a69a6b55,2025-04-21T17:00:09.550000
|
||||
CVE-2024-43768,0,1,658dd717296513c1f2a793c3c98ad8e284f6f64eb3cf038201a59757e1f57ef2,2025-04-21T16:59:38.920000
|
||||
CVE-2024-43769,0,1,4b6f3d713b9f6c38232f6a4fae96538177836acf6848ea99df18e9305b4bf170,2025-04-21T16:59:07.287000
|
||||
CVE-2024-43767,0,0,61df9e37f87eb839be7381851ac197e79c037fd5becd27a9b7147888a69a6b55,2025-04-21T17:00:09.550000
|
||||
CVE-2024-43768,0,0,658dd717296513c1f2a793c3c98ad8e284f6f64eb3cf038201a59757e1f57ef2,2025-04-21T16:59:38.920000
|
||||
CVE-2024-43769,0,0,4b6f3d713b9f6c38232f6a4fae96538177836acf6848ea99df18e9305b4bf170,2025-04-21T16:59:07.287000
|
||||
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
|
||||
CVE-2024-43770,0,0,a480769a6cb36653329f0d93b36ee3dbce022630f7513a5de95e28e730a2663a,2025-03-18T15:15:53.527000
|
||||
CVE-2024-43771,0,0,df8527e96e574cb8f89cd4efcb816ebaa4b1e906834d3fcb9ea31ec70abe00fe,2025-03-18T14:15:40.117000
|
||||
@ -274050,7 +274050,7 @@ CVE-2024-52711,0,0,82705d4537efc544b27f97ea7020a29c63df676da0b3887989e8d0472e895
|
||||
CVE-2024-52714,0,0,d68bd2e6ba70a01a513d32cac86943fd8254d4c3004a24bfd1d27a6a8a9329d8,2024-11-20T20:35:15.260000
|
||||
CVE-2024-5272,0,0,fdbec5333cf64f4ba2599bc33574360d57e60dfadb483e1b524d6c59f71a8f55,2024-11-21T09:47:19.460000
|
||||
CVE-2024-52723,0,0,5294f4913cfa18e6b4a1234025de78af92fb40d1d3854cca46f94b086127876d,2025-03-13T18:15:45.350000
|
||||
CVE-2024-52724,0,1,46d4aef5bb0075c0badb4fc3546bcca7ce7ecf2d69f42c9ccef6ea53cefddd59,2025-04-21T16:51:44.970000
|
||||
CVE-2024-52724,0,0,46d4aef5bb0075c0badb4fc3546bcca7ce7ecf2d69f42c9ccef6ea53cefddd59,2025-04-21T16:51:44.970000
|
||||
CVE-2024-52725,0,0,717a7c0afea3bd329ebdf60a8219a2e963ef6fc34dff1a4e50031d8d0b7bcac2,2025-04-04T15:06:47.357000
|
||||
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
|
||||
CVE-2024-5273,0,0,f38807e90518b44431e0cfc096b8d017e2d345cb4d93d9e9623d44a767f39524,2024-11-21T09:47:19.577000
|
||||
@ -275564,7 +275564,7 @@ CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc4
|
||||
CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000
|
||||
CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12a49,2025-04-02T14:15:44.820000
|
||||
CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000
|
||||
CVE-2024-54774,0,1,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000
|
||||
CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000
|
||||
CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000
|
||||
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
|
||||
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
|
||||
@ -275753,7 +275753,7 @@ CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325
|
||||
CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000
|
||||
CVE-2024-5532,0,0,23c4978c8c684edaa8b0b6827b3bbdb5dca4d9ba0bc473042cb29ea594ed00d8,2024-10-29T14:34:50.257000
|
||||
CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1b2,2024-11-21T09:47:52.963000
|
||||
CVE-2024-55341,0,1,edee7ebb892ee713bbb99905d0b3211b3e1284c712f658de0f763304686fd244,2025-04-21T17:02:56.393000
|
||||
CVE-2024-55341,0,0,edee7ebb892ee713bbb99905d0b3211b3e1284c712f658de0f763304686fd244,2025-04-21T17:02:56.393000
|
||||
CVE-2024-55342,0,0,93664e2a85dd045b1e32494480697cff3f10581c5d3b4ffc95ad5f2b8d49d1d5,2025-04-18T16:58:55.180000
|
||||
CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000
|
||||
CVE-2024-55354,0,0,24b1f2429bda7247ef87d74efe9fac09085c98cbd5de35fd2c7f2d75de2b93c9,2025-04-10T00:15:17.633000
|
||||
@ -276322,8 +276322,8 @@ CVE-2024-56361,0,0,6914e3b4169217c01799ba259f55986b8128ac01969377212884716261b99
|
||||
CVE-2024-56362,0,0,6c11627d17fd0c98131328b72e24d3fe9b01f90190167be28f8c83514e2d2986,2024-12-23T18:15:07.617000
|
||||
CVE-2024-56363,0,0,7b130d481442d6564973e2a7227b43f5a030ae8a41341bb70189f5abec825a62,2024-12-23T18:15:07.767000
|
||||
CVE-2024-56364,0,0,6115dedb84ebd874c4c0a6694d1fb784d8502b3a627aacf7ea4fc74186ea1ff2,2024-12-23T16:15:07.770000
|
||||
CVE-2024-56365,0,1,2c4081effb562c10f3a6ff9975c360c69c298e69738a36decec1a98847ef24a2,2025-04-21T16:57:39.707000
|
||||
CVE-2024-56366,0,1,9d06f92767b95afe112abe054f899d9b718e859b134fad84d373f64c12260f7e,2025-04-21T16:57:02.417000
|
||||
CVE-2024-56365,0,0,2c4081effb562c10f3a6ff9975c360c69c298e69738a36decec1a98847ef24a2,2025-04-21T16:57:39.707000
|
||||
CVE-2024-56366,0,0,9d06f92767b95afe112abe054f899d9b718e859b134fad84d373f64c12260f7e,2025-04-21T16:57:02.417000
|
||||
CVE-2024-56368,0,0,3fcf15405e5d098a7d36ecb9520617c7fca5345251aca6249179f3e1c86517d0,2025-01-11T13:15:28.530000
|
||||
CVE-2024-56369,0,0,3c8472717567d8bf18ec0d8e83a626d55afe4bbcb99b2a53e44807eb7ad97aa3,2025-01-16T15:18:59.237000
|
||||
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
|
||||
@ -276339,8 +276339,8 @@ CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804
|
||||
CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000
|
||||
CVE-2024-56404,0,0,0922979315c1e629cdb1fe6a847df3905e5c41f9b68e7cd17dbd9ff65fcb7683,2025-01-24T18:15:31.883000
|
||||
CVE-2024-56406,0,0,f1cc3d42e81cbf110160280cdcf4b414f213606556a1ede59e4af760c0150594,2025-04-18T17:15:34.370000
|
||||
CVE-2024-56408,0,1,979f73a5c009249e5cb4971cd41bf7cb915a3c3ec727bc94130c88ad7cfbdaf9,2025-04-21T16:58:23.370000
|
||||
CVE-2024-56409,0,1,94a67396b70c78b5d8549b6f98daacbf997b17c3314963d8b6dec3606ad831a3,2025-04-21T17:14:40.833000
|
||||
CVE-2024-56408,0,0,979f73a5c009249e5cb4971cd41bf7cb915a3c3ec727bc94130c88ad7cfbdaf9,2025-04-21T16:58:23.370000
|
||||
CVE-2024-56409,0,0,94a67396b70c78b5d8549b6f98daacbf997b17c3314963d8b6dec3606ad831a3,2025-04-21T17:14:40.833000
|
||||
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
|
||||
CVE-2024-56410,0,0,e0e50d5b76a50d0158c30642b3b450c5b7e0d85a42e955104e2d2102a651b587,2025-04-17T02:35:48.583000
|
||||
CVE-2024-56411,0,0,615b82fc0973ae15ac50b3d81cfa4e05d425a42b09a53f1e0fa19f11d9edb6af,2025-03-06T14:27:28.747000
|
||||
@ -276349,7 +276349,7 @@ CVE-2024-56413,0,0,379dc229ccabdf364af9829d579c8a73e199b5e7c66cddebda4706bf51009
|
||||
CVE-2024-56414,0,0,8d131c69616c062c73dec88651a9a991bc9ee2aa5d8bfac07e8125110c170173,2025-01-02T16:15:08.693000
|
||||
CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000
|
||||
CVE-2024-56430,0,0,0262ea105dbec15a8d2974aa338fd319cfb88d949549b9f7b495f5427178dfce,2024-12-26T20:15:23.447000
|
||||
CVE-2024-56431,0,1,d86626c9b8d8fef008e7a4c5675ea03019c9bf5693f6e523bcbe518eebd8b433,2025-04-21T16:53:13.917000
|
||||
CVE-2024-56431,0,0,d86626c9b8d8fef008e7a4c5675ea03019c9bf5693f6e523bcbe518eebd8b433,2025-04-21T16:53:13.917000
|
||||
CVE-2024-56433,0,0,41933bdf4cf50f4b61b9a39102f868e297a293e10ec834a2eac62b7879bed51f,2024-12-26T09:15:07.267000
|
||||
CVE-2024-56434,0,0,77666c843737cc5a12cb8a3f8ccfddbad46fbc8e173c92ce2eda6e7d103804e3,2025-01-13T21:27:24.040000
|
||||
CVE-2024-56435,0,0,f9607cd64d453a5b32a52a5f464a83b8791cc483defad6f82c176abb69cec61b,2025-01-13T21:27:37.100000
|
||||
@ -276723,7 +276723,7 @@ CVE-2024-56812,0,0,32291b45b50464bf55ad84042acee5786e419c1622179fefaee6007739d57
|
||||
CVE-2024-5682,0,0,ec19db4c87275ffbb4fc8cd346d356eb2076f8c9ec5a66d24b5aead9b0de8a19,2024-09-20T12:30:51.220000
|
||||
CVE-2024-56826,0,0,35feaf96958441bcbb2377194170f9a7e6ee0c9ca970c6937d5762e6d9581705,2025-01-09T04:15:12.660000
|
||||
CVE-2024-56827,0,0,57a3cb45c026d1eb9eef42dd3043d41ad9c1a14469f315e5d3c4269e9166aff6,2025-01-09T04:15:12.840000
|
||||
CVE-2024-56828,0,1,db5b821d056d8a6a482dbad69053e1177f9f0ecbb7c5c5485d81f5ecbf79f4dd,2025-04-21T17:10:54.567000
|
||||
CVE-2024-56828,0,0,db5b821d056d8a6a482dbad69053e1177f9f0ecbb7c5c5485d81f5ecbf79f4dd,2025-04-21T17:10:54.567000
|
||||
CVE-2024-56829,0,0,fb517ef6b7f51e566ba1e37004f2890737a0fef0bcdec303fd5ff6dcfac6c408,2025-01-06T21:15:15.300000
|
||||
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000
|
||||
CVE-2024-56830,0,0,259c990fbcde712792da8c4d4dc09122d403bc6e23fa50f9406a98bd39483261,2025-04-08T09:15:23.627000
|
||||
@ -276948,6 +276948,7 @@ CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b5
|
||||
CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000
|
||||
CVE-2024-5739,0,0,5872b907e0724eac543322f80b8eb34cf152e3b796dd1fe428ea7d461342a07c,2025-03-29T00:15:24.117000
|
||||
CVE-2024-57392,0,0,d6a418f92c5b3087ef51bdf4cf98c823bb441b99c1a276be63b31060f929e79d,2025-03-02T22:15:34.597000
|
||||
CVE-2024-57394,1,1,2d590ae3d038cf274aefb9aa6bf1fe732f94b3c0e41a80420bca5e599f596120,2025-04-21T18:15:18.457000
|
||||
CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000
|
||||
CVE-2024-57401,0,0,3e6dff374c710f8b12cb1c7362393b753fe5f2b7a5b106fc3c4641cd281923d4,2025-02-21T18:15:19.040000
|
||||
CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000
|
||||
@ -277147,7 +277148,7 @@ CVE-2024-5774,0,0,486fd90e135c6757b4aafe207d8db6c3d7877d00116c11e1cc252707663db7
|
||||
CVE-2024-5775,0,0,69e04dc94cd5ee92cee8b04ad6d14e34d62bd23cde812c53b91850c0b7fffce5,2024-11-21T09:48:19.440000
|
||||
CVE-2024-57757,0,0,99f5a2259ad9d979cbfb69c6e0f695b6ecab4daaa86f6ba75c099433a68f44bc,2025-04-18T19:18:47.217000
|
||||
CVE-2024-5776,0,0,86888fe7b4b003fb18d3d2ba32b739edbd6c9d68a474b51eae89ea9740b7db86,2024-06-12T08:15:50.920000
|
||||
CVE-2024-57760,0,1,2491195831ab88a6a5550994b2ed5747a0fa739709bf28bf205cd0d7971a16c5,2025-04-21T17:32:32.837000
|
||||
CVE-2024-57760,0,0,2491195831ab88a6a5550994b2ed5747a0fa739709bf28bf205cd0d7971a16c5,2025-04-21T17:32:32.837000
|
||||
CVE-2024-57761,0,0,10459031bffb41647ed06feff1363c39eb2bd4875115f886828d6316399be76c,2025-02-03T17:15:22.157000
|
||||
CVE-2024-57762,0,0,c128dbb0d20acabbee812a567f099f1c7cec00cfca1a8468fb6200367f81b037,2025-04-10T15:38:17.627000
|
||||
CVE-2024-57763,0,0,fc533e718e3ae5ba74a9d4ccc15699b3aaaba889772de06edc9d771c277ba57f,2025-04-10T15:38:02.383000
|
||||
@ -281583,9 +281584,9 @@ CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee0116
|
||||
CVE-2025-0431,0,0,1e64f0a7ac3902103621beeb1819ab2ca28dde620c04dddcca6ac13a3b8fc521,2025-03-19T17:15:41.217000
|
||||
CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000
|
||||
CVE-2025-0433,0,0,8176875a60ba9233cb301d8a0e9b4f4b8bcfe49da3dc80cfb0257115d68714b5,2025-03-04T20:38:54.387000
|
||||
CVE-2025-0434,0,1,e837abfdbb60f74531bbbbe212384feb47152d045ded404661705af4799433c5,2025-04-21T17:30:52.300000
|
||||
CVE-2025-0435,0,1,29fb8162c530e20ff04eab3780f7334dea24577f4c91bbe52e405264a40182d0,2025-04-21T17:30:01.157000
|
||||
CVE-2025-0436,0,1,220d9c30bdc50e3dd105a478be5f17e077f5bfff2f98be9baff0bd8ea4677896,2025-04-21T17:33:07.750000
|
||||
CVE-2025-0434,0,0,e837abfdbb60f74531bbbbe212384feb47152d045ded404661705af4799433c5,2025-04-21T17:30:52.300000
|
||||
CVE-2025-0435,0,0,29fb8162c530e20ff04eab3780f7334dea24577f4c91bbe52e405264a40182d0,2025-04-21T17:30:01.157000
|
||||
CVE-2025-0436,0,0,220d9c30bdc50e3dd105a478be5f17e077f5bfff2f98be9baff0bd8ea4677896,2025-04-21T17:33:07.750000
|
||||
CVE-2025-0437,0,0,d078d941840e72d6b33dfd3aed27789fdb3a3f5bae0a9e352b97171e4f46745a,2025-02-03T19:15:13.967000
|
||||
CVE-2025-0438,0,0,e6871067ef533872a65605629516995eb3742f81405ab7272b39a1cb8841469c,2025-03-20T14:15:22.613000
|
||||
CVE-2025-0439,0,0,c2cef6831dde3157102ed94b3f3d806179065e33f91e332a9c0d617d4a037912,2025-03-17T16:15:24.267000
|
||||
@ -283447,10 +283448,10 @@ CVE-2025-21578,0,0,b9af84df29a54006ec24acc7fb9c1e39ce1ed05a8d05d33e0c01474db0c61
|
||||
CVE-2025-21579,0,0,15e3adec725a604043ec293ac73693aaf2a8df871e13ca1a9364cdb055b19ab9,2025-04-17T21:36:54.177000
|
||||
CVE-2025-21580,0,0,434479f6271a6a868eba478567dac5fecafa4cffa8f807d404cea22393e181a8,2025-04-17T21:39:21.173000
|
||||
CVE-2025-21581,0,0,1e7536482057e8a5e04a26a2106063d2311034c44a1d3317f819334aba0feddb,2025-04-16T21:15:46.413000
|
||||
CVE-2025-21582,0,0,32aabc87e8d85c0d4476172f57f68247e1a2a828feb37c07bb65f2b2d5f72fec,2025-04-16T21:15:46.527000
|
||||
CVE-2025-21582,0,1,6b1b04df812aefdc64eb8438f40eac78a8afe656b4fd4ac2f48f20481fbf6850,2025-04-21T19:46:45.210000
|
||||
CVE-2025-21583,0,0,ee7a2c798977f5379876765970454c765fa3b852e89968cfc13db2fed27936ae,2025-04-19T01:15:44.537000
|
||||
CVE-2025-21584,0,0,9f45735e576aea79d9c6e5fb15c2d65cd5e191c3b0add6d3ef3df14f359538ec,2025-04-16T20:15:16.947000
|
||||
CVE-2025-21585,0,0,b9ed1eb2bda1e51af887a721757dca8ad16289b5c79a7331d5a38e572a87cedd,2025-04-16T20:15:17.057000
|
||||
CVE-2025-21584,0,1,f135ca230364924bed579812594e94ea70c39d7089b5ed08776f4dbe2372c28f,2025-04-21T19:47:14.803000
|
||||
CVE-2025-21585,0,1,48ecae50f5f5fa39f5031e3cc408b8db5b3743b02ed92e06ecf232b8bd8a5367,2025-04-21T19:46:58.503000
|
||||
CVE-2025-21586,0,0,6594ae4fb8e4316fd66329f6a06e29ad9cc6172e025f66268e0f9a654bdc3267,2025-04-17T21:39:17.220000
|
||||
CVE-2025-21587,0,0,aafaf99fd3282c569ee19a74cb69b80efbb9ed049df77c41bc5a714edd290c9d,2025-04-16T16:15:29.730000
|
||||
CVE-2025-21588,0,0,effa0c8fb2fb697da4a3d2669a0e631b55c43a5380f0c72fc59262c575d33496,2025-04-19T01:15:44.637000
|
||||
@ -284646,12 +284647,12 @@ CVE-2025-22923,0,0,db710676251db580c239a793c17d5d355adc03a613e49a945a86438fe3f12
|
||||
CVE-2025-22924,0,0,2b44aabd3cf8ae056a768d6eea5fc6074722104abb0c9dc85adac27a2f002301,2025-04-07T14:18:49.830000
|
||||
CVE-2025-22925,0,0,745bd425c11f09046b941b16cd680ea5c6ffbe4d18fb4b2400614d3a233da63e,2025-04-07T14:18:49.830000
|
||||
CVE-2025-22926,0,0,c2e64ca769178c85d96c934a9ad573d380d25a085b1f90e149ec14bbf072873c,2025-04-10T21:15:48.503000
|
||||
CVE-2025-22927,0,0,88bf50b75a659bbab243a76f03ae8c557d1d6e8ca7f2e974e1743b02183cb5d8,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22928,0,0,4c964912abb95b29dbe026003f54c71c7874669cb5c0ddbb2b51bc75c13be164,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22929,0,0,1452b8a2fff94532d0fed1efabb09a58f398245a55704e8724aa3e5034629857,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22927,0,1,922a8a4cdcc2600b3fa891c0860a0d83c811acf9d6d01a238b8172708ce2f909,2025-04-21T19:15:18.890000
|
||||
CVE-2025-22928,0,1,4cdbd2bcdae9b55d4d0fa43f7bc93bdb4ee045449e25e0756ee08720b689cdfd,2025-04-21T19:15:19.033000
|
||||
CVE-2025-22929,0,1,7c419491f582a905aa4a24de603a39bb080d5ceddaeb31e49594977485e04ab2,2025-04-21T19:15:19.177000
|
||||
CVE-2025-2293,0,0,13f4d370f6d102d5ea10cfc1ff5e16c08ac308f70d6c6e0827ad4ce3947e07bb,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22930,0,0,9f037cce0cbbdbb57ebcef79426c72c5c553146b35be0ba75c142417aafe25fa,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22931,0,0,7040cbf9d7877251b12ddaa03bb535fb63f9768d1a2571d19941499e73bb1b90,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22930,0,1,bebf9293a42fa449ae37873b0e1ba338cac183e3cad2c12573185d497f4918aa,2025-04-21T19:15:19.330000
|
||||
CVE-2025-22931,0,1,71f3a6eb5c581b685aff779ce197805dc8c43730694f34cf23a7c2631f50ba75,2025-04-21T19:15:19.470000
|
||||
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
|
||||
CVE-2025-22937,0,0,f00870f4d203419cdb8a8e3de1c22c7cf9a24252b600302e8d300037c02ec333,2025-04-01T20:26:30.593000
|
||||
CVE-2025-22938,0,0,e6807abe137e5b2b47b5ff4158bb661bb62a642f14207093ac8ab436303894a4,2025-04-01T20:26:22.890000
|
||||
@ -284678,7 +284679,7 @@ CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8
|
||||
CVE-2025-22978,0,0,fc5fcf58c4e702608b423ebabadfcaeec74a25a8d688d69960a7fd8462f67df9,2025-03-13T15:15:52.690000
|
||||
CVE-2025-2298,0,0,d4a0f8d3e196f529d7b4528b550eca71b2dacecaf55e035c556a0125ad81f199,2025-04-21T15:16:00.487000
|
||||
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
|
||||
CVE-2025-22983,0,1,b7728801228a0c4341a778d6889bd261ea2ed54cff3f0e470feb58029628f156,2025-04-21T17:05:08.097000
|
||||
CVE-2025-22983,0,0,b7728801228a0c4341a778d6889bd261ea2ed54cff3f0e470feb58029628f156,2025-04-21T17:05:08.097000
|
||||
CVE-2025-22984,0,0,18fe379899d6b594231ed65cfa5066d6988b73d940081f95379b94407f66bd3f,2025-04-18T19:20:43.170000
|
||||
CVE-2025-2299,0,0,3519f54924774d143243ce7e7a2db7c0a845e504fb073e5f0172a4ce07b4e076,2025-04-07T14:18:34.453000
|
||||
CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000
|
||||
@ -284792,7 +284793,7 @@ CVE-2025-23137,0,0,92cbf64b8218b82a85e7535779b559e6c67e4c41435217e95ced45b9cbad6
|
||||
CVE-2025-23138,0,0,ae9cd5fe4206362aca010712a1563b5126e72c93b934fdcf69571567f32e5d7a,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2314,0,0,da0d16bd7cdf67126af9cb8b7b9eae653178ef2aa94ef32791352e7cdd49eda9,2025-04-16T13:25:37.340000
|
||||
CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000
|
||||
CVE-2025-23174,1,1,dc5a1ad5db1d480f032659c0d01a9f11532250706a273391a7c2a34510239677,2025-04-21T17:15:23.270000
|
||||
CVE-2025-23174,0,0,dc5a1ad5db1d480f032659c0d01a9f11532250706a273391a7c2a34510239677,2025-04-21T17:15:23.270000
|
||||
CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000
|
||||
CVE-2025-23185,0,0,6a8fc3993811d2ce0c7ae31663c2f10b11720d00b7d18acd6d25289de30c4360,2025-03-11T01:15:34.330000
|
||||
CVE-2025-23186,0,0,e24ff484abfeac0347aa2108d965b5fa2efbb5bbd9e6a6775e16a55a54369d2e,2025-04-08T18:13:53.347000
|
||||
@ -285834,8 +285835,8 @@ CVE-2025-24442,0,0,a8f66209dff397fff7f7fdf29f96f82075d9a60307fa72b99b6f3e7ee385a
|
||||
CVE-2025-24443,0,0,515cbf5c59e8e9d3503f6636ae76701d9f01eb2ac535386d5a90cae65bc4ca70,2025-04-01T19:23:33.860000
|
||||
CVE-2025-24444,0,0,647636ffe7ff72b15983b0abc2a3e4aab7b2deed062acf0eb294c895b2d1ae65,2025-04-01T19:23:15.063000
|
||||
CVE-2025-24445,0,0,642582fb1e4e4925eb11b91795bfa62bd7866c6426ae815f76e6742aab043e8a,2025-04-01T19:23:11.093000
|
||||
CVE-2025-24446,0,0,a4fe404387dba71ed3f0c62960507d584f6dcda36a8b63cdb5908f4257c87f54,2025-04-18T18:15:43.913000
|
||||
CVE-2025-24447,0,0,0d84f0637454e33a7dbd94ec90567c93f4a5cc2af7d22b9279abc8353c58c728,2025-04-18T18:15:44.503000
|
||||
CVE-2025-24446,0,1,8ea458277fc1e7e25b9d0aa08c82bc40bcad7fd97ededd768acf080a5620b90d,2025-04-21T18:40:25.117000
|
||||
CVE-2025-24447,0,1,5adcd9efb4ed960f63ff0c4020debab0cc14bc27dbc5f10210b603dd8e1dd066,2025-04-21T18:39:51.087000
|
||||
CVE-2025-24448,0,0,92fe73012e725b49bd396375c68a68d8b9ed29c7a5ac564ca7f989860080ec5e,2025-03-11T18:15:31.543000
|
||||
CVE-2025-24449,0,0,ec7bf425be00a5e3f888baa83e1ed5df8dbc232fae8233f3f93c333265e574e9,2025-03-11T18:15:31.700000
|
||||
CVE-2025-24450,0,0,5b1b1327e79d552b1c3e074d0e7a479c30936e0b2ecca41c44335dc5b168c846,2025-04-18T14:52:45.263000
|
||||
@ -286446,7 +286447,7 @@ CVE-2025-25226,0,0,c1d011e8e7ba6b6c9f469aa960fb7064e4361a6d4416d3477e347671e561c
|
||||
CVE-2025-25227,0,0,14dde9d48b40850eb1a2d705436b8ead1fc46d2a4e1905b71e2c6de779c3c0c1,2025-04-08T19:15:47.290000
|
||||
CVE-2025-25228,0,0,7abfa4973b568cc3d343b0862129d7fc50b49705070206045cebff01f85ede31,2025-04-21T14:23:45.950000
|
||||
CVE-2025-25230,0,0,eda7bae587038dbe737ac1b58819171e7e8c749a5fc4be7c7065ace452922ddd,2025-04-17T20:21:48.243000
|
||||
CVE-2025-25234,0,0,2b419c514ffa3511f89b28f3b386b39aa9cbefcbe4ffcb4b71f0eba868616331,2025-04-17T20:21:48.243000
|
||||
CVE-2025-25234,0,1,26b863422c4d0e43f33b733e614cf16546d205c05bf67032461c649336371231,2025-04-21T18:35:58.613000
|
||||
CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000
|
||||
CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000
|
||||
CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000
|
||||
@ -287378,6 +287379,7 @@ CVE-2025-27082,0,0,ffb20ffa027c4bd1d4d43e108dc1329f65254792bdc60837334e2fed50c76
|
||||
CVE-2025-27083,0,0,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000
|
||||
CVE-2025-27084,0,0,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000
|
||||
CVE-2025-27085,0,0,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000
|
||||
CVE-2025-27086,1,1,362c93b38b6897a75d4dab2bc7ba37843833b6fa3ae1c07f1c4619ab81ab1b3d,2025-04-21T19:15:19.620000
|
||||
CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000
|
||||
CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000
|
||||
CVE-2025-2709,0,0,d6cc52b54cf9fe42db12e08a6931ac595590cbc41e2b6527b80a4b65b7cd7d63,2025-03-27T16:45:46.410000
|
||||
@ -287970,10 +287972,12 @@ CVE-2025-28093,0,0,29a5b3080e3cbf963755de2e44da431efef91255ecccdc5fdce85267962b8
|
||||
CVE-2025-28094,0,0,43b699593b6066edfc5dc99b07a87e6aa9cb43db61462f8282257bc196f89aa1,2025-04-07T14:09:44.973000
|
||||
CVE-2025-28096,0,0,35d4134d78905af0129462be767cef757b9b22ca399b6d6ee9e18c61774ffdf3,2025-04-07T14:00:57.987000
|
||||
CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287f26,2025-04-07T13:59:18.590000
|
||||
CVE-2025-28099,1,1,d305f54ad22c777925244afad830b6e67d3c018927fde5e666d6b4a984d0e752,2025-04-21T17:15:23.550000
|
||||
CVE-2025-28099,0,0,d305f54ad22c777925244afad830b6e67d3c018927fde5e666d6b4a984d0e752,2025-04-21T17:15:23.550000
|
||||
CVE-2025-28100,0,0,9b09b356a2cedf949e17313ef03a02d42355601fc07f89affd6048aa7c2a7c99,2025-04-16T15:16:09.603000
|
||||
CVE-2025-28101,0,0,489b26b660b050a1c0dea693146530135ebdd1bc68a40e6150ee9dcaeea59544,2025-04-17T20:21:05.203000
|
||||
CVE-2025-28102,1,1,023a7673a055ab1984733096d8a968c7880e3a486ca827acced2bb88d13177e0,2025-04-21T17:15:23.710000
|
||||
CVE-2025-28102,0,1,660980f05ab6f6a4ccd2d44ad396838161046a7af7197b2236aa50e5004a23cb,2025-04-21T18:15:22.060000
|
||||
CVE-2025-28103,1,1,6ad44c119b2f2d0cfa0bb91cc2590584ad6ab1f07c70c3952afd0121a4a0acc9,2025-04-21T18:15:22.353000
|
||||
CVE-2025-28104,1,1,e1c3c909950ab9392bafe3c3bbcbcdce4cb6e0739af5d6c67f03e5bccab70e89,2025-04-21T18:15:22.520000
|
||||
CVE-2025-28121,0,0,85d6b1beac05bbab781ecb5b5d93f394fb64ceace97699255164dcbcbe932598,2025-04-21T15:15:59.750000
|
||||
CVE-2025-28131,0,0,0e6d437e3a9f63309173cfffb683667f8de949bf1baa410130154ac2738212a3,2025-04-01T20:26:01.990000
|
||||
CVE-2025-28132,0,0,97b47f11d67eb8801e01a6ba8c51fcb6171d404dc753f2ff5e62dc9c1e96c78b,2025-04-01T20:26:01.990000
|
||||
@ -287992,9 +287996,9 @@ CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964d
|
||||
CVE-2025-28197,0,0,f708019a12f8f602fc9ff581bb4127f03829b50e76b6ecedec54a362163c790e,2025-04-21T14:23:45.950000
|
||||
CVE-2025-28198,0,0,6f1341fc6b693ef754968d5d7823e6e3077e6e0e9d40d3a0c80f3a24c72b5647,2025-04-15T20:15:38.833000
|
||||
CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28219,0,0,e1b7ad511688218627fda313274ae55255c2e072edd5fc05ac0a78cadb7afbe1,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28220,0,0,e2a4aa55d41a566e121997f5f817f2ed5c08f118dc84aa5a5b7b6f9f16b7a36e,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28221,0,0,1cdeba30d62084850cf0d8eff272f185c9ba4c18571670ea23e9f95692731583,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28219,0,1,ec028a36263bbd1ae74e67661a16435fa8f188c14a8af517a9060f482a1d7fc7,2025-04-21T19:15:19.700000
|
||||
CVE-2025-28220,0,1,8ea849100de99eadf0f1f692eee281fe3ae88b76d5aa3b6cb7e191d33a52a747,2025-04-21T19:15:19.847000
|
||||
CVE-2025-28221,0,1,d9630d7d28086bc60cc43c1fe3942fba3a71b31ee46def7c504260d5a91ab975,2025-04-21T19:15:19.973000
|
||||
CVE-2025-28228,0,0,5d8e0bbabec06b95fd89f034c06b8c9c86f4bf4bbfc59e1ea68c98dffd7bb2ea,2025-04-21T14:23:45.950000
|
||||
CVE-2025-28229,0,0,a6fbda22c58add386416a38340baa71643d5a2e00a94925075f5efa0d90b44bb,2025-04-21T14:23:45.950000
|
||||
CVE-2025-28230,0,0,ff4d6ea2d32c6d72239ae60525fabf6394b2f78866524be8b12143e0b3341558,2025-04-21T14:23:45.950000
|
||||
@ -288019,7 +288023,7 @@ CVE-2025-2835,0,0,f8c0fd9595480681bd283ae5c205524a5787cd2cba5ce2f877a12280939c81
|
||||
CVE-2025-28355,0,0,bd8de930b23f6184ab39d0c81e4ee9cdd924adbcf0d121098e5d134a3a60799c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000
|
||||
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
|
||||
CVE-2025-28367,1,1,f4622890a6e2177cbcbd53f4213304d59b6c0d2acdfc9dc1a0a7bf5c7a4c62c3,2025-04-21T16:15:54.373000
|
||||
CVE-2025-28367,0,0,f4622890a6e2177cbcbd53f4213304d59b6c0d2acdfc9dc1a0a7bf5c7a4c62c3,2025-04-21T16:15:54.373000
|
||||
CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000
|
||||
@ -288166,7 +288170,7 @@ CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630
|
||||
CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000
|
||||
CVE-2025-2901,0,0,7945b2fda0703ed54bbe3617c5290b84173e50497fd12854a07978736660a0d3,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29015,0,0,947b6761331a0ca3f6837d7b382ade01f4b10c5f252bd6a2ef8d3e5a616719dd,2025-04-17T20:21:48.243000
|
||||
CVE-2025-29015,0,1,2c89624cc8d923634cb63c498a89bf9957e35c30cdd388a3e6553d139f4ea18c,2025-04-21T18:30:44.360000
|
||||
CVE-2025-29017,0,0,fcdc2bda716f0198a20b6a65b55bc529c802c940b53ac9e01091e6d99d68c1b3,2025-04-11T15:39:52.920000
|
||||
CVE-2025-29018,0,0,8d26b6586ec3863f77672e39be7a64ebfc60090652addaa79261b2334909bfa1,2025-04-11T15:40:10.277000
|
||||
CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000
|
||||
@ -288177,12 +288181,12 @@ CVE-2025-29032,0,0,12b1441dc9358c5c16def012730045c4192ae6bcec0473634ec29643cb183
|
||||
CVE-2025-29033,0,0,5eca366ad2f6b7bc48c9c10555d9d4de9f98752ea608be3c325a7269b2a18fae,2025-04-04T21:15:44.653000
|
||||
CVE-2025-29036,0,0,1cfdba0275e788d67daeea9f29674422f2b95f026fe7bf91e23dbade8cbd52ae,2025-04-04T21:15:44.813000
|
||||
CVE-2025-29039,0,0,b32289642d071875cb3c13f9efdf28132906dfe69bb2dfbe7eeacd864c8c84db,2025-04-17T20:21:05.203000
|
||||
CVE-2025-29040,0,0,488fd0520e233cd8bf0c9b43d7d64e8018d939159cb73a9b33115eb4e7402840,2025-04-18T16:15:20.630000
|
||||
CVE-2025-29041,0,0,5c61e103864da820012246be4e4bb4715eda66103c691af2c0723545c2024f49,2025-04-18T16:15:20.820000
|
||||
CVE-2025-29040,0,1,57625b5e42d00cbd04a5764e44d05539c18c290bc43520734a4d2e658571a595,2025-04-21T18:39:38.827000
|
||||
CVE-2025-29041,0,1,bd7db5b7de77a59647c97fdc9bc554313f26290ba15eee841ea20241c08134f1,2025-04-21T18:40:47.357000
|
||||
CVE-2025-29042,0,0,86e07079a3646e18dbe29a53dd411cab917eca3116e5185cdd453cd1e5bd9cbc,2025-04-18T15:15:58.490000
|
||||
CVE-2025-29043,0,0,b2badcd7ca4534f7daf133c1393a280c57ce6650ebbf8cb0f64a591389c969ae,2025-04-18T16:15:21.013000
|
||||
CVE-2025-29044,0,0,65f02eb108acb32c67584a7b45996125d07f8771ab4aaaa32a887874ae0e78e7,2025-04-18T13:15:57.460000
|
||||
CVE-2025-29045,0,0,090c3e96b99d9f1ab70ff9b689049ccda9fa971c4f9a3d1da9c7bf0e8047448c,2025-04-18T13:15:57.650000
|
||||
CVE-2025-29044,0,1,97c1f84201c58c1cd211c59dd61961380f9d3f314950e59244831d0ef457598e,2025-04-21T18:42:48.887000
|
||||
CVE-2025-29045,0,1,1963dc8d4038da2fbcb2fba081a2d74132412c687c5a7af4af339558b443c2d6,2025-04-21T18:47:56.740000
|
||||
CVE-2025-29046,0,0,b7ee5cb392ebd408b1b6286a1320dff309770773e41a50e962ca316924d92804,2025-04-18T13:15:57.827000
|
||||
CVE-2025-29047,0,0,076f84d8bd59a653a39e66671e4a2349aadc2c3d4b6f78b21110fe2564e902fb,2025-04-18T13:15:58
|
||||
CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000
|
||||
@ -288281,16 +288285,16 @@ CVE-2025-29427,0,0,07ee5814d6003bbfc3b892dff3a3b805bdda22bdc2e2b5147b08dff3b1ac0
|
||||
CVE-2025-29429,0,0,70ed76e22abf856ea286be6fccfd66e6102b6f8a8d8567a46ea60e2a92631a4a,2025-03-25T18:46:50.230000
|
||||
CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b283a,2025-03-25T18:44:43.817000
|
||||
CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade5e5,2025-04-02T12:30:59.763000
|
||||
CVE-2025-29446,1,1,62c3102a3a184ab99454393479f3e41a96ce35d8521833eae7621daecb81258e,2025-04-21T17:15:23.883000
|
||||
CVE-2025-29446,0,0,62c3102a3a184ab99454393479f3e41a96ce35d8521833eae7621daecb81258e,2025-04-21T17:15:23.883000
|
||||
CVE-2025-29449,0,0,a2cadce729af0b7127976e213938c99779278f29d317dae356b56942f702f3e4,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2945,0,0,5701c477425c2a81bc66d944f3bb97a7255b4c935bf92c67bb01910b6829ab38,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29450,0,0,5fee505020d6cf44cb473b1c323bea1f18eba5c04dbcaa5a3571bb7abd0b3f04,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29451,0,0,dc905f8f2faaacb5b1ba668d68597ec56cfe8a88b1c9446c9df950f57c3d7338,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29452,0,0,3e2bf9b5272e1f6118d02ec668ba4f9a070edf12a04d6f55092eef22de91da51,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29453,0,0,4fff401f3f841653dfbe6421d07a8ff4a908aa4bff2a06986eda3016e3a5ceae,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29454,0,0,307a6f2b0ea41c08363f4dbbeb231ef5ac77fe46221eae856a7930f7744895e2,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29455,0,0,2a349b9577bc4d5be5331a9a7d1a5cd4f9dc01077273688088faa343c3629db1,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29456,0,0,40ebea57f5b14a2506023a4c2de2952437c48a105c8482b4892693c84e0b3532,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29453,0,1,c068d33b8e8567ffca6045d5128a1e96f026da2aa7c70fc654f20dc0b5cb4199,2025-04-21T18:15:22.700000
|
||||
CVE-2025-29454,0,1,ff05caddca2ca0082da19f60e27a04a1fc51585ee5239e7e887b999c8d7633ba,2025-04-21T18:15:22.920000
|
||||
CVE-2025-29455,0,1,067acefdfbd5c32f51c0a7955c563a86b7d376ef2675d14a6fcfec63e58e4233,2025-04-21T18:15:23.093000
|
||||
CVE-2025-29456,0,1,2d140b3a9ae2c009763bb02e6734464479f10b399501bef5b1c505c10d8764c4,2025-04-21T18:15:23.260000
|
||||
CVE-2025-29457,0,0,c4da2af5176a35a307224f1ad9fda4e236e5ada2e6c35133e6b07e8d9ec347c1,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29458,0,0,eb15ca430178c3108ab78f2fbfe45677a4e6807432a2205e2e5b166b08559e80,2025-04-21T14:23:45.950000
|
||||
CVE-2025-29459,0,0,3f97edca86bb8d024d7a812a65ec90ed609911b982d73286b6a0adc440e328d1,2025-04-21T14:23:45.950000
|
||||
@ -288362,10 +288366,10 @@ CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156
|
||||
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
|
||||
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
|
||||
CVE-2025-29705,0,0,79480ea1fb44f7ac6bf03085d304cf2db7e965c42d01c826448e7efc1c42ff27,2025-04-15T19:16:07.783000
|
||||
CVE-2025-29708,0,0,bc17e7fe3cc39727d4796da758592d4705461df2d4e9f4b634723d5114748659,2025-04-17T20:21:48.243000
|
||||
CVE-2025-29709,0,0,eee93decb4f480e5a919f7c4700d8e8f4b071ef0ce0c937136c479c61b8c0708,2025-04-17T20:21:48.243000
|
||||
CVE-2025-29708,0,1,1b7086954573b3ec6de397a2a3e5ae486cab9ecf726889b0e8d42388a25c45c4,2025-04-21T18:25:05.200000
|
||||
CVE-2025-29709,0,1,6190357187fb4a646843a08945f56abe2de5681f7365c24acd1f440dc6876ab2,2025-04-21T18:26:07.120000
|
||||
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
|
||||
CVE-2025-29710,0,0,57ce454dd62a1e6387ea6dd83bec7889440b3a1463ef64f9a5984eeab9c95e8a,2025-04-18T12:15:15.203000
|
||||
CVE-2025-29710,0,1,86cf073d869355db163f15f161dd067d170fdd7cbe784c8ffb472580fe5412e7,2025-04-21T18:29:36.790000
|
||||
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
|
||||
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
|
||||
CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000
|
||||
@ -288625,19 +288629,19 @@ CVE-2025-3027,0,0,f3696c958664e9365e1d42a21589288938608fca603179f411c899cdda3285
|
||||
CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000
|
||||
CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000
|
||||
CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30282,0,0,e7c90b7b1637df22a271845bf16d7468776c5ee9ba655d9aef717d241a9bb047,2025-04-18T18:15:49.340000
|
||||
CVE-2025-30284,0,0,36bdc794e57961e52464869ac31c19b3766f1f130569a52c7daddf2314683907,2025-04-18T18:15:49.690000
|
||||
CVE-2025-30285,0,0,93368da6bc9487399fe3b2359354a0fbc8eabf4867b1272bfbb786f648d207c0,2025-04-18T18:15:50.150000
|
||||
CVE-2025-30286,0,0,729b7cdb3f98c2541d66aa71c3da2757f78f611314124c611b01e7a4e5018135,2025-04-18T18:15:50.587000
|
||||
CVE-2025-30287,0,0,464c7a767fa623b5e01dec112e6f2f837fa8fcfc0effd249431c36d746b726c6,2025-04-18T18:15:51.050000
|
||||
CVE-2025-30288,0,0,eba94376c59ce435183d52966854f8bed66805a0e547c0a93ec47250d137014b,2025-04-18T18:15:51.563000
|
||||
CVE-2025-30289,0,0,f08776ca248b8e0c1d017b6bb72127505bd62102cc2b5b7ad64b45203a6eaa41,2025-04-18T18:15:52.200000
|
||||
CVE-2025-30282,0,1,a236c9f699f960a3305e303314e525a837939f448444d5c698d756a533e920a5,2025-04-21T18:39:25.590000
|
||||
CVE-2025-30284,0,1,4ad47396c44c4e0a1040924e32628b5cf5c80cd7b4f968b5ce9dbb6a3cd2a67c,2025-04-21T18:38:24.560000
|
||||
CVE-2025-30285,0,1,d9795ab15e3963534dad961d8eca90ef1d9e678b18ecac83eddba2e5cc291780,2025-04-21T18:38:08.320000
|
||||
CVE-2025-30286,0,1,d9a013531986958cc55d987a3ca49ad506c998b948798d8ad178a45e7cf8f371,2025-04-21T18:38:02.763000
|
||||
CVE-2025-30287,0,1,cfba5e30d00b0ea1f9e3186daae1e06e7a41e02e3eff9eb946dfb1e9f63fde59,2025-04-21T18:37:56.057000
|
||||
CVE-2025-30288,0,1,7ebda2759f8e697945c0209a13ef42324b103f6e936b296d6ab17084cc79ec3a,2025-04-21T18:33:41.280000
|
||||
CVE-2025-30289,0,1,ac5a40b2601be14e5abf85e8efe32432c7f1053bd10f568bd6d660b99703031d,2025-04-21T18:33:09.217000
|
||||
CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000
|
||||
CVE-2025-30290,0,0,6f893833437291deb8fbb2322de2982f9eef638dfc164661994353e52e717a27,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30291,0,0,0def522f8ca63a86275e643442adf82bdcb710b0109e10f419ed0f6c1f42eca2,2025-04-18T18:15:52.673000
|
||||
CVE-2025-30291,0,1,0c6ed0811056cacd99d9c6197839316b5d895bab1a16f448bf4091054f02bc12,2025-04-21T18:32:52.167000
|
||||
CVE-2025-30292,0,0,3e4f7c22f08308c313ba2352bafd20592d5f6ffab99962cdfee668ba5f921588,2025-04-14T15:57:32.107000
|
||||
CVE-2025-30293,0,0,11a1e7ef21d347139ac78c162b41890990e643aa8effe0e7da17bc5740fee788,2025-04-18T18:15:53.157000
|
||||
CVE-2025-30294,0,0,a210b0710fedd948d450f0f90034d51e5f35789f4e5fb83cc6173a0a84b0cc09,2025-04-18T19:15:46.087000
|
||||
CVE-2025-30293,0,1,0a67e32c0cceae33f8c0206da1ab6856527bd4b635f1ab88551bfa3c3ba00cb7,2025-04-21T18:39:13.447000
|
||||
CVE-2025-30294,0,1,b811b9abb6f15a1021e7b2e87d479489ef5a505aa600937114265becaeda02af,2025-04-21T18:38:58.610000
|
||||
CVE-2025-30295,0,0,f9715dda41732cbea73f78831ea3f3546168bdd32389dc9dc90de8c1c8e02eae,2025-04-11T12:49:05.523000
|
||||
CVE-2025-30296,0,0,d7e73be7425b9e4e00a6b9dff79676441c0907a978176fbd95fd7d3793c06947,2025-04-11T12:48:57.520000
|
||||
CVE-2025-30297,0,0,956e4e25be750755bccfd8faa4814a05be03e3044492c2467838e4b6ff2f0ef2,2025-04-11T12:48:50.323000
|
||||
@ -288888,34 +288892,34 @@ CVE-2025-30676,0,0,3618fe5a6089abc583fb31a08c91023b12e5244f7fc8c4ee57938af3163af
|
||||
CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000
|
||||
CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000
|
||||
CVE-2025-30681,0,0,eaa2286741593822874a18b32f2f10003fae7ebcc47ac942920fa35f9466e8e5,2025-04-17T21:38:58.033000
|
||||
CVE-2025-30682,0,0,b1371db17b7dc8d49d50245d968fc683cc5c767f96ebb0233639a522d1c52d61,2025-04-16T20:15:18.057000
|
||||
CVE-2025-30683,0,0,6064d415556206dffcbb41ae1da7f86a1d35e1385bfd39748dbdb904f09b96a6,2025-04-16T19:15:54.427000
|
||||
CVE-2025-30684,0,0,608b5f657b2de4f7393c932843e620e3edc60f7c9365b409f920fead0a37fd15,2025-04-16T18:16:05.883000
|
||||
CVE-2025-30685,0,0,b11ad9fe469b2e477ef6f442fb9ad983947cfbc2eea7daf5b8990f68288fdb15,2025-04-16T16:15:32.263000
|
||||
CVE-2025-30686,0,0,eb9a0f3bb8b5e243b6ff4c3ed023de2c4e708798a2d1ad3b039622751c553c0b,2025-04-16T16:15:32.373000
|
||||
CVE-2025-30687,0,0,b15a1eff42e8c0e891cfc7b51126ed0042d2b00d02f6b1cda938f30270ce915a,2025-04-16T16:15:32.480000
|
||||
CVE-2025-30688,0,0,414e5be9b8253e04e708b7be5ab71dc18a9e7c4098cb7160d0274874877532ad,2025-04-16T16:15:32.590000
|
||||
CVE-2025-30682,0,1,4941976c32cad26abbd3152db3ac333e1fb93c48ab55e43349750b0e7dfdcd72,2025-04-21T19:47:25
|
||||
CVE-2025-30683,0,1,466eccacfb2f5e2ba317bf4e51419d37cb0d75bf3e8394802d432b1ba20bd03f,2025-04-21T19:47:43.733000
|
||||
CVE-2025-30684,0,1,ca9c29b12a59084ae7ec919ba2c64507981481f540767abab02a6b9eea9739b7,2025-04-21T19:47:51.533000
|
||||
CVE-2025-30685,0,1,dc0ce1e0756aa3409fca7866494ec044a08eddbdfae0c145771ac333d742cc38,2025-04-21T19:33:19.260000
|
||||
CVE-2025-30686,0,1,32322873e1c9e86dd29bc9fba6c41e73fbb6fa899c589ad296da7827859ead87,2025-04-21T19:37:30.357000
|
||||
CVE-2025-30687,0,1,a3679a0ed0be9f01fd8e845bcca191aef65e207f1b8dea6573aa33f8f1985c2d,2025-04-21T19:38:21.510000
|
||||
CVE-2025-30688,0,1,e0039a96b24222011d19680e93847030aed7c69a52878c736cade7adf32c98a8,2025-04-21T19:38:32.510000
|
||||
CVE-2025-30689,0,0,3f84344cb8266295cc7369c2f3ec737d8e52432c06ad5a1f1379ce1534c49faf,2025-04-16T16:15:32.707000
|
||||
CVE-2025-3069,0,0,c275422f91841fbe2892e1b63afd1da88d5376102ceba230e87a55bfbdd7bb13,2025-04-07T13:28:15.670000
|
||||
CVE-2025-30690,0,0,917158df2f0cd108363ac9d8cc3bade204129e43a71903793648e3489f35796b,2025-04-16T16:15:32.830000
|
||||
CVE-2025-30691,0,0,67cf474c4a96a2400f2c4d882c53bd45865b49ae3e01d4a99f91b5599c92bfc7,2025-04-19T01:15:44.850000
|
||||
CVE-2025-30692,0,0,3161b1f45cecc0a3afa599c1e2826c52f9889c53e2e1e051bcda24c2c2b8b347,2025-04-16T16:15:33.047000
|
||||
CVE-2025-30693,0,0,75f314d64704b70bf300b7ed3580bcd4d63da3c4e153b93bab0afaa3cf1d9920,2025-04-16T16:15:33.170000
|
||||
CVE-2025-30694,0,0,03a0d9058754ea7b6160f9250e75342142e82ea608f4f5e80226a2ba38b8c46e,2025-04-16T20:15:18.170000
|
||||
CVE-2025-30695,0,0,74a6f59d303af5bdd2cd42bac20b10c31db9ae0de472dbae7494e7ad28e300af,2025-04-16T20:15:18.283000
|
||||
CVE-2025-30694,0,1,6033dcd3c9846d1bb74c4a07883f25c5d74b8d9a55a249e62cc442d69d8fce0e,2025-04-21T19:38:43.103000
|
||||
CVE-2025-30695,0,1,5fba14218426189adda590f15d0122cf1dbd946502a286911a281d2bed3e8a6e,2025-04-21T19:38:53.270000
|
||||
CVE-2025-30696,0,0,2f823080fbe70fb899d8f476b24ec728b0cc68b2de13d0cea5269a793f1e80e3,2025-04-16T16:15:33.283000
|
||||
CVE-2025-30697,0,0,d4d2f532f502cccb578c6b647cf5081cfb8113ce2bc18f22a65fd9d65272b248,2025-04-16T20:15:18.393000
|
||||
CVE-2025-30697,0,1,a04442b21f3583954de6b483c23bd0cb73d0964c297d9b031019cd3b056089a0,2025-04-21T19:25:34.773000
|
||||
CVE-2025-30698,0,0,d56dca45d078d76f5d72feda9ab395b5371098d0c49728414c69bb5eb5f5c024,2025-04-16T16:15:33.397000
|
||||
CVE-2025-30699,0,0,634bee141f64c4e46eb16dab0020f40ee7295d0d4ba52fe341bcf58def5e4426,2025-04-16T20:15:18.507000
|
||||
CVE-2025-30699,0,1,a6f17e4249e1839238e73c21f99208e5f79f97a5ffc288cf914dfe1061c2a6bf,2025-04-21T19:25:44.283000
|
||||
CVE-2025-3070,0,0,a7956d0e93eb599b6cd73f2cfc24da6544c999271b27f11675990b198ceb0374,2025-04-07T13:28:06.423000
|
||||
CVE-2025-30700,0,0,f05eff4dca786784079e80fa4b65245e9eeae2c62991d5b96cc78d55c03a6456,2025-04-16T20:15:18.620000
|
||||
CVE-2025-30701,0,0,f834bc35a70666309b22b580c19b3fedc6cd7e72467328f69c4dbedf0021857e,2025-04-16T15:16:10.393000
|
||||
CVE-2025-30700,0,1,869756745f3e780132ca0f13375fbdf49746475082d8396b228b05100f1a96bc,2025-04-21T19:26:03.440000
|
||||
CVE-2025-30701,0,1,605f52d6d789fd48f8e03984f8ddfdda8e72d048a2f4ce37dfca26bc5b0c2b71,2025-04-21T19:26:34.843000
|
||||
CVE-2025-30702,0,0,fbbb3529125ee7f480b561c7f625e65fd79b1b002116c7b940e7a2947e594f97,2025-04-17T18:15:50.330000
|
||||
CVE-2025-30703,0,0,c803bf44c0ed641b56d74dd20d328199af57c5d15d5ca1baa2dc413111f31914,2025-04-16T15:16:10.507000
|
||||
CVE-2025-30704,0,0,d177cf27777546139501a50ddd68534cdf14734dc101adbc84e5bc18b6389e34,2025-04-16T15:16:10.613000
|
||||
CVE-2025-30705,0,0,f6667f7e26f20a99b17ec80a6d41eefb2607e1750c68c291108a17333c08d887,2025-04-16T14:15:24.910000
|
||||
CVE-2025-30706,0,0,50c73e7edba5297eed007e6d95be2daa810b68d0c6555ab2f722b78e9899d90b,2025-04-19T01:15:44.957000
|
||||
CVE-2025-30707,0,0,8946d36701bd573204a5d6ac3b029cd4b37a312fb899efd5e6e64ed0a6988980,2025-04-16T20:15:18.743000
|
||||
CVE-2025-30706,0,1,60437102c43c13f71fdaf5c67ad18cf8f984bee0c4dd1fc8a1c962f3e47f2e2e,2025-04-21T19:27:55.310000
|
||||
CVE-2025-30707,0,1,49f16c2690c42393dfa0bb9fa12f27e3d898b4e59e862d4ce7318f62c5257905,2025-04-21T19:28:08.797000
|
||||
CVE-2025-30708,0,0,05c8b5119bf9fc974d02e87362473439de332bab90aaa49cca7d98085127a277,2025-04-17T18:15:50.460000
|
||||
CVE-2025-30709,0,0,f1843d6b8f12e58d00ea4b98f251a1d838203a67439fce41387e3dc69344349a,2025-04-16T20:15:18.853000
|
||||
CVE-2025-3071,0,0,2a20bfefcf33d8b74be280ee9978a6188ffab9239b4a29a3a0535ea641327a4d,2025-04-10T21:15:49.347000
|
||||
@ -288924,8 +288928,8 @@ CVE-2025-30711,0,0,1e5465f558efc4782f831dbcabf3c5891d8231c2999b8198eb1d5bb90ab63
|
||||
CVE-2025-30712,0,0,eac5b0b99e5f8b50cb56cbe2ee1e629963db68c1e9d3f1fc4db92b2affc433d4,2025-04-16T16:15:33.633000
|
||||
CVE-2025-30713,0,0,1b9f9946ae908a48170d2a70a15ad8fb04aa712960921de2c1d56c95c39b0df1,2025-04-16T16:15:33.747000
|
||||
CVE-2025-30714,0,0,cbf415177d05c07c7232326f81efe69139ef456e515033fb1d13d3f4aa55c91e,2025-04-16T16:15:33.867000
|
||||
CVE-2025-30715,0,0,06dbaf83a08007bcaa6752275816963073bf04b5168cc855791b51beadd3071c,2025-04-16T14:15:25.150000
|
||||
CVE-2025-30716,0,0,2d4a2805d11b829711e668180f9fc2b3b26cb29698e90326716858db996d62d8,2025-04-16T14:15:25.270000
|
||||
CVE-2025-30715,0,1,fc241c298aa76f1ae4724c4a07dba39929a08ad8ab55a39be61c85fa089fdd82,2025-04-21T19:54:56.163000
|
||||
CVE-2025-30716,0,1,8c057e0a6f97e872df56e90789af2bc8136509fe2d9012fa4b654cfde8696b2d,2025-04-21T19:55:07.253000
|
||||
CVE-2025-30717,0,0,20fcc5e5543aa06aae400db89ef16c93d314b5ab28af64d362ff7e07eb0d5475,2025-04-16T13:25:59.640000
|
||||
CVE-2025-30718,0,0,944202aaf21711f19fdf126642b9661d6053a49013db765ef74f18272b56a12f,2025-04-16T13:25:37.340000
|
||||
CVE-2025-30719,0,0,edab994f531ba68b03fcc013f401b3a76edb4b2ca9dfb5fdfc0fb3955a7d0db7,2025-04-16T13:25:37.340000
|
||||
@ -288934,22 +288938,22 @@ CVE-2025-30720,0,0,abf5635f797042efad8bb697933f1423e667d989a7cafdf71e570009b2139
|
||||
CVE-2025-30721,0,0,d78b8a48def3a82289cc73569b02f610ebfe04beec9740314b22fac8fe538e81,2025-04-16T13:25:37.340000
|
||||
CVE-2025-30722,0,0,d35cc7d93759fa520308fb04a5cac95b086be1d818c00c0c3566ab5bf20dddc0,2025-04-19T01:15:45.090000
|
||||
CVE-2025-30723,0,0,107e0efde3efcfbbc89ee1d8f0fb71ad136bb7dee254eee478ab3fa61fdeb765,2025-04-16T13:25:37.340000
|
||||
CVE-2025-30724,0,0,6678a71af758b441504a662ecc220072ba2db3423c0f6c35479559ac5715dd1f,2025-04-16T16:15:33.977000
|
||||
CVE-2025-30725,0,0,7d7d5a5b9200aff36decbb358c312ceb585f43b6281d734d5fea807a3d5d42fa,2025-04-16T16:15:34.090000
|
||||
CVE-2025-30726,0,0,f0749c39ee608be2ed56469de53e89acda1efcb91b0677878744d0c76bfc7399,2025-04-16T16:15:34.193000
|
||||
CVE-2025-30724,0,1,afb8fa62d5d6fcfaed8904356fb8bb347da3bfd40a8a8cc928b9b3e4f12205db,2025-04-21T19:55:24.077000
|
||||
CVE-2025-30725,0,1,4048cdf123bf3db89ba3c463e14fd40e123b4ebc18260655ef1ac1d11cd4dd77,2025-04-21T19:55:50
|
||||
CVE-2025-30726,0,1,842cc13a9eea22e6496f732a2779fe14f2464d8c9f6b853dff05d5751706abd2,2025-04-21T19:56:07.200000
|
||||
CVE-2025-30727,0,0,2c4efc7fa314f185187ce4a91069dc8a5be25b29104153b39c7e35ccff73a588,2025-04-17T18:15:50.610000
|
||||
CVE-2025-30728,0,0,30c7eea25a8d035d292411f7e6506152b3efc7ed39be46bf51b37622b303575b,2025-04-16T14:15:25.390000
|
||||
CVE-2025-30728,0,1,8c7012c8895e6c45b30ea392294a596344ede2e264e97db69868049ceee73b8a,2025-04-21T19:56:38.777000
|
||||
CVE-2025-30729,0,0,b5e64c3629564fa8323c1ea024502fe8ad8dd53e300994621cf614c261050c67,2025-04-17T18:15:50.787000
|
||||
CVE-2025-3073,0,0,bce2ed986f2ae21d18d5f5186410cf088f79bbe4407c6721e057321e1826ccaa,2025-04-15T14:15:42.760000
|
||||
CVE-2025-30730,0,0,e3885904a653cdb044331a03038d35f6278893be0a3403033fec06bc170f115f,2025-04-17T18:15:50.927000
|
||||
CVE-2025-30731,0,0,3f2fa639c1059235b17178da663e1c8c8060c4196b8b2ffbda5455c7e18209fc,2025-04-16T15:16:10.727000
|
||||
CVE-2025-30732,0,0,0b6448eb86689b8751c2e8f661375cd44d01dba247e5da2848ec09f2e6f9607c,2025-04-16T15:16:10.830000
|
||||
CVE-2025-30733,0,0,fb9405cf23b38edbe1ce8d6bf0006d904698b756849fa4fb79039d86e81f6637,2025-04-16T15:16:10.940000
|
||||
CVE-2025-30735,0,0,058dec7781d3c9bf7616df22707e0d478e1619572e1e860d1b5a0a38467fa966,2025-04-16T15:16:11.060000
|
||||
CVE-2025-30736,0,0,f4bbb11a682728e2c0135a4e3f13603fb54d8a95c78f358ac2b5369b878bef1e,2025-04-16T15:16:11.177000
|
||||
CVE-2025-30731,0,1,94f695143f1a96713e8166ceee9c986086bedd12e477a9166c8d79a7400528c3,2025-04-21T19:15:56.913000
|
||||
CVE-2025-30732,0,1,e953f31092e009c0ffa9ae0a7f93d7bd14f8568eff9ad7467456ce54a4eeab03,2025-04-21T19:16:08.687000
|
||||
CVE-2025-30733,0,1,19c88c61e73cc67f0762c9f8e63434f16c901a42a88e723239108e99875540b6,2025-04-21T19:16:19.500000
|
||||
CVE-2025-30735,0,1,ed504bbd863e9a78366547835f0106796e0d7590e273da105e08a24c5c615294,2025-04-21T19:16:40.527000
|
||||
CVE-2025-30736,0,1,921c363f95f72e1b21387d4a117decab5e3cb1f9ab1c3da16aef218190c76665,2025-04-21T19:16:54.987000
|
||||
CVE-2025-30737,0,0,5bc86acdfba00308a1fe44455ebc9c8249de2afe7326b86556cf07a4fa2c3833,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3074,0,0,e7d3ce55961824afd9abdfd5a74ccaaf2ea8bb5789b7d35c0f9cad54c0a0a62a,2025-04-15T14:15:42.900000
|
||||
CVE-2025-30740,0,0,72d0c06df17a05bbf89c64719f200e298c46260ef5520fd86da41fc6af0f19a9,2025-04-16T15:16:11.343000
|
||||
CVE-2025-30740,0,1,649bfdc7d0c205ff8732c657552259c197a456ec79c84d3774b1a6ca60c6e73d,2025-04-21T19:17:51.487000
|
||||
CVE-2025-30741,0,0,a7ba724d5523a4cf0c1b38678a2ee1b0c99bfb24f80e0249782577c8771159ad,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30742,0,0,86ca35df94be3200dc999955b93d6c2b0d3e9fbdd347944fb57613c93c49228a,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30763,0,0,8cae761cd1fe343dec958c3bde26a021d7b611e1f3fb5c049ea6e8543db73e0c,2025-03-27T16:45:27.850000
|
||||
@ -289883,7 +289887,7 @@ CVE-2025-32080,0,0,476f6d5f06fbb960cd093fb065cf3625046fd24147d1c1820490adfc187e1
|
||||
CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32093,0,0,0be67561f687e419f366910e8dba9fd229d2f66cc865d230a0136e401d9d9941,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000
|
||||
CVE-2025-32102,0,0,8e97c7b441244e9122cac90d01f2bdb89e438876ce46a80413e789134b9cc6a0,2025-04-15T18:39:27.967000
|
||||
CVE-2025-32102,0,1,04ddcda8c051f3c91aa036de5ac0a4f40a69ceb05a05dff993e29e6ac8d5767c,2025-04-21T18:15:23.430000
|
||||
CVE-2025-32103,0,0,6fe14085be008d3a16f5d06a169dc84db347b342206ef966b317449d4c4ce065,2025-04-16T15:16:12.310000
|
||||
CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000
|
||||
CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000
|
||||
@ -290099,7 +290103,7 @@ CVE-2025-32391,0,0,01a08115ae4cefd9de1b9aefec1b85980241d6513f3292da97678ea6370f6
|
||||
CVE-2025-32395,0,0,a161f016c761dba18a6390dd5da5792bac2d2e42803818db2da92c349d4b75cd,2025-04-11T15:39:52.920000
|
||||
CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32406,0,0,c67cbc23c83784ef10125f3cffbec33dfd15266df68765e80fc3a95cd3a58377,2025-04-08T18:16:08.917000
|
||||
CVE-2025-32408,0,1,946445cce03ed8bc7b3dc3beeed10aa0f56de9056743c958ab2bae4a3a0a7365,2025-04-21T17:15:24.117000
|
||||
CVE-2025-32408,0,0,946445cce03ed8bc7b3dc3beeed10aa0f56de9056743c958ab2bae4a3a0a7365,2025-04-21T17:15:24.117000
|
||||
CVE-2025-32409,0,0,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d38d1,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32413,0,0,264a0d1d6affdc64cee850b499944750da36d787f6454e6724a671c6b9cc8e84,2025-04-08T18:13:53.347000
|
||||
@ -290110,8 +290114,8 @@ CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a
|
||||
CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000
|
||||
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32431,1,1,c68861b74aa21125ea8996095b8d72703e3b0253dcd6567bfec04502847e6b36,2025-04-21T16:15:54.610000
|
||||
CVE-2025-32433,0,1,b09c31f6643195b4a1d992889b32cafe0f931f328c07138c1e538f5f63253f0e,2025-04-21T17:15:24.330000
|
||||
CVE-2025-32431,0,0,c68861b74aa21125ea8996095b8d72703e3b0253dcd6567bfec04502847e6b36,2025-04-21T16:15:54.610000
|
||||
CVE-2025-32433,0,0,b09c31f6643195b4a1d992889b32cafe0f931f328c07138c1e538f5f63253f0e,2025-04-21T17:15:24.330000
|
||||
CVE-2025-32434,0,0,3d3061039e555845c648c2cd4ddde07ee66a966a450d5d2a63cf7163cec950d6,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
|
||||
@ -290397,7 +290401,7 @@ CVE-2025-32789,0,0,2952171685fb5c2d3074478674ee27ef5c899b291b8ac46afb990284dbcbf
|
||||
CVE-2025-32790,0,0,d2afc4f20ddfe023e3c63f095880e030d3d9c60e7e6faa272a6018a16335e1d4,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32791,0,0,3e0fc58b653e9190a6f9caa237bd24767f5e47a0c987ac6c95d523951bbf37c1,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32792,0,0,5617465372754753e6f838bd9a5e8e1789ad8b344ec076ba7e3dadb68ae93bcb,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32793,1,1,c3942ccd61d628ca5c66aacc768ff8ef79f02ba8717ae92200a348855a6a51e0,2025-04-21T16:15:54.753000
|
||||
CVE-2025-32793,0,0,c3942ccd61d628ca5c66aacc768ff8ef79f02ba8717ae92200a348855a6a51e0,2025-04-21T16:15:54.753000
|
||||
CVE-2025-32795,0,0,ada1e048127459bcd3b5b8388d73b0903e52152ee697b61012cd44ac43593444,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32796,0,0,7063247346e35cdf876bedb612e1538faf0ad59442fef757f429e4c0debc5ad1,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000
|
||||
@ -290809,7 +290813,7 @@ CVE-2025-3837,0,0,9d2632751bbea9085621542962290423f86ded728e775e6f66cd65e68fa001
|
||||
CVE-2025-3838,0,0,7ee01d7225be3424548bdf053aee8ac4d27b7f8532bfc955591b4471c7d20b3f,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3840,0,0,bbc382c2e456ea2b19d742b9c2e4628cfae75e7af21166f7ab38a675161c99b0,2025-04-21T14:23:45.950000
|
||||
CVE-2025-38479,0,0,a2b90799a09f2b7e52ed1787c3494708d7e13fc4455320246b953d2a3bbf149e,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3857,1,1,51449bd38475a3b17060ab26660c1388ea275f57bf7d679c955fccd3040afb55,2025-04-21T16:15:54.907000
|
||||
CVE-2025-3857,0,0,51449bd38475a3b17060ab26660c1388ea275f57bf7d679c955fccd3040afb55,2025-04-21T16:15:54.907000
|
||||
CVE-2025-38575,0,0,37c6694d45ef25fd4c01ad5e4e3652528a6a4314cc0f5e821de7a1e34897732a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-38637,0,0,3408ca2942640f2c4ef381f50af306ea1306e1fe1017c8487acb41cc78bd4e79,2025-04-21T14:23:45.950000
|
||||
CVE-2025-39414,0,0,e020c901ce5496ae3c2027d4709561be815c297893a6eaf3d7ce83f9ec5aee82,2025-04-17T20:21:05.203000
|
||||
@ -290974,9 +290978,9 @@ CVE-2025-43916,0,0,a0918e4fcfd85155cc84a0c002cea42caa7460c7ae302600ac807f2d94551
|
||||
CVE-2025-43917,0,0,a6da6bfc3cadbcc7a6cbf3afeb2fc0a25e2ed9e11222267c98dfeb29d6ae27aa,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43918,0,0,df431c31cdf40e0782077a6e97cc8e5c910a1a703e4253013e1f14e3f929ba59,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43919,0,0,86998d44c0394c5a11ab22a3a916e2d1e02798a710fcdc7abf8193e7cc8d6924,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43920,0,1,972503a140cc6a33c0f87902163632c1e9cfcd68c0de2b4328ac873809824996,2025-04-21T16:15:55.137000
|
||||
CVE-2025-43920,0,0,972503a140cc6a33c0f87902163632c1e9cfcd68c0de2b4328ac873809824996,2025-04-21T16:15:55.137000
|
||||
CVE-2025-43921,0,0,798d8b6c8eb0d7c9040162915ce26c146fd6dfacf2f7e2aafb2e83d008ba89a8,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43922,1,1,516feb36455a0e1a2efa35ad7737f78a9bef9f727b0e9864d88747403a9ad2bf,2025-04-21T17:15:24.477000
|
||||
CVE-2025-43922,0,0,516feb36455a0e1a2efa35ad7737f78a9bef9f727b0e9864d88747403a9ad2bf,2025-04-21T17:15:24.477000
|
||||
CVE-2025-43928,0,0,b7794970a7fba2c780763b79d9721286996df7833aaa44dab03799762dad71a2,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43929,0,0,e0076663fee82917b88ca6036343191b89bf0552232e6455fc1d01bd7dda069c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43954,0,0,b3104df5c7f361c68b90e4402b49fd04df6de2910ea8ad25e373c2346ed8890f,2025-04-21T14:23:45.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user