mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-03-26T15:00:20.481078+00:00
This commit is contained in:
parent
f3f776cdb4
commit
516cf684d4
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38674",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:15.070",
|
||||
"lastModified": "2024-11-21T07:16:54.887",
|
||||
"lastModified": "2025-03-26T14:15:17.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38675",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:15.143",
|
||||
"lastModified": "2024-11-21T07:16:55.017",
|
||||
"lastModified": "2025-03-26T14:15:20.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38680",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:15.200",
|
||||
"lastModified": "2024-11-21T07:16:55.673",
|
||||
"lastModified": "2025-03-26T14:15:20.263",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
56
CVE-2022/CVE-2022-391xx/CVE-2022-39163.json
Normal file
56
CVE-2022/CVE-2022-391xx/CVE-2022-39163.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-39163",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-26T14:15:20.793",
|
||||
"lastModified": "2025-03-26T14:15:20.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.1.0 is vulnerable to a Client-Side Desync (CSD) attack where an attacker could exploit a desynchronized browser connection that could lead to further cross-site scripting (XSS) attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7192746",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44447",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:16.277",
|
||||
"lastModified": "2024-11-21T07:28:02.497",
|
||||
"lastModified": "2025-03-26T14:15:21.223",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4459",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:11.397",
|
||||
"lastModified": "2024-11-21T07:35:18.480",
|
||||
"lastModified": "2025-03-26T14:15:25.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45786",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-02-04T21:15:09.023",
|
||||
"lastModified": "2024-11-21T07:29:42.837",
|
||||
"lastModified": "2025-03-26T14:15:21.453",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,13 +32,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4577",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:11.530",
|
||||
"lastModified": "2024-11-21T07:35:31.770",
|
||||
"lastModified": "2025-03-26T14:15:25.800",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4674",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:11.860",
|
||||
"lastModified": "2024-11-21T07:35:42.747",
|
||||
"lastModified": "2025-03-26T14:15:25.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47326",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.153",
|
||||
"lastModified": "2024-11-21T07:31:43.450",
|
||||
"lastModified": "2025-03-26T14:15:21.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47328",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.260",
|
||||
"lastModified": "2024-11-21T07:31:44.153",
|
||||
"lastModified": "2025-03-26T14:15:21.953",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47329",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.330",
|
||||
"lastModified": "2024-11-21T07:31:44.277",
|
||||
"lastModified": "2025-03-26T14:15:22.157",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47331",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.450",
|
||||
"lastModified": "2024-11-21T07:31:44.507",
|
||||
"lastModified": "2025-03-26T14:15:22.347",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47339",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.617",
|
||||
"lastModified": "2024-11-21T07:31:45.440",
|
||||
"lastModified": "2025-03-26T14:15:22.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47341",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.680",
|
||||
"lastModified": "2024-11-21T07:31:45.663",
|
||||
"lastModified": "2025-03-26T14:15:22.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47342",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.730",
|
||||
"lastModified": "2024-11-21T07:31:45.777",
|
||||
"lastModified": "2025-03-26T14:15:22.937",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47343",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.780",
|
||||
"lastModified": "2024-11-21T07:31:45.887",
|
||||
"lastModified": "2025-03-26T14:15:23.137",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47344",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.837",
|
||||
"lastModified": "2024-11-21T07:31:46.030",
|
||||
"lastModified": "2025-03-26T14:15:23.320",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47345",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:17.897",
|
||||
"lastModified": "2024-11-21T07:31:46.170",
|
||||
"lastModified": "2025-03-26T14:15:23.523",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47357",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.273",
|
||||
"lastModified": "2024-11-21T07:31:49.133",
|
||||
"lastModified": "2025-03-26T14:15:23.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47358",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.327",
|
||||
"lastModified": "2024-11-21T07:31:49.263",
|
||||
"lastModified": "2025-03-26T14:15:23.927",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47359",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.380",
|
||||
"lastModified": "2024-11-21T07:31:49.393",
|
||||
"lastModified": "2025-03-26T14:15:24.137",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47360",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.430",
|
||||
"lastModified": "2024-11-21T07:31:49.530",
|
||||
"lastModified": "2025-03-26T14:15:24.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47361",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.480",
|
||||
"lastModified": "2024-11-21T07:31:49.657",
|
||||
"lastModified": "2025-03-26T14:15:24.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47370",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.893",
|
||||
"lastModified": "2024-11-21T07:31:50.653",
|
||||
"lastModified": "2025-03-26T14:15:24.750",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47371",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:18.950",
|
||||
"lastModified": "2024-11-21T07:31:50.767",
|
||||
"lastModified": "2025-03-26T14:15:24.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47452",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-02-12T04:15:19.107",
|
||||
"lastModified": "2024-11-21T07:31:59.453",
|
||||
"lastModified": "2025-03-26T14:15:25.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48311",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T21:15:09.587",
|
||||
"lastModified": "2024-11-21T07:33:08.447",
|
||||
"lastModified": "2025-03-26T14:15:25.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4824",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:12.303",
|
||||
"lastModified": "2024-11-21T07:36:01.127",
|
||||
"lastModified": "2025-03-26T14:15:26.187",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0144",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:13.183",
|
||||
"lastModified": "2024-11-21T07:36:38.360",
|
||||
"lastModified": "2025-03-26T14:15:26.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0178",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:13.990",
|
||||
"lastModified": "2024-11-21T07:36:41.600",
|
||||
"lastModified": "2025-03-26T14:15:26.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0282",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-06T20:15:14.240",
|
||||
"lastModified": "2024-11-21T07:36:53.393",
|
||||
"lastModified": "2025-03-26T14:15:26.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20608",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.673",
|
||||
"lastModified": "2024-11-21T07:41:13.110",
|
||||
"lastModified": "2025-03-26T14:15:26.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20609",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.720",
|
||||
"lastModified": "2024-11-21T07:41:13.240",
|
||||
"lastModified": "2025-03-26T14:15:27.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20610",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.767",
|
||||
"lastModified": "2024-11-21T07:41:13.370",
|
||||
"lastModified": "2025-03-26T14:15:27.333",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-662"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-662"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20611",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.817",
|
||||
"lastModified": "2024-11-21T07:41:13.470",
|
||||
"lastModified": "2025-03-26T14:15:27.513",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-662"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-662"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20612",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.863",
|
||||
"lastModified": "2024-11-21T07:41:13.590",
|
||||
"lastModified": "2025-03-26T14:15:27.683",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20613",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.910",
|
||||
"lastModified": "2024-11-21T07:41:13.703",
|
||||
"lastModified": "2025-03-26T14:15:27.857",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20614",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-02-06T20:15:14.957",
|
||||
"lastModified": "2024-11-21T07:41:13.817",
|
||||
"lastModified": "2025-03-26T14:15:28.053",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20854",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-02-03T19:15:13.733",
|
||||
"lastModified": "2024-11-21T07:41:42.060",
|
||||
"lastModified": "2025-03-26T14:15:28.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24198",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T15:15:10.827",
|
||||
"lastModified": "2024-11-21T07:47:34.100",
|
||||
"lastModified": "2025-03-26T14:15:28.920",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24199",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T15:15:10.917",
|
||||
"lastModified": "2024-11-21T07:47:34.253",
|
||||
"lastModified": "2025-03-26T14:15:29.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24200",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T15:15:11.007",
|
||||
"lastModified": "2024-11-21T07:47:34.410",
|
||||
"lastModified": "2025-03-26T14:15:29.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24201",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T15:15:11.097",
|
||||
"lastModified": "2024-11-21T07:47:34.573",
|
||||
"lastModified": "2025-03-26T14:15:29.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-789"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24202",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-06T15:15:11.183",
|
||||
"lastModified": "2024-11-21T07:47:34.720",
|
||||
"lastModified": "2025-03-26T14:15:29.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21031",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:18.863",
|
||||
"lastModified": "2024-11-21T08:53:39.210",
|
||||
"lastModified": "2025-03-26T14:15:30.167",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21161",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:18.930",
|
||||
"lastModified": "2024-11-21T08:53:54.160",
|
||||
"lastModified": "2025-03-26T14:15:30.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25413",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T02:15:51.307",
|
||||
"lastModified": "2025-01-13T14:34:23.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-26T14:15:30.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27793",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:02.777",
|
||||
"lastModified": "2024-12-09T19:28:03.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-26T14:15:30.717",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33305",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-02T14:15:10.023",
|
||||
"lastModified": "2024-11-21T09:16:46.857",
|
||||
"lastModified": "2025-03-26T14:15:30.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Segundo nombre\" en Crear usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37118",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-21T14:15:12.477",
|
||||
"lastModified": "2024-11-21T09:23:13.883",
|
||||
"lastModified": "2025-03-26T14:15:31.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38276",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-06-18T20:15:14.093",
|
||||
"lastModified": "2024-11-21T09:25:14.557",
|
||||
"lastModified": "2025-03-26T14:15:31.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
56
CVE-2024/CVE-2024-453xx/CVE-2024-45351.json
Normal file
56
CVE-2024/CVE-2024-453xx/CVE-2024-45351.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45351",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2025-03-26T14:15:31.457",
|
||||
"lastModified": "2025-03-26T14:15:31.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A code execution vulnerability exists in the Xiaomi Game center application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=549",
|
||||
"source": "security@xiaomi.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5690",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-06-11T13:15:50.553",
|
||||
"lastModified": "2024-11-21T09:48:10.377",
|
||||
"lastModified": "2025-03-26T14:15:31.660",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
64
CVE-2025/CVE-2025-22xx/CVE-2025-2228.json
Normal file
64
CVE-2025/CVE-2025-22xx/CVE-2025-2228.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2228",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-26T13:15:36.373",
|
||||
"lastModified": "2025-03-26T13:15:36.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Responsive Addons for Elementor \u2013 Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.8 the 'register_user' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including usernames and passwords of any users who register via the Edit Login | Registration Form widget, as long as that user opens the email notification for successful registration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/responsive-addons-for-elementor/trunk/includes/modules-manager/login-register/class-login-register.php#L369",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3261241/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/659ef2e8-589c-4901-88ce-1d674c056ece?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-232xx/CVE-2025-23203.json
Normal file
68
CVE-2025/CVE-2025-232xx/CVE-2025-23203.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-23203",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-26T14:15:32.250",
|
||||
"lastModified": "2025-03-26T14:15:32.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Icinga Director is an Icinga config deployment tool. A Security vulnerability has been found starting in version 1.0.0 and prior to 1.10.3 and 1.11.3 on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Affected endpoints include icingaweb2/director/service, if the host name is left out of the query; icingaweb2/directore/notification; icingaweb2/director/serviceset; and icingaweb2/director/scheduled-downtime. In addition, the endpoint `icingaweb2/director/services?host=filteredHostName` returns a status code 200 even though the services for the host is filtered. This in turn lets the restricted user know that the host `filteredHostName` exists even though the user is restricted from accessing it. This could again result in further exploitation of this information and data breaches. Icinga Director has patches in versions 1.10.3 and 1.11.1. If upgrading is not feasible, disable the director module for the users other than admin role for the time being."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Icinga/icingaweb2-module-director/releases/tag/v1.10.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Icinga/icingaweb2-module-director/releases/tag/v1.11.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3233-ggc5-m3qg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-248xx/CVE-2025-24808.json
Normal file
60
CVE-2025/CVE-2025-248xx/CVE-2025-24808.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-24808",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-26T14:15:32.417",
|
||||
"lastModified": "2025-03-26T14:15:32.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Discourse is an open-source discussion platform. Prior to versions 3.3.4 on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/discourse/discourse/commit/a16b2f224860f6678f89f5ffa012f0ede17e4095",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-hfcx-qjw6-573r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25193",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-10T22:15:38.450",
|
||||
"lastModified": "2025-02-21T18:15:37.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-26T13:14:32.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.1.118",
|
||||
"matchCriteriaId": "A71F5AEF-CB1E-41D1-A0D8-804DCF674542"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250221-0006/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:41.907",
|
||||
"lastModified": "2025-03-25T21:15:41.907",
|
||||
"lastModified": "2025-03-26T14:15:32.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NASA cFS (Core Flight System) Aquila is vulnerable to path traversal in the OSAL module, allowing the override of any arbitrary file on the system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NASA cFS (Core Flight System) Aquila es vulnerable a la traves\u00eda de ruta en el m\u00f3dulo OSAL, lo que permite anular cualquier archivo arbitrario en el sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25372",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.027",
|
||||
"lastModified": "2025-03-25T21:15:42.027",
|
||||
"lastModified": "2025-03-26T14:15:32.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NASA cFS (Core Flight System) Aquila is vulnerable to segmentation fault via sending a malicious telecommand to the Memory Management Module."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "NASA cFS (Core Flight System) Aquila es vulnerable a una falla de segmentaci\u00f3n al enviar un telecomando malicioso al m\u00f3dulo de administraci\u00f3n de memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.250",
|
||||
"lastModified": "2025-03-25T21:15:42.250",
|
||||
"lastModified": "2025-03-26T14:15:32.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In NASA cFS (Core Flight System) Aquila, it is possible to put the onboard software in a state that will prevent the launch of any external application, causing a platform denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En NASA cFS (Core Flight System) Aquila, es posible poner el software de a bordo en un estado que impida el lanzamiento de cualquier aplicaci\u00f3n externa, provocando una denegaci\u00f3n de servicio de la plataforma."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2654",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-23T16:15:13.840",
|
||||
"lastModified": "2025-03-24T13:15:27.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-26T14:54:37.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/services/manage_service.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester AC Repair and Services System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/services/manage_service.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,30 +144,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05923259-9480-4FD7-AE20-DCD4D8B79498"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/AC%20Repair%20and%20Services%20System%20using/SQL-4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300669",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300669",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.520013",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/AC%20Repair%20and%20Services%20System%20using/SQL-4.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2672",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-23T23:15:13.847",
|
||||
"lastModified": "2025-03-23T23:15:13.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T14:37:30.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Payroll Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_deductions.php. The manipulation of the argument bir leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /add_deductions.php. La manipulaci\u00f3n del argumento bir provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:employees_payroll_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FD87A0-67F0-4820-9BD8-9D950378A28D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FoLaJJ/cve/blob/main/sqlcve.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300689",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300689",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521243",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2673",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T00:15:12.467",
|
||||
"lastModified": "2025-03-24T00:15:12.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T14:15:40.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in code-projects Payroll Management System 1.0. Affected is an unknown function of the file /home_employee.php. The manipulation of the argument division leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Payroll Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /home_employee.php. La manipulaci\u00f3n de la divisi\u00f3n de argumentos provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:employees_payroll_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87FD87A0-67F0-4820-9BD8-9D950378A28D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FoLaJJ/cve/blob/main/xsscve.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300690",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300690",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521244",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2674",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T00:15:13.533",
|
||||
"lastModified": "2025-03-24T00:15:13.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T14:09:08.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in PHPGurukul Bank Locker Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /aboutus.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /aboutus.php. La manipulaci\u00f3n del argumento pagetitle provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,26 +144,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300691",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300691",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521441",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2675",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T01:15:16.490",
|
||||
"lastModified": "2025-03-24T01:15:16.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T14:03:31.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Bank Locker Management System 1.0. Affected by this issue is some unknown functionality of the file /add-lockertype.php. The manipulation of the argument lockerprice leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /add-lockertype.php. La manipulaci\u00f3n del argumento lockerprice provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300692",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300692",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521442",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2676",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T01:15:17.177",
|
||||
"lastModified": "2025-03-24T01:15:17.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T13:55:26.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file /add-subadmin.php. The manipulation of the argument sadminusername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Esta afecta a una parte desconocida del archivo /add-subadmin.php. La manipulaci\u00f3n del argumento sadminusername provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300693",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300693",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521443",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2677",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T02:15:15.540",
|
||||
"lastModified": "2025-03-24T02:15:15.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T13:48:38.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeidproof.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /changeidproof.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/6",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300694",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300694",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521444",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2678",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T03:15:14.573",
|
||||
"lastModified": "2025-03-24T03:15:14.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T13:42:31.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /changeimage1.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /changeimage1.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300695",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300695",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521445",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2679",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T03:15:15.553",
|
||||
"lastModified": "2025-03-24T03:15:15.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T13:35:46.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-us.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /contact-us.php. La manipulaci\u00f3n del argumento pagetitle provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,74 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/8",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300696",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300696",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521447",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2680",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-24T03:15:15.727",
|
||||
"lastModified": "2025-03-24T03:15:15.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-26T13:23:41.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edit-assign-locker.php?ltid=1. The manipulation of the argument mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /edit-assign-locker.php?ltid=1. La manipulaci\u00f3n del argumento \"mobilenumber\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,28 +142,75 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ARPANET-cyber/CVE/issues/9",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300697",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300697",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521448",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27830",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.353",
|
||||
"lastModified": "2025-03-25T21:15:42.353",
|
||||
"lastModified": "2025-03-26T14:15:33.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during serialization of DollarBlend in a font, for base/write_t1.c and psi/zfapi.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer durante la serializaci\u00f3n de DollarBlend en una fuente, para base/write_t1.c y psi/zfapi.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708241",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.467",
|
||||
"lastModified": "2025-03-25T21:15:42.467",
|
||||
"lastModified": "2025-03-26T14:15:33.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a text buffer overflow via long characters to devices/vector/doc_common.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo DOCXWRITE TXTWRITE presenta un desbordamiento del b\u00fafer de texto mediante caracteres largos hacia devices/vector/doc_common.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708132",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27832",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.570",
|
||||
"lastModified": "2025-03-25T21:15:42.570",
|
||||
"lastModified": "2025-03-26T14:15:33.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression buffer overflow for contrib/japanese/gdevnpdl.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo NPDL presenta un desbordamiento del b\u00fafer de compresi\u00f3n para contrib/japanese/gdevnpdl.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708133",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27833",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.683",
|
||||
"lastModified": "2025-03-25T21:15:42.683",
|
||||
"lastModified": "2025-03-26T14:15:33.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long TTF font name to pdf/pdf_fmap.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer para nombres de fuente TTF largos en pdf/pdf_fmap.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708259",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27834",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:42.870",
|
||||
"lastModified": "2025-03-25T21:15:42.870",
|
||||
"lastModified": "2025-03-26T14:15:33.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf_func.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer debido a una funci\u00f3n de tipo 4 sobredimensionada en un documento PDF en pdf/pdf_func.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708253",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:43.013",
|
||||
"lastModified": "2025-03-25T21:15:43.013",
|
||||
"lastModified": "2025-03-26T14:15:34.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer al convertir glifos a Unicode en psi/zbfont.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708131",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27836",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:43.137",
|
||||
"lastModified": "2025-03-25T21:15:43.137",
|
||||
"lastModified": "2025-03-26T14:15:34.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer overflow in contrib/japanese/gdev10v.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo BJ10V presenta un desbordamiento del b\u00fafer de impresi\u00f3n en contrib/japanese/gdev10v.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708192",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-25T21:15:43.250",
|
||||
"lastModified": "2025-03-25T21:15:43.250",
|
||||
"lastModified": "2025-03-26T14:15:34.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur through a truncated path with invalid UTF-8 characters, for base/gp_mswin.c and base/winrtsup.cpp."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se puede acceder a archivos arbitrarios a trav\u00e9s de una ruta truncada con caracteres UTF-8 no v\u00e1lidos para base/gp_mswin.c y base/winrtsup.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708238",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-29806",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-23T17:15:29.450",
|
||||
"lastModified": "2025-03-24T13:15:26.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-26T14:50:45.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "No hay soluci\u00f3n para este problema en Microsoft Edge (basado en Chromium) que permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -47,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "129.0.2792.52",
|
||||
"matchCriteriaId": "F0BF594F-B1FD-4557-8D75-5FF42CC0E5AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29806",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-30222",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-25T23:15:36.707",
|
||||
"lastModified": "2025-03-25T23:15:36.707",
|
||||
"lastModified": "2025-03-26T14:15:34.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Shescape es una librer\u00eda de escape de shell sencilla para JavaScript. Las versiones 1.7.2 a 2.1.1 son vulnerables a la posible exposici\u00f3n de variables de entorno en Windows con CMD. Esto afecta a los usuarios de Shescape en Windows que configuran expl\u00edcitamente `shell: 'cmd.exe'` o `shell: true` mediante `quote`/`quoteAll`/`escape`/`escapeAll`. Un atacante podr\u00eda obtener acceso de solo lectura a las variables de entorno. Este error se ha corregido en la versi\u00f3n 2.1.2. Quienes ya utilizan la versi\u00f3n 2 de Shescape no requieren cambios adicionales. Quienes utilizan la versi\u00f3n 1 de Shescape deben seguir la gu\u00eda de migraci\u00f3n para actualizar a la versi\u00f3n 2. No se prev\u00e9 publicar un parche compatible con la versi\u00f3n 1 de Shescape. Como workaround, los usuarios pueden eliminar todas las instancias de `%` de la entrada de usuario antes de usar Shescape."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -60,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-66pp-5p9w-q87j",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-66pp-5p9w-q87j",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
54
README.md
54
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-26T13:00:19.445166+00:00
|
||||
2025-03-26T15:00:20.481078+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-26T12:15:15.827000+00:00
|
||||
2025-03-26T14:54:37.560000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286602
|
||||
286607
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-13411](CVE-2024/CVE-2024-134xx/CVE-2024-13411.json) (`2025-03-26T12:15:13.880`)
|
||||
- [CVE-2024-13889](CVE-2024/CVE-2024-138xx/CVE-2024-13889.json) (`2025-03-26T12:15:14.590`)
|
||||
- [CVE-2025-1312](CVE-2025/CVE-2025-13xx/CVE-2025-1312.json) (`2025-03-26T12:15:14.890`)
|
||||
- [CVE-2025-1542](CVE-2025/CVE-2025-15xx/CVE-2025-1542.json) (`2025-03-26T11:15:38.240`)
|
||||
- [CVE-2025-1769](CVE-2025/CVE-2025-17xx/CVE-2025-1769.json) (`2025-03-26T12:15:15.040`)
|
||||
- [CVE-2025-1911](CVE-2025/CVE-2025-19xx/CVE-2025-1911.json) (`2025-03-26T12:15:15.197`)
|
||||
- [CVE-2025-1912](CVE-2025/CVE-2025-19xx/CVE-2025-1912.json) (`2025-03-26T12:15:15.353`)
|
||||
- [CVE-2025-1913](CVE-2025/CVE-2025-19xx/CVE-2025-1913.json) (`2025-03-26T12:15:15.513`)
|
||||
- [CVE-2025-2110](CVE-2025/CVE-2025-21xx/CVE-2025-2110.json) (`2025-03-26T12:15:15.827`)
|
||||
- [CVE-2025-2596](CVE-2025/CVE-2025-25xx/CVE-2025-2596.json) (`2025-03-26T11:15:39.183`)
|
||||
- [CVE-2025-27551](CVE-2025/CVE-2025-275xx/CVE-2025-27551.json) (`2025-03-26T11:15:38.943`)
|
||||
- [CVE-2025-27552](CVE-2025/CVE-2025-275xx/CVE-2025-27552.json) (`2025-03-26T11:15:39.063`)
|
||||
- [CVE-2022-39163](CVE-2022/CVE-2022-391xx/CVE-2022-39163.json) (`2025-03-26T14:15:20.793`)
|
||||
- [CVE-2024-45351](CVE-2024/CVE-2024-453xx/CVE-2024-45351.json) (`2025-03-26T14:15:31.457`)
|
||||
- [CVE-2025-2228](CVE-2025/CVE-2025-22xx/CVE-2025-2228.json) (`2025-03-26T13:15:36.373`)
|
||||
- [CVE-2025-23203](CVE-2025/CVE-2025-232xx/CVE-2025-23203.json) (`2025-03-26T14:15:32.250`)
|
||||
- [CVE-2025-24808](CVE-2025/CVE-2025-248xx/CVE-2025-24808.json) (`2025-03-26T14:15:32.417`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `76`
|
||||
|
||||
- [CVE-2023-52461](CVE-2023/CVE-2023-524xx/CVE-2023-52461.json) (`2025-03-26T11:41:07.140`)
|
||||
- [CVE-2024-27680](CVE-2024/CVE-2024-276xx/CVE-2024-27680.json) (`2025-03-26T11:41:33.737`)
|
||||
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2025-03-26T14:15:31.660`)
|
||||
- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-03-26T13:14:32.087`)
|
||||
- [CVE-2025-25371](CVE-2025/CVE-2025-253xx/CVE-2025-25371.json) (`2025-03-26T14:15:32.570`)
|
||||
- [CVE-2025-25372](CVE-2025/CVE-2025-253xx/CVE-2025-25372.json) (`2025-03-26T14:15:32.750`)
|
||||
- [CVE-2025-25374](CVE-2025/CVE-2025-253xx/CVE-2025-25374.json) (`2025-03-26T14:15:32.930`)
|
||||
- [CVE-2025-2654](CVE-2025/CVE-2025-26xx/CVE-2025-2654.json) (`2025-03-26T14:54:37.560`)
|
||||
- [CVE-2025-2672](CVE-2025/CVE-2025-26xx/CVE-2025-2672.json) (`2025-03-26T14:37:30.087`)
|
||||
- [CVE-2025-2673](CVE-2025/CVE-2025-26xx/CVE-2025-2673.json) (`2025-03-26T14:15:40.467`)
|
||||
- [CVE-2025-2674](CVE-2025/CVE-2025-26xx/CVE-2025-2674.json) (`2025-03-26T14:09:08.730`)
|
||||
- [CVE-2025-2675](CVE-2025/CVE-2025-26xx/CVE-2025-2675.json) (`2025-03-26T14:03:31.380`)
|
||||
- [CVE-2025-2676](CVE-2025/CVE-2025-26xx/CVE-2025-2676.json) (`2025-03-26T13:55:26.630`)
|
||||
- [CVE-2025-2677](CVE-2025/CVE-2025-26xx/CVE-2025-2677.json) (`2025-03-26T13:48:38.670`)
|
||||
- [CVE-2025-2678](CVE-2025/CVE-2025-26xx/CVE-2025-2678.json) (`2025-03-26T13:42:31.437`)
|
||||
- [CVE-2025-2679](CVE-2025/CVE-2025-26xx/CVE-2025-2679.json) (`2025-03-26T13:35:46.297`)
|
||||
- [CVE-2025-2680](CVE-2025/CVE-2025-26xx/CVE-2025-2680.json) (`2025-03-26T13:23:41.867`)
|
||||
- [CVE-2025-27830](CVE-2025/CVE-2025-278xx/CVE-2025-27830.json) (`2025-03-26T14:15:33.113`)
|
||||
- [CVE-2025-27831](CVE-2025/CVE-2025-278xx/CVE-2025-27831.json) (`2025-03-26T14:15:33.290`)
|
||||
- [CVE-2025-27832](CVE-2025/CVE-2025-278xx/CVE-2025-27832.json) (`2025-03-26T14:15:33.483`)
|
||||
- [CVE-2025-27833](CVE-2025/CVE-2025-278xx/CVE-2025-27833.json) (`2025-03-26T14:15:33.680`)
|
||||
- [CVE-2025-27834](CVE-2025/CVE-2025-278xx/CVE-2025-27834.json) (`2025-03-26T14:15:33.867`)
|
||||
- [CVE-2025-27835](CVE-2025/CVE-2025-278xx/CVE-2025-27835.json) (`2025-03-26T14:15:34.057`)
|
||||
- [CVE-2025-27836](CVE-2025/CVE-2025-278xx/CVE-2025-27836.json) (`2025-03-26T14:15:34.253`)
|
||||
- [CVE-2025-27837](CVE-2025/CVE-2025-278xx/CVE-2025-27837.json) (`2025-03-26T14:15:34.440`)
|
||||
- [CVE-2025-29806](CVE-2025/CVE-2025-298xx/CVE-2025-29806.json) (`2025-03-26T14:50:45.523`)
|
||||
- [CVE-2025-30222](CVE-2025/CVE-2025-302xx/CVE-2025-30222.json) (`2025-03-26T14:15:34.817`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
185
_state.csv
185
_state.csv
@ -205544,14 +205544,14 @@ CVE-2022-38670,0,0,5f7b07806008480e6849e1ba71ce47e086f1a36c384caaa82a8eb0293bc57
|
||||
CVE-2022-38671,0,0,00da45e5c9b95a09e97a362533fa83a7e4f8b66f5c7576c2da38712da2c03919,2024-11-21T07:16:54.497000
|
||||
CVE-2022-38672,0,0,c5e6818f94ccf4dbda30954e70ecb74d737bd066051d8c00b7c93378fb0823fd,2024-11-21T07:16:54.623000
|
||||
CVE-2022-38673,0,0,bb33c22991ec8d586e95b59015be7f8034faa0fad6446d3cc65a263e457751bb,2024-11-21T07:16:54.757000
|
||||
CVE-2022-38674,0,0,a8df0cd7f89925096cca35e6867a8e7a5253baf89d4cc7ff23c8a9bd1b4e339b,2024-11-21T07:16:54.887000
|
||||
CVE-2022-38675,0,0,333f5206edc4b9b8e93f9aa97ef23def8baa5fd960bd8af1d64000764adc6183,2024-11-21T07:16:55.017000
|
||||
CVE-2022-38674,0,1,e541318932853ebf29d808458e033d00751466e660d106780dc82f1a0bbbee30,2025-03-26T14:15:17.500000
|
||||
CVE-2022-38675,0,1,da5214fa08a9b851b0507043b84b2b232e1b36f0fa398eed2d5465bb88a8d2d3,2025-03-26T14:15:20.040000
|
||||
CVE-2022-38676,0,0,c1f86350f1959e1ec6aae69beb2dca62d098c4d6f36fb6ee2a979f1ae98dc6e9,2024-11-21T07:16:55.140000
|
||||
CVE-2022-38677,0,0,45e5130a06b34d8b4608a6f384a5d6ab0d1220eac163ae219448b1d8eb132509,2024-11-21T07:16:55.270000
|
||||
CVE-2022-38678,0,0,fcaea2dadc6004c49696084fd0eb919c69612acd0c70841b4191bf93c7ad5ad9,2024-11-21T07:16:55.393000
|
||||
CVE-2022-38679,0,0,30554966cf7b361a82706593e65f2dc51b7b5e625b9417e785a7e31204ca22fe,2024-11-21T07:16:55.537000
|
||||
CVE-2022-3868,0,0,36a3001c5865c0f61622978d5fd7c76f7571b4109d9ffde231eed0250308f612,2024-11-21T07:20:24.093000
|
||||
CVE-2022-38680,0,0,9ccb6fbe36b96fe93732fe0051bfaf2860bd51f8a0caba71cd290178cc8ef4d4,2024-11-21T07:16:55.673000
|
||||
CVE-2022-38680,0,1,391285d54aa3d2099c05191de903328c164eaf11369e5752e9d9f25ce8c1de75,2025-03-26T14:15:20.263000
|
||||
CVE-2022-38681,0,0,f6ca4866804420d0840e8e3c0e3fcd1b880332ecb402f7b74717d66c8aafe1fd,2024-11-21T07:16:55.793000
|
||||
CVE-2022-38682,0,0,d014c0128122867e4b8b4ffb9f4bd2346427fd64d3a70f17c446edd1f10314bf,2024-11-21T07:16:55.923000
|
||||
CVE-2022-38683,0,0,6c4b1b4fcaebdbe8e527e6b89dddadb02d73e139d5c3924c3c8bb0346c1dd7b7,2024-11-21T07:16:56.050000
|
||||
@ -205936,6 +205936,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee
|
||||
CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000
|
||||
CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000
|
||||
CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000
|
||||
CVE-2022-39163,1,1,9bfad7812d7fd9be5c5e01267a9e31066d85a677f28ee143424a79620a02b9ac,2025-03-26T14:15:20.793000
|
||||
CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000
|
||||
CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000
|
||||
CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000
|
||||
@ -209937,7 +209938,7 @@ CVE-2022-44443,0,0,a05afab2a67ff8ae0c921e66ecfb678d555be037d19b899932969fad4b4ac
|
||||
CVE-2022-44444,0,0,35d79adf7f2a820e18b974141331feba04c2522fdbf1495dc6e20f9e4d2567b9,2024-11-21T07:28:02.133000
|
||||
CVE-2022-44445,0,0,98b818cfddd55fc9df9ba4c703b45f167d40aae539ac36145317228fd2518d46,2024-11-21T07:28:02.257000
|
||||
CVE-2022-44446,0,0,b87a075bc11c7bf7879be2b7a0deec8816fbc0db0e5e2cd310c423a22e703df2,2024-11-21T07:28:02.377000
|
||||
CVE-2022-44447,0,0,e73a8969d29711df776169bb033927b49ccbb795e2efc42f9115fdb39cb05cec,2024-11-21T07:28:02.497000
|
||||
CVE-2022-44447,0,1,b839b4dbd02b0303d1275d5549321f022cdc6a4738ce0f7eb511d56ba2bbd59a,2025-03-26T14:15:21.223000
|
||||
CVE-2022-44448,0,0,51991eac5e2bfcde5967a5669578093a73799e3adf2470b634b8c3a9bb0d6931,2024-11-21T07:28:02.607000
|
||||
CVE-2022-44449,0,0,f001641190f0af734eea3fea990f3ff8177ef18a9d61cb293b8fb9b09bf446fd,2024-11-21T07:28:02.723000
|
||||
CVE-2022-4445,0,0,cedca36b9b879b049e03157ad890d2870ba90bb1afe63e410a0ea538ec3aa62a,2025-03-21T15:15:38.497000
|
||||
@ -210038,7 +210039,7 @@ CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67bedd
|
||||
CVE-2022-44587,0,0,6dfaf7b30b3dd518c8baa1531cd49f4d347ed0a847d046b7fe56358fb870412e,2024-11-21T07:28:10.493000
|
||||
CVE-2022-44588,0,0,c7175322edd9d7ad433ad5234e758084af6f5b6df1c9a6080b20d6e871b59b23,2024-11-21T07:28:10.627000
|
||||
CVE-2022-44589,0,0,3c2bd6a31443e7ed33d7d7972f625159cb717f110556afbf06ac8d96a6a3039c,2024-11-21T07:28:10.743000
|
||||
CVE-2022-4459,0,0,91dcc927fedf11470b045a9f315c74f0697c4401eb898de50dccba1291d9fb1b,2024-11-21T07:35:18.480000
|
||||
CVE-2022-4459,0,1,a0d0ba41de33702ec70b3020ba12862d1aba8958f239c1aa62798e7c0d3d44b5,2025-03-26T14:15:25.590000
|
||||
CVE-2022-44590,0,0,8419b28e3a0fb49ed6ee057d9814f15968322a8d49125a15e7831fc76db33c2f,2024-11-21T07:28:10.877000
|
||||
CVE-2022-44591,0,0,c847c79694e4ea0add459ff62a58817005ae0ba77ef3c55979619aef08bd2f9a,2024-11-21T07:28:11
|
||||
CVE-2022-44593,0,0,90f8ad45672b1e43741913eaec2f22fe4107cda8646e72a10d74cce24b42f4d1,2024-11-21T07:28:11.120000
|
||||
@ -210811,7 +210812,7 @@ CVE-2022-45760,0,0,0d1a8eb90e8eb8d3f74e550a85785935ddd25217edeabe6882dc4db9e32c1
|
||||
CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc85cf,2025-03-24T18:15:16.197000
|
||||
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
|
||||
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
|
||||
CVE-2022-4577,0,0,a6b1dcae0f5f4893cc9f1be55ca09b6cdb76bfc2f503698707d6dfba469dc738,2024-11-21T07:35:31.770000
|
||||
CVE-2022-4577,0,1,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
|
||||
CVE-2022-45770,0,0,02dc41d193d36a9bfc8460eb7435feb6273b7b9f86afc53f0e593727eb5aae1a,2024-11-21T07:29:41.203000
|
||||
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
|
||||
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
|
||||
@ -210819,7 +210820,7 @@ CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e57
|
||||
CVE-2022-45781,0,0,af5875681fe2ee1d5531c6d8ee1f3bdb8a6d138970efb5e8ab0f5142c741d481,2024-11-21T07:29:41.657000
|
||||
CVE-2022-45782,0,0,edab3a553726f0ee865b05fc85e092ff1fd62cca5d7ff093b6e09fd4c8f95a45,2024-11-21T07:29:41.917000
|
||||
CVE-2022-45783,0,0,99caa90c0c796a457e24fd66341035568c722235e187a3c980a405731656f189,2024-11-21T07:29:42.700000
|
||||
CVE-2022-45786,0,0,7f2933125b250ce6538e93c7b51f14db7b5edd629a31d8a947c746c90b5d1799,2024-11-21T07:29:42.837000
|
||||
CVE-2022-45786,0,1,eceab8889b7edb80c20ab4c9d9104ec72f95bf0abb8fe81c682a71a69b413d30,2025-03-26T14:15:21.453000
|
||||
CVE-2022-45787,0,0,6e575959d3d8da9988e1c9ac769f974584e450a6f0905326025a6c024c86b8bb,2024-11-21T07:29:42.970000
|
||||
CVE-2022-45788,0,0,f6f79d223f38261b7ad2add378e194245959512d8efa61388e7752de75a0700d,2024-11-21T07:29:43.093000
|
||||
CVE-2022-45789,0,0,430fa15832d387a29a0389562bd6681c71542a481cef59c3138e1404448b57c3,2024-11-21T07:29:43.287000
|
||||
@ -211518,7 +211519,7 @@ CVE-2022-4673,0,0,ae81b2d3725dffbb1142722b47d0f8c8c70b094a6f67b615dbce9278734323
|
||||
CVE-2022-46732,0,0,e14127d804f025884e831ca46adc0de908f852d85b8e4a9e57ee145c2f969bd3,2025-01-17T22:15:27.260000
|
||||
CVE-2022-46733,0,0,dab6a16ba7aa13baea3e43ae318c71e03ced958ebc4b4f9863afc731ab25e4c2,2024-11-21T07:30:59.350000
|
||||
CVE-2022-46738,0,0,2bc8d3136674cbb74669d235a37a0dadd4f4f38eb64d7bbc723615e5d78bd0d6,2024-11-21T07:30:59.470000
|
||||
CVE-2022-4674,0,0,862e8bd2930ad0406eb37b5a5972b8f3d6437e29a1be0060b6860a9f39c31ed5,2024-11-21T07:35:42.747000
|
||||
CVE-2022-4674,0,1,413cbada43c93f23a08c4a8e3d11800e6b067b16197ad6b531b1a528befa64a5,2025-03-26T14:15:25.987000
|
||||
CVE-2022-46740,0,0,f5eb759dc52fd36b093e5cabdeed4634e385cb9adaf5f29545728efff1878ccb,2024-11-21T07:30:59.613000
|
||||
CVE-2022-46741,0,0,dc84b3b96f86b2345d118c63c373a240ac715179dfb5a0744bbe369531b3f27f,2024-11-21T07:30:59.727000
|
||||
CVE-2022-46742,0,0,7b90f148a7d1ba066a0951b401c337c5055bca6c5a559eba16b90f6d52c77043,2024-11-21T07:30:59.863000
|
||||
@ -211888,13 +211889,13 @@ CVE-2022-47322,0,0,d87ac8b158f58d19c0a8e2c2b1cff781aa6d51642d3caa9a23f10994a0ee1
|
||||
CVE-2022-47323,0,0,5764ed6de229bb2a5fe7f58b553e2e56557faabe6ef60399b77d5e22fd615784,2024-11-21T07:31:43.093000
|
||||
CVE-2022-47324,0,0,6347d37c8ba3bcf7c6c804f9e8776a16aaa9ad0eeb0128925ffa43234012daf0,2024-11-21T07:31:43.207000
|
||||
CVE-2022-47325,0,0,f1910be6c349906fabbd876fc043f995ed80296d1314d0acf767c899343113d0,2024-11-21T07:31:43.323000
|
||||
CVE-2022-47326,0,0,de74cdd7d7f2f0e00bf28e012469ef92a6488fce060cf811107473edb3ff2856,2024-11-21T07:31:43.450000
|
||||
CVE-2022-47326,0,1,5887f05720e53da12671da125e8f66c8fb77d83a1232bb3c4b71136a25ae6b3f,2025-03-26T14:15:21.730000
|
||||
CVE-2022-47327,0,0,cdda28a735d2510b8cf72f9a30284a33154adc3ef3a38b4576b77f0357c04d1e,2025-03-25T18:15:29.193000
|
||||
CVE-2022-47328,0,0,94fa0b773d2715e6dc61f4211dd1d7449e6e7474affcd77460b12dd15ffd1453,2024-11-21T07:31:44.153000
|
||||
CVE-2022-47329,0,0,7e8089acf480642f341b0cfdf3cf0e030ba54caf415147d13b2e46ac6968ab48,2024-11-21T07:31:44.277000
|
||||
CVE-2022-47328,0,1,75c892b6b03d86d8da70fec3db643b2cf562c7077c3f3958d25f473757aae392,2025-03-26T14:15:21.953000
|
||||
CVE-2022-47329,0,1,ce26b44ea133b073ed3502604f0f289a0709dd9906e15bb4ef13a2df740bdb91,2025-03-26T14:15:22.157000
|
||||
CVE-2022-4733,0,0,a20d2ce8ba8643a864765c9df050e349f7e665a20b62ce2ebd9e393a64b63a5d,2024-11-21T07:35:50.087000
|
||||
CVE-2022-47330,0,0,85a4a57af31008da3df89e202cecb177ab359c603025cd5154f14828cadff588,2024-11-21T07:31:44.390000
|
||||
CVE-2022-47331,0,0,fefae5473b2a134cbbd47633d54db7948927a072d6bbbcf8c31886a084257835,2024-11-21T07:31:44.507000
|
||||
CVE-2022-47331,0,1,7cd87437f0571abf6658289de93967ca70a361a85dcb05e7923c53569f8351be,2025-03-26T14:15:22.347000
|
||||
CVE-2022-47332,0,0,df4a869bc27df4ccc5cdd75a5d42e95190d4d508f368a0952433a428bbbb2fde,2024-11-21T07:31:44.633000
|
||||
CVE-2022-47333,0,0,85acb4ec1539f5e778d6bc3e7f4a7f82e765434978b41c39b8cb6bc88bad5ee2,2024-11-21T07:31:44.763000
|
||||
CVE-2022-47334,0,0,79697999df090a6112af4776243e1d4cdac5ba6c9d4bf6c9080c00663bf9e733,2025-01-28T17:15:09.353000
|
||||
@ -211902,14 +211903,14 @@ CVE-2022-47335,0,0,ffe3fdad4887dcb93fb83432929bc0989af9ac33da71f284c431b8c887b9f
|
||||
CVE-2022-47336,0,0,4263e5dfa897d200b1472042b9608449760978a147e975bfc23d9ea82473138d,2025-02-10T20:15:40.423000
|
||||
CVE-2022-47337,0,0,af927ae5afc0fcbfd42348de1a6ecf7a0a3245fd3c8303b538745074da65a295,2025-02-10T19:15:36.133000
|
||||
CVE-2022-47338,0,0,c3646efcfc2f12a9cdf31bc3d6d12890d9775e7538a13b5ba65c0224b6fd9281,2025-02-10T18:15:24.483000
|
||||
CVE-2022-47339,0,0,5f9e961fef8454aa61538ef54d66e71c4da6cabbf4aedeea88c027cbdfe52db8,2024-11-21T07:31:45.440000
|
||||
CVE-2022-47339,0,1,1365086999babaf9d393fb336cd1a7f2703fb5525f4b00a45366ae86254fe814,2025-03-26T14:15:22.543000
|
||||
CVE-2022-4734,0,0,3e3f895b4ca74c84b0fb151d8268a7f8b991a926d79e2ed84ec0f21e7438c93c,2024-11-21T07:35:50.207000
|
||||
CVE-2022-47340,0,0,6028ec2b2df7cf335147b50331bfd8125f68753f9e3796dc8e5ffbdd41658212,2025-01-28T18:15:27.967000
|
||||
CVE-2022-47341,0,0,91090ccb682915a12137a405b12a324109569ab1480bf23881dff52d521b3d1a,2024-11-21T07:31:45.663000
|
||||
CVE-2022-47342,0,0,c60c630cb85f62e1c030b08a25c7b7c662833e2bae752772a071268f4db3f1cd,2024-11-21T07:31:45.777000
|
||||
CVE-2022-47343,0,0,0a8e29cd5462a24f61106178417bbea442dc59f90da83ce7c5c12fd324c69fda,2024-11-21T07:31:45.887000
|
||||
CVE-2022-47344,0,0,36ad72598360644f1036325aa14fc2bfa7595672d94123ab17e86e2aebfa212b,2024-11-21T07:31:46.030000
|
||||
CVE-2022-47345,0,0,dd174c05db8af8c7cc1d1926e59da502f53a34e81a2a080d4fd43fe4da4d80c7,2024-11-21T07:31:46.170000
|
||||
CVE-2022-47341,0,1,a6b4d3247802373b3c699ee9f55c7d93efbe578b414192b1632e6595efe9ea0a,2025-03-26T14:15:22.737000
|
||||
CVE-2022-47342,0,1,9e990179ee47c1b7232e129f591f58931822738a485f0f39a82fa8ad2ae5e4f2,2025-03-26T14:15:22.937000
|
||||
CVE-2022-47343,0,1,b777196379f504351a50fbe7159ee2ff3539b8fe0f21a3259fb482c1ad1dbd49,2025-03-26T14:15:23.137000
|
||||
CVE-2022-47344,0,1,03a09cd54a7705bd8115bdc7a602fbc7981f695f4d1bd5483abf4776a38e2d8a,2025-03-26T14:15:23.320000
|
||||
CVE-2022-47345,0,1,1ee8b863e85602779b5ffd9b021d10ace36200a263dd7087aff50e923119b6f5,2025-03-26T14:15:23.523000
|
||||
CVE-2022-47346,0,0,0aed09c421cfb42d8f171a4029f4cb7eede4a9c894d88138e6562816efecbc5f,2025-03-25T21:15:38.160000
|
||||
CVE-2022-47347,0,0,a8989f37873566c87d703841deb58abdd6887396642993be575afbf72dd891e0,2025-03-25T21:15:38.333000
|
||||
CVE-2022-47348,0,0,2ee4baa94522df07a77505e8c11d3e85f011843707f320782b06d867fe47df8e,2024-11-21T07:31:46.510000
|
||||
@ -211921,12 +211922,12 @@ CVE-2022-47353,0,0,e15d009f7a026317b30d329ff84e5896f47b1f05750928f849a5e481ff9ea
|
||||
CVE-2022-47354,0,0,497ad40c11569c29d96883cb3c8a77c36600e11926a8f34354ec23c9205cc61f,2024-11-21T07:31:48.797000
|
||||
CVE-2022-47355,0,0,046e83fc7fbfb58acbbb97fe4d7b16d767c0b4d88972d249de394e06ed3714fc,2024-11-21T07:31:48.903000
|
||||
CVE-2022-47356,0,0,e17262981d07a3f89a077b3f1e3532c4ff339d32ca5b6e741635f0c3aafacbd1,2024-11-21T07:31:49.020000
|
||||
CVE-2022-47357,0,0,f71544700402837457d8cb01a0fce0dec7e6fd1d236f190bd1bca3860452ac77,2024-11-21T07:31:49.133000
|
||||
CVE-2022-47358,0,0,9f28e43f61b8791b822c140e9f6b5bdba393db0c23ce58bce0952fca96c9c166,2024-11-21T07:31:49.263000
|
||||
CVE-2022-47359,0,0,33a8956c757531cb4211dd6b69b3a55d985887b96872ac20e03799f8b396f1cc,2024-11-21T07:31:49.393000
|
||||
CVE-2022-47357,0,1,5e731d6b9b1a18244fa1e65ff0c8429cb87cfe487f4ca770dbb73a01d943aa5b,2025-03-26T14:15:23.730000
|
||||
CVE-2022-47358,0,1,1743fec564ae245a3a7afda532929b51df0836610a7f50f723dc2596f15bf694,2025-03-26T14:15:23.927000
|
||||
CVE-2022-47359,0,1,50260233501304e116ee2f03c4b499b69ae0b55af8c04a770df1b913ded26cd4,2025-03-26T14:15:24.137000
|
||||
CVE-2022-4736,0,0,6966b4fa17aac898e0fbc1c67dd80d966b944b4975b9ce9b8cf3622f5260ac2e,2024-11-21T07:35:50.483000
|
||||
CVE-2022-47360,0,0,9492e59202ee34fcdc32406f9d126a7a3a3fb0313b89142a58fdc6f7732a68c4,2024-11-21T07:31:49.530000
|
||||
CVE-2022-47361,0,0,e12885e170e7f14e20d4a99618228aea8b0888d3cad8daf77c46e8cbc052d67c,2024-11-21T07:31:49.657000
|
||||
CVE-2022-47360,0,1,2080874404fa4668f5fad79680f49517e2f99dfb08e28d10b31722ee3e7029cd,2025-03-26T14:15:24.343000
|
||||
CVE-2022-47361,0,1,a6febb945aa7b4a8d5cf41e9cecbc99b326c75f2bd13aa9701f473814f0835fa,2025-03-26T14:15:24.560000
|
||||
CVE-2022-47362,0,0,5c73387549131606f4ccb53ca66b317939741435c862f4715ff17c09104803dd,2025-02-10T18:15:24.720000
|
||||
CVE-2022-47363,0,0,039f49a2379b03208bfa2f138b8529b2c11a09fe035d9cd144ead718e34eea90,2024-11-21T07:31:49.873000
|
||||
CVE-2022-47364,0,0,9932d508109eadbf324c3ee2ef48be3b2a469fe92a061f53a718a76ad5ac8412,2024-11-21T07:31:49.983000
|
||||
@ -211936,8 +211937,8 @@ CVE-2022-47367,0,0,f2cd0dc9b405a34d6b24f23598804fdabc5f6e2995314773675fae5c6eb03
|
||||
CVE-2022-47368,0,0,864ac8fd67213d7196e2b3ba090186c8e1e1c5fbef627b3fec12655773b07ad9,2024-11-21T07:31:50.430000
|
||||
CVE-2022-47369,0,0,dac8a4cd2c3921d4d915cd89a3123daef3a97515602ff6bc0021fdbe3e9359d5,2024-11-21T07:31:50.543000
|
||||
CVE-2022-4737,0,0,dba502a8626959ce6d0880dcba8a3e4a3ed0b45c0d2076ff09fce5fdfdd17219,2024-11-21T07:35:50.610000
|
||||
CVE-2022-47370,0,0,b94d6c1bded6e45bc215aef946d5aefca288d214876db884828eede9aea0e5cf,2024-11-21T07:31:50.653000
|
||||
CVE-2022-47371,0,0,f2031cddbcc12dc637170a530a334053a20ac4f5617574ad18efc9543ad7d9fd,2024-11-21T07:31:50.767000
|
||||
CVE-2022-47370,0,1,31184b9a2366983ce15cb055351d326a425e88ec753f1c69d989d264093d6f33,2025-03-26T14:15:24.750000
|
||||
CVE-2022-47371,0,1,e3a9adf55786e2a53cf433f71bcae1c3eac23c3bb4c4f0b3d797cd85177cb6b6,2025-03-26T14:15:24.940000
|
||||
CVE-2022-47372,0,0,dfa77dc4d425c9bf12877c67de0f763eabc9ccacebbcddff67044d9d21c0fc3e,2024-11-21T07:31:50.883000
|
||||
CVE-2022-47373,0,0,96a907b08b5e21840b5e6f0473ecbf70469d1dc841e707b95ca2af1207a9a256,2024-11-21T07:31:51.007000
|
||||
CVE-2022-47374,0,0,0fc68a2d2ba75f7fa891da2f570cf59855fee3dac0ed28f98a8e1489bb311d72,2024-11-21T07:31:51.127000
|
||||
@ -212024,7 +212025,7 @@ CVE-2022-47449,0,0,cc50b6ae48af7d02d6dd04daa7e7790ccc23f748f67344294a359e7883fee
|
||||
CVE-2022-4745,0,0,e01e0a62109bd4ef8e5f97d29b95ffae6191f45de6a32d7af67013476f6b6e2c,2024-11-21T07:35:51.627000
|
||||
CVE-2022-47450,0,0,39fb77bfe8251294fa7825fa9caf8b57b402a26a70ce42dd4739b99f948f3b47,2024-11-21T07:31:59.200000
|
||||
CVE-2022-47451,0,0,d21767685c9e1c48a8f641e6f36b2ecf5b4aec2ebd1b394de1f03253e03895f3,2025-03-25T21:15:38.490000
|
||||
CVE-2022-47452,0,0,3ae9ab8eafda61f9ef9aef3c99c1b61c98bacde1b583bb4e76f19b4a76cfab61,2024-11-21T07:31:59.453000
|
||||
CVE-2022-47452,0,1,e58db3a26b36e58e9bbee3a6f857db617877571ea407f71bc52f55ec1c8a7001,2025-03-26T14:15:25.120000
|
||||
CVE-2022-47453,0,0,16ab4548a934e0f69918832fe307d3cc886b6695da2b3cc8295f8e8bf14fc630,2024-11-21T07:31:59.610000
|
||||
CVE-2022-47454,0,0,e7b737cb99edf1fdc942511ae649efa0f88637b608618d95b99e53858a5b0cd0,2024-11-21T07:31:59.757000
|
||||
CVE-2022-47455,0,0,78da122697407476b70af5bb22716c5d16d54cefd750214ba4143eeb45121173,2024-11-21T07:31:59.877000
|
||||
@ -212453,7 +212454,7 @@ CVE-2022-48236,0,0,850fb4dcd8171cd15cb19c7aac6f7bab1434f0b7f306bad2cd68cf86ae838
|
||||
CVE-2022-48237,0,0,6c5ca8ecfd414e8897abb5afce28bf8294cd5e71cc28a0415820c17c1ecfef21,2025-01-28T21:15:12.503000
|
||||
CVE-2022-48238,0,0,e0a3363b05434d90930d72ee63d7cd0f23451e39dd4127f60f3e457acf12474d,2025-01-28T21:15:12.663000
|
||||
CVE-2022-48239,0,0,c626f4e77adf4ca19a86fc17a78a7a500eaaee17af23726d2dfd15ec4ece9380,2025-01-29T17:15:22.070000
|
||||
CVE-2022-4824,0,0,cb365ab5076f58d6fea721db695d23f4ab58de5df6a90af86982f551b2e2c2cb,2024-11-21T07:36:01.127000
|
||||
CVE-2022-4824,0,1,2229504ea8337da25915fe1fd14db3cfdeaca0c0cc51186358b9e7ff62419e8b,2025-03-26T14:15:26.187000
|
||||
CVE-2022-48240,0,0,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000
|
||||
CVE-2022-48241,0,0,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000
|
||||
CVE-2022-48242,0,0,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000
|
||||
@ -212513,7 +212514,7 @@ CVE-2022-48308,0,0,d82ea45e2ac099dc3c3ecf13551c9dc3ababac68114d8f5415e8c3ff26f91
|
||||
CVE-2022-48309,0,0,9af53705e87c70c09a62712e5ffa6e8eeb125ade4869b2020319bd5558cc17a4,2025-03-07T21:15:12.900000
|
||||
CVE-2022-4831,0,0,f3a096c06597b8e18b75ac644035ee7a465b6ea70b28d2895528d5c3f7fcfd7c,2024-11-21T07:36:01.990000
|
||||
CVE-2022-48310,0,0,ebfed86719c206e34df06d3147715e5d78c6f8ef832d5de22d2b9a682e7e26b5,2025-03-07T21:15:13.047000
|
||||
CVE-2022-48311,0,0,99eb94960d1d92fd799b3d32286c60d09595170e9d761d77ec69c490c43f1c77,2024-11-21T07:33:08.447000
|
||||
CVE-2022-48311,0,1,12a0cdfbf5573bb8f87e0c5a0ca3d58f6ae7d8e3c95cf644494fcad7e534123a,2025-03-26T14:15:25.310000
|
||||
CVE-2022-48312,0,0,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000
|
||||
CVE-2022-48313,0,0,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000
|
||||
CVE-2022-48314,0,0,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000
|
||||
@ -214126,7 +214127,7 @@ CVE-2023-0140,0,0,df7177faa2d8cb9862c8b50c6cc729872478c2ba0d70361a7bb2e6912f9991
|
||||
CVE-2023-0141,0,0,85fccfa0835592642082878f04b3ca84af9442273f80cf9aad7f70c91ed83ef3,2025-03-20T21:15:16.407000
|
||||
CVE-2023-0142,0,0,b7133677787ddbbd1130cc8c143928e5cbd31febaed1bc74027c053535510e61,2025-01-14T19:29:55.853000
|
||||
CVE-2023-0143,0,0,12e6bcea5a3db8de8256483e07860446df3a2ee1bf6ddb6adaff3df8fc243f4c,2025-03-25T21:15:40.143000
|
||||
CVE-2023-0144,0,0,04d6adc5e9c8d3d966538b6f377a484e000949368d55f2371a62400361af1881,2024-11-21T07:36:38.360000
|
||||
CVE-2023-0144,0,1,b0b684392742244710e87e2337db3c5c1d750456d69b57859f7335c71658ec4d,2025-03-26T14:15:26.400000
|
||||
CVE-2023-0145,0,0,a4cbaa3c26a4250a2dd6b3cd43cec76d7c10d4cce1fc8e2c43fcf34ca91668db,2025-02-26T15:15:17.957000
|
||||
CVE-2023-0146,0,0,8eb9d90955bdae43de02b5f3b926196cc1bb5521330b52186e58ae08057eea53,2025-03-25T18:15:30.523000
|
||||
CVE-2023-0147,0,0,d83a6a9cc747578644cdc678d460b719e77c1dcb07d59fbedecd667ef6b22e7b,2025-03-25T20:15:16.930000
|
||||
@ -214160,7 +214161,7 @@ CVE-2023-0174,0,0,b42528505b72ad99092252a143ae5d7e87893bdee09be93dad54b02238e573
|
||||
CVE-2023-0175,0,0,f675b36a1edf72fa9629e908e8135656f624b1e3facf4fe662ec8f8ba7f94a2d,2025-02-26T19:15:14.847000
|
||||
CVE-2023-0176,0,0,1dc2a255a38756fd69b660836918029f220e67fe474010062db4d35f498821a4,2025-03-25T18:15:31.023000
|
||||
CVE-2023-0177,0,0,96612f0d6acc9356b7bef11758fc6250b99f39292144eec2d89a14d00f6db80e,2025-03-20T20:15:27.907000
|
||||
CVE-2023-0178,0,0,7591c9272af0ccb8f87129805b1aab079536f995d2b21f00c0a538a499928daf,2024-11-21T07:36:41.600000
|
||||
CVE-2023-0178,0,1,fc51a3e93e7b20dbf41b1671299d60206e6d82a64feca8e26ee75812eaced7d9,2025-03-26T14:15:26.580000
|
||||
CVE-2023-0179,0,0,9877146175097de2cfaf24ea6f7e8489c6f5c588d2b6bdbf87553e381b048fdf,2024-11-21T07:36:41.697000
|
||||
CVE-2023-0180,0,0,874d5347c225b067c1bec87c944f9e77ff0adec74cd6c76e1cda8afd708aa06f,2024-11-21T07:36:41.843000
|
||||
CVE-2023-0181,0,0,6cc218f9c12dcd68e0f8d4ab80bfa62e629b02864392080e103c64c6a0cbe010,2024-11-21T07:36:41.983000
|
||||
@ -214259,7 +214260,7 @@ CVE-2023-0278,0,0,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564
|
||||
CVE-2023-0279,0,0,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000
|
||||
CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000
|
||||
CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000
|
||||
CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000
|
||||
CVE-2023-0282,0,1,f2a8105be0180298e4597b68e62b27826503d962ca075ae0ec4e67d5172050ca,2025-03-26T14:15:26.760000
|
||||
CVE-2023-0283,0,0,230ec949cdfa87f9c743cbda03bee4b4589b701b25482058f27efe88db1a01ea,2024-11-21T07:36:53.493000
|
||||
CVE-2023-0284,0,0,2ee75b8d52458792893d506f4678003e9f3a4ee3862a0d66ec5a91e2fc2321a7,2024-11-21T07:36:53.613000
|
||||
CVE-2023-0285,0,0,5cfc15627d85ef00a346f7dfd31b8843c30b6e48b152b2072e5bf24a5e2751ec,2025-03-12T16:15:18.480000
|
||||
@ -216290,14 +216291,14 @@ CVE-2023-20604,0,0,89104cd6bcd572fcd43d03046cd8de5ff1ea8829d4d0bdd409ede520ee0ad
|
||||
CVE-2023-20605,0,0,0a50f8aed353e1972580ad9bc80d68446dfb03a26e65506fd8ca3367e802fbdf,2024-11-21T07:41:12.673000
|
||||
CVE-2023-20606,0,0,3c42dc82be70724cbe7cab6b59ab01aba1f16f44b91a8b568cb49094579a692f,2024-11-21T07:41:12.833000
|
||||
CVE-2023-20607,0,0,2d2b5b020fbe0b55fb14d869a0d8dcac4d6c2aafeb48626430bf6bafca70499c,2025-03-25T19:15:41.100000
|
||||
CVE-2023-20608,0,0,084092bc44255d3af240e05492c59fc9416e3893a4c1807a90dd67a1176907c1,2024-11-21T07:41:13.110000
|
||||
CVE-2023-20609,0,0,6f5f42e218d350da70228f17b341d35270c90eed9cfeae380bf875550438b366,2024-11-21T07:41:13.240000
|
||||
CVE-2023-20608,0,1,d6f9dbbbac69b93cc0824a47d4df36c65ecda27214abbe1f241989302aa528a2,2025-03-26T14:15:26.940000
|
||||
CVE-2023-20609,0,1,0afa963dad6ef04212b9672924a803b8c2d17becb20dad9274ecbff4a22dfa5f,2025-03-26T14:15:27.147000
|
||||
CVE-2023-2061,0,0,b4b807b6ce48cef7d45a0e20c4572bea09af7570d502ad43d494e63723900e46,2024-11-21T07:57:51.733000
|
||||
CVE-2023-20610,0,0,d2e768fecb6a64a6cd39bf38ca3ae9996f64a1a374e84538c101593639892da9,2024-11-21T07:41:13.370000
|
||||
CVE-2023-20611,0,0,4f0e65ad942470ce4af5b99a7376cd2a8c0bc6255a442da58271d9b4bcc9d306,2024-11-21T07:41:13.470000
|
||||
CVE-2023-20612,0,0,f1a7140bdd4b3be3e1eac4f5d2f9fcfe1615637c02ac729e2482cf6431b49f41,2024-11-21T07:41:13.590000
|
||||
CVE-2023-20613,0,0,36a0f3d223ce63f8939c365d6aae4477c1e2e640a8291a613f294af6ba3a5491,2024-11-21T07:41:13.703000
|
||||
CVE-2023-20614,0,0,1471447f20c1501a60f63853a73fcb1c0a4aac6aa676eeca83e73265ced434e1,2024-11-21T07:41:13.817000
|
||||
CVE-2023-20610,0,1,8dab462f84161729dc798bc558aade169f04f6528ebea714a146b1324a0c2eb5,2025-03-26T14:15:27.333000
|
||||
CVE-2023-20611,0,1,039ba1281f90fbc43b46d5ed4bc7aa045324f58c8b3b21dd09e77c7c28820d8c,2025-03-26T14:15:27.513000
|
||||
CVE-2023-20612,0,1,8e27291aa342cdf92d574714ca62f01f7fece2ec67dbc63744a0d174086e2ef3,2025-03-26T14:15:27.683000
|
||||
CVE-2023-20613,0,1,b9e134d2f6217071ced16c061aa8582c2090f2710c978787b549509b90760a94,2025-03-26T14:15:27.857000
|
||||
CVE-2023-20614,0,1,064e591aea3018d61466ccc9fc7891160572654a0b0f52209773e2a17399f534,2025-03-26T14:15:28.053000
|
||||
CVE-2023-20615,0,0,883e510daf212c6edc0d1340944a56e2b0521f500d1dbdce172681c6f67ac175,2024-11-21T07:41:13.933000
|
||||
CVE-2023-20616,0,0,193613a083dd6d1fd7c1386d0403d5ab6ff160f6e29176720343022bc0d9c487,2024-11-21T07:41:14.050000
|
||||
CVE-2023-20618,0,0,d0d6f837b8b9d73bd167ef73e8985b6891f1aec0f68346c0ecad3d267bce8957,2024-11-21T07:41:14.170000
|
||||
@ -216532,7 +216533,7 @@ CVE-2023-20850,0,0,2f23c5f1b83f56e918fd896a88f923ade429b0abd6a8450551da87b8ed493
|
||||
CVE-2023-20851,0,0,ad13295b57c6d045f6eb5dc4d8e635c50dbdb18ee2224071e23fc91368fcce72,2024-11-21T07:41:41.720000
|
||||
CVE-2023-20852,0,0,63bf381c38655e9014f7b908e57b9815d22848296454412b7071321723df65da,2024-11-21T07:41:41.840000
|
||||
CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d5f4,2024-11-21T07:41:41.950000
|
||||
CVE-2023-20854,0,0,dacd2e665bd38bf4ba99d80576d86e64bbe079de09ee99a977ca737c5655d81d,2024-11-21T07:41:42.060000
|
||||
CVE-2023-20854,0,1,3fd21afb922bd56fc008b50800b2495770b5431f7d7f37bcb3c9e76180122b2c,2025-03-26T14:15:28.260000
|
||||
CVE-2023-20855,0,0,519e80dc39dfb08aa2fab9b00de3391eedce7c0f70caa8dc1169bc7dbbf22801,2025-03-17T19:15:17.593000
|
||||
CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000
|
||||
CVE-2023-20857,0,0,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000
|
||||
@ -219497,12 +219498,12 @@ CVE-2023-24192,0,0,cd15b721a1def7d2488c8772b14ab5fa194e85c370091b47b7506efb91941
|
||||
CVE-2023-24194,0,0,e4ccdedec4ff686cdb32380992e795162de0f625f141138e9db34036c57ce026,2024-11-21T07:47:33.660000
|
||||
CVE-2023-24195,0,0,d3ad145057770126892eae4c8b1942cfaf61bf44e61fe15530355046295d8f8c,2024-11-21T07:47:33.800000
|
||||
CVE-2023-24197,0,0,59993168d8c8a82128502350a8b2e514e9c3650f951b99db5d8fa52eb29a00da,2024-11-21T07:47:33.953000
|
||||
CVE-2023-24198,0,0,30dab005574fabb61a1bc64aa123e2f1e90d08f5bcfc5d3ab62af88cb6080f71,2024-11-21T07:47:34.100000
|
||||
CVE-2023-24199,0,0,47f1c0e57aa0f599e7b37ec6e99c50fd387e184fd3758ef88a3817aed8bed182,2024-11-21T07:47:34.253000
|
||||
CVE-2023-24198,0,1,59f7b90c591a894063db2a85fd2ad5be45e641826e3abc76bee195169b31b49f,2025-03-26T14:15:28.920000
|
||||
CVE-2023-24199,0,1,2b6b3876429e4e03fdfcdff4e1f089f07756ad717eeddfb6e0bf1906f64e21b8,2025-03-26T14:15:29.150000
|
||||
CVE-2023-2420,0,0,21c37b78d486b076af4063a056c9741c917da2c1f0f0cf7cdb87987114ae94f5,2024-11-21T07:58:35.080000
|
||||
CVE-2023-24200,0,0,82a5920211cc9bb18ca00ac075792b35a5e18b4c92c04a83906a05fff5f39c16,2024-11-21T07:47:34.410000
|
||||
CVE-2023-24201,0,0,c45c396b513b5431443ae840dfbe67cb7bcb1fcf04d75defd8e21f9e1628fc79,2024-11-21T07:47:34.573000
|
||||
CVE-2023-24202,0,0,7520b77fa1eab73335806dadf00f6afd88c584679056f1a2eef92ac20e72eb47,2024-11-21T07:47:34.720000
|
||||
CVE-2023-24200,0,1,76fa4fc4b3d226e3bf87c5c62c7a712186811c0a535cffdcaa1ca3aca3493fb0,2025-03-26T14:15:29.363000
|
||||
CVE-2023-24201,0,1,41dc720936aedebdeff0452b89478c36368d2d4d2c4991249ec07fcc8952bd94,2025-03-26T14:15:29.560000
|
||||
CVE-2023-24202,0,1,84e1d9c8252f35ad40b6810498a4f3b7f7cf09b7d4e4e84a42593ef7c0d1e6f0,2025-03-26T14:15:29.760000
|
||||
CVE-2023-24203,0,0,d214cd8dba2f26d07b8d2405c19634fe1dc920a39a8970fca3b3cb699b52ee5e,2024-11-21T07:47:34.870000
|
||||
CVE-2023-24204,0,0,8d647f4993aac3259b0cd1cda5d7563be021d0ac208e3e41804e4d3946e9bf3e,2024-11-21T07:47:35.097000
|
||||
CVE-2023-24205,0,0,c2e505927e2bfefc7dbaeaa0138b9c3c54bd47a7156afc23a5d1a26123de85c6,2025-03-12T17:15:39.053000
|
||||
@ -241078,7 +241079,7 @@ CVE-2023-52458,0,0,fdc24a051b1b2915fa851fc41d64e4806cb7366ecb0cb857fc4237a1e6d0a
|
||||
CVE-2023-52459,0,0,7a35fca1697526f74e9c91d9f5f8e0238dd61ff49e157d4a65086dd39a1fa0b5,2024-11-21T08:39:49.080000
|
||||
CVE-2023-5246,0,0,71b08073507c72303c6218241cd511240cd963b14c859420de2e31a511697365,2024-11-21T08:41:22.023000
|
||||
CVE-2023-52460,0,0,338eeec63077ab6376c52f951015d601771848b278038c36be56efe838b5e5f8,2024-11-21T08:39:49.213000
|
||||
CVE-2023-52461,0,1,9379cd65f16a21f34aa2ebc3d448001287f403ee64c4d534b309449f67c6de18,2025-03-26T11:41:07.140000
|
||||
CVE-2023-52461,0,0,9379cd65f16a21f34aa2ebc3d448001287f403ee64c4d534b309449f67c6de18,2025-03-26T11:41:07.140000
|
||||
CVE-2023-52462,0,0,b72bf8d417d2d25ff363b15e3e49e57a273650623bc7f75d958db0f0e9c41495,2024-11-21T08:39:49.553000
|
||||
CVE-2023-52463,0,0,6f9a8191f138a8b8e1ea75cd203eab9eaf73fb4337d789766847b4227d0d61f2,2024-11-21T08:39:49.730000
|
||||
CVE-2023-52464,0,0,1bbc4461fd8cead2d72950753b8e090d2ca08426254e292cd801b5c5a924dc48,2024-11-21T08:39:49.893000
|
||||
@ -247727,7 +247728,7 @@ CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332
|
||||
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
|
||||
CVE-2024-1341,0,0,18a405c4f3b1670bb4682ce0d2bacf1a2f13ce190629c8c1f1c6d07cc16f0c27,2025-02-27T03:18:02.077000
|
||||
CVE-2024-13410,0,0,c8efcc0710b923cc6eb60456fcfce89ff0c0c26adea4a60a1c9581e3e6307ba6,2025-03-19T07:15:33.233000
|
||||
CVE-2024-13411,1,1,0617e2ad1f73fcfa473d519329d89e33b2b5aa81c4ab3d1272c419361b63b393,2025-03-26T12:15:13.880000
|
||||
CVE-2024-13411,0,0,0617e2ad1f73fcfa473d519329d89e33b2b5aa81c4ab3d1272c419361b63b393,2025-03-26T12:15:13.880000
|
||||
CVE-2024-13412,0,0,a7c26f2b95654b150dd44aaba7168674e4d0fc6138c51107b5476354f60ef52b,2025-03-19T07:15:33.980000
|
||||
CVE-2024-13413,0,0,b43ed4643dabc8868dcfa53910d76ce2221751b062cab18595b77b8d890794e4,2025-03-11T05:15:37.083000
|
||||
CVE-2024-13415,0,0,20f4b651b70587580f805a97274e0650f9bb61a3067aa9a0bda1ff129a051ce4,2025-01-31T06:15:29.287000
|
||||
@ -248182,7 +248183,7 @@ CVE-2024-13884,0,0,10f7fcc75a4fc204450b358cca600c89abd80738d1e6ea67e85cdd937ea09
|
||||
CVE-2024-13885,0,0,75264973709d612b700dd0d733855b9e045bfa0ed4f3dd1ed0110e51b91a48a2,2025-03-14T17:15:41.520000
|
||||
CVE-2024-13887,0,0,89499ff7ff9d73f249e52c3c47699c4b603d353d5a310262686faceeeb325e58,2025-03-13T04:15:18.680000
|
||||
CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000
|
||||
CVE-2024-13889,1,1,75c1940ee7572976bef4ca467ac2dcab37c382f2c4d252f4ba0c5d0520a00cb4,2025-03-26T12:15:14.590000
|
||||
CVE-2024-13889,0,0,75c1940ee7572976bef4ca467ac2dcab37c382f2c4d252f4ba0c5d0520a00cb4,2025-03-26T12:15:14.590000
|
||||
CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000
|
||||
CVE-2024-13890,0,0,355c25a0b64e2b11b5b17fe1a6fd6a7b791d12ac0c833401d52f3b729f30eb44,2025-03-12T16:48:41.693000
|
||||
CVE-2024-13891,0,0,15d5f22e16d362bc6aa7f84f23a58b6ec9da45506aa8b9c52e0769c2743f78fd,2025-03-14T17:15:41.717000
|
||||
@ -249671,7 +249672,7 @@ CVE-2024-21028,0,0,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bf
|
||||
CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000
|
||||
CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000
|
||||
CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000
|
||||
CVE-2024-21031,0,0,6c3cb7ea7b8afb34e51c401bd8160eb0eba04fe632c5f4b9ab968943d68c3282,2024-11-21T08:53:39.210000
|
||||
CVE-2024-21031,0,1,d2c613cce14f1e8d0f65b6d844d15d36e99dd892ccc5bfd2d4f2c4e048d318a7,2025-03-26T14:15:30.167000
|
||||
CVE-2024-21032,0,0,d866ba7453e451375479bb9ece1d42e7dc9d212a5d44ebbadf8c40772a9012db,2024-12-03T19:15:08.570000
|
||||
CVE-2024-21033,0,0,a190cf24eefe3df88328553d504518f14ded069c8f92a734e4d65b6b23c47b20,2024-11-27T16:30:57.530000
|
||||
CVE-2024-21034,0,0,ae9d308a305bca7ec9458e6d1f48c196a478086ae62d814b7be92c36ade87461,2025-02-10T23:15:11.760000
|
||||
@ -249810,7 +249811,7 @@ CVE-2024-21158,0,0,f78c67c7b7a2a8889d251d744d816fc3970c8c2c9af0b3bdf0fdbc5ec66e1
|
||||
CVE-2024-21159,0,0,bbe3ce3a0b58a01f71158f43541300b4d6fdb30c4aebae8f8deafd5e31560cb8,2025-03-14T19:15:44.500000
|
||||
CVE-2024-2116,0,0,8c6b9ce679687e5a6470a6b4b429a15c165f13f61e11f8d91ba5b3772cba32f2,2024-11-21T09:09:03.783000
|
||||
CVE-2024-21160,0,0,682b113f0ab5e67f54e6f9c1540a647f198391e8c03fe35135f65b3d3e0f3bca,2024-11-21T08:53:54.043000
|
||||
CVE-2024-21161,0,0,373b5050fd44a995656dcf00f8ca1a8ae44fb30dde422db248bfe709d6c07d21,2024-11-21T08:53:54.160000
|
||||
CVE-2024-21161,0,1,1c1ccfb94a0118cd8f2f1e59ed4acd84701866eff7c401eaa2b4e60ce17bcfd4,2025-03-26T14:15:30.330000
|
||||
CVE-2024-21162,0,0,b167ca3f5e6eb1d829a66671152027eba0422ffba46e59b6bf288eebefc30ee8,2024-11-21T08:53:54.277000
|
||||
CVE-2024-21163,0,0,3f9ff522a7e3208378a5962b8a62ba6fa5d09a853a4c6f834c9415a809343380,2025-03-17T19:15:21.793000
|
||||
CVE-2024-21164,0,0,60ed2ad5154234319e608909d6aa6b8df5a629e4fa60a5cff387bbe8786b34cc,2025-03-18T19:15:42.340000
|
||||
@ -253029,7 +253030,7 @@ CVE-2024-2541,0,0,5e4a53f51ba8752f74c9f57c8894c57856dd31a2758293bd1ba5d82829a52e
|
||||
CVE-2024-25410,0,0,34aa3a5dfa0b461c1402bfc8d040049deed5d9d55f98cca2b67ff82eb7e83a3f,2025-03-25T16:59:21.083000
|
||||
CVE-2024-25411,0,0,139eeef6edada50361deb7799ace9009bc429357d81e031e0f6ba067fd7f71f4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-25412,0,0,d5179043597587363b5bafc5d06d1de914933f356a38962f7f4dc9de95c609e3,2025-03-13T17:15:29.430000
|
||||
CVE-2024-25413,0,0,96d3bada534a680d6b00bd4c8f3d59a6a4398e81ff84049059d6b3b17dff556d,2025-01-13T14:34:23.363000
|
||||
CVE-2024-25413,0,1,ecb5621bbf7e3e04dceea8d9bde40a127e7c59c84eb6a988c7e0d2d9d20fc18a,2025-03-26T14:15:30.490000
|
||||
CVE-2024-25414,0,0,7418f702b21691b77dd56f68a3739785d38e6a10ad9224149c829d71e21a2d2e,2025-03-14T19:15:45.353000
|
||||
CVE-2024-25415,0,0,8f911b9a1d1f98e52fdc9a7145ba7a1f87f3944fc95d6b97a9000411d18ab412,2025-01-13T14:19:37.827000
|
||||
CVE-2024-25417,0,0,c29b6ab1323bd95346fedf8b44c41ad4566effb574b7f727557255b45f598d68,2024-11-21T09:00:46.457000
|
||||
@ -254893,7 +254894,7 @@ CVE-2024-2767,0,0,63fb7925e3ed607eb8169902b3e027c065fc9d1cd4958d404a1ac76e9d79ea
|
||||
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
|
||||
CVE-2024-27674,0,0,34ccb3f85191f3225246fe31e6b6aa02ad062724f279521d20a183c721e94258,2024-11-21T09:04:52.927000
|
||||
CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab40e,2025-02-21T17:07:47.053000
|
||||
CVE-2024-27680,0,1,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
|
||||
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
|
||||
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
|
||||
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
|
||||
CVE-2024-27689,0,0,b8125c9204d9b7912d4a758cf2a362c6f50eefc46a69eade4a7f53332972070e,2024-11-21T09:04:53.813000
|
||||
@ -254964,7 +254965,7 @@ CVE-2024-2779,0,0,dacce2c27e96eef096b887cc0a7633872387d792cf54d816daebdb6ca6cf8c
|
||||
CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000
|
||||
CVE-2024-27791,0,0,cced26eba1922f922a989a68f8969cd506e95668cebd2d4731d8f0f634e4325a,2024-12-12T14:33:00.640000
|
||||
CVE-2024-27792,0,0,9250caa2e43a6741d177d6e4ce22631bab55e30376cf1dbde675ce33436694e3,2025-03-13T15:15:42.490000
|
||||
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
|
||||
CVE-2024-27793,0,1,d22abe8412fec76d7b57526eb5dd12ab49cdb6d769471bc72bb4ceb9e255116c,2025-03-26T14:15:30.717000
|
||||
CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000
|
||||
CVE-2024-27795,0,0,bc61503adf68bef3d0b5e26c5cbd2e390ccfc5f4b81aa9046af70ee4c1a76aca,2025-03-25T15:15:20.160000
|
||||
CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000
|
||||
@ -259119,7 +259120,7 @@ CVE-2024-33300,0,0,fcfcc67a598fdec5020eaee48abef6ddc9c4f0ced0fdd6058b024ed4c721c
|
||||
CVE-2024-33302,0,0,57b80549fd8096e59e00a3e7e11124741f0adff181ffcd73a2aeb26a71758fd2,2024-11-21T09:16:46.207000
|
||||
CVE-2024-33303,0,0,788999d70993e4029560429717cb0a5b52e1c75a670c402df99e894a2e38bb1f,2024-11-21T09:16:46.433000
|
||||
CVE-2024-33304,0,0,29c021a3880698e20fcd7d239a85eabb88a80ce4d09af7c66815d1b48c062b25,2024-11-21T09:16:46.643000
|
||||
CVE-2024-33305,0,0,39c22d35e3562bdb79ef9b94d579c5d05f2d13e3849ca8bc054acbb20dec764b,2024-11-21T09:16:46.857000
|
||||
CVE-2024-33305,0,1,d872ba3229a671ba7898ca454c70b19f41ac4e35e9973c9cddb7f3043c93b4c1,2025-03-26T14:15:30.893000
|
||||
CVE-2024-33306,0,0,c674ae8e870d8ea7b9496d624021eb490db8e79bf45d8ae6b6305d0dc1c3b509,2024-11-21T09:16:47.003000
|
||||
CVE-2024-33307,0,0,ac7d56af44afb2c2b4a91577f9c8dba989c4554f34f5f7b59ad656ea25cfee5d,2024-11-21T09:16:47.213000
|
||||
CVE-2024-33308,0,0,00a8a2c0784c175809445a9a47d85dd5333b912b9bfcfcc130d47e205cafb559,2024-11-21T09:16:47.373000
|
||||
@ -262071,7 +262072,7 @@ CVE-2024-37114,0,0,0e338f534866d330a95b36232ba1ac57a12c5fc7a905167a67cb049f659de
|
||||
CVE-2024-37115,0,0,e783651c356206b0d0b31091b1d7fdfd8f50e51711b29e1739f1f53f55192af0,2024-11-21T09:23:13.233000
|
||||
CVE-2024-37116,0,0,cf2143b54808e0aa7e8042d88b1d855be0847ac1fdf8dbc22640fe116a8cfd55,2024-11-21T09:23:13.350000
|
||||
CVE-2024-37117,0,0,db6e34898cd1468733f11ea5de79282847ac1f5f907a8cc52b2cc65080ab13fc,2024-11-21T09:23:13.483000
|
||||
CVE-2024-37118,0,0,fb2b539fa334d7e96ecde036ef99a895ef31afb2c0069848ea82a536967f0937,2024-11-21T09:23:13.883000
|
||||
CVE-2024-37118,0,1,613312a0488d2b2f2e413fa130dac83c77460fac2193c3c1f1170ceca593a3fb,2025-03-26T14:15:31.097000
|
||||
CVE-2024-37119,0,0,b33708c838e59527facebb450a717de1c655f54d3e3de992a1177004b7a5ce61,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37120,0,0,d2171da3b8d523afb143949d3bcb23ff59f6918dac6368d589ddec24b7e960af,2024-11-21T09:23:14.157000
|
||||
CVE-2024-37121,0,0,a18f9282725a0239063debc58ac94387d74058dfc6c6f36c75c46cdc5c5d0bc9,2024-11-21T09:23:14.317000
|
||||
@ -263083,7 +263084,7 @@ CVE-2024-38272,0,0,a428282e2328d115eecf027212d7fc44c92f6e65ea02e4ce22f32e52f49e0
|
||||
CVE-2024-38273,0,0,583e36b17ccf9fd546e6b0c478617c872f29a6e7c94358acfe51e69d63fecdb5,2024-11-21T09:25:12.970000
|
||||
CVE-2024-38274,0,0,14859913700373232d1af86c32719373e3e620e9eda58d5d2c9a70ab987de6d1,2024-11-21T09:25:13.803000
|
||||
CVE-2024-38275,0,0,1e0d1b69d41da113a39375d1ef0adf52c5ccf90721d4eac00b4fba35587e90d9,2024-11-21T09:25:14.183000
|
||||
CVE-2024-38276,0,0,94c0cbf0f09804bab99e38b9e7d30d690011db3de0246b8176ea07ec6802bd60,2024-11-21T09:25:14.557000
|
||||
CVE-2024-38276,0,1,4eed17c921642b4e32f31f7232bcd28979704d3d93ebd0a1d7775251bc728751,2025-03-26T14:15:31.260000
|
||||
CVE-2024-38277,0,0,6230d2e29114abb120b6de444e537d1a8333d5585a5b7abfd9c68149afd1cc24,2024-12-04T17:15:13.600000
|
||||
CVE-2024-38278,0,0,b856e3395f4b8ae00a5aca2db9013fbf8a63a31489f5c2d30d69c2819fbe7a94,2024-11-21T09:25:15.127000
|
||||
CVE-2024-38279,0,0,eeff22a05d58c637b41c8a0a9d81b68926d0e144c0c12891e0709d171d9db2bf,2024-11-21T09:25:15.470000
|
||||
@ -268421,6 +268422,7 @@ CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303
|
||||
CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23de3,2025-03-14T17:15:47.590000
|
||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||
CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000
|
||||
CVE-2024-45351,1,1,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000
|
||||
CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000
|
||||
CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000
|
||||
CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000
|
||||
@ -276349,7 +276351,7 @@ CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee
|
||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
|
||||
CVE-2024-56898,0,0,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
|
||||
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
||||
CVE-2024-5690,0,1,14af1e261c62ea8d86b88db2c6193508d93346579e927b833ccae3d6b9c2bcad,2025-03-26T14:15:31.660000
|
||||
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
|
||||
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
|
||||
CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7888,2025-03-04T22:15:39.547000
|
||||
@ -281733,7 +281735,7 @@ CVE-2025-1307,0,0,f5a65a0d70e64918e5c1a7d1d02a502ae3db9a76fffe081c38f2a5d059c1eb
|
||||
CVE-2025-1309,0,0,5d2b17215fed7de1b66f6e9e5fd86a1c64bff76093266d0c2270f4eeb2161dcf,2025-03-07T08:15:42.017000
|
||||
CVE-2025-1310,0,0,1c2d4505468bb908c19a864be72e2bdc6591212daaa3ccd957c82c76cf5add42,2025-03-26T10:15:14.653000
|
||||
CVE-2025-1311,0,0,f6c7853d29144d30e1440fe649502c47ee37834c55b5d3f4a34600897bc61e58,2025-03-22T07:15:24.433000
|
||||
CVE-2025-1312,1,1,d05a4b623df796da515f6bec12f5c229ea8c9f0dba981198b466e753d000b131,2025-03-26T12:15:14.890000
|
||||
CVE-2025-1312,0,0,d05a4b623df796da515f6bec12f5c229ea8c9f0dba981198b466e753d000b131,2025-03-26T12:15:14.890000
|
||||
CVE-2025-1314,0,0,bafad489ff1eadbb41395d6cf3743ce464b25bb7da82ca4e71ee61d8353e849a,2025-03-20T06:15:22.437000
|
||||
CVE-2025-1315,0,0,b2e5cb43d68af8915879a41f899eac8effc6f5ff149f94a7a5bed3683712a9b7,2025-03-13T15:00:51.697000
|
||||
CVE-2025-1316,0,0,c2931120323888406b8ead50daf4943444c62f5ffe8d72bd7b5c79484ca09a72,2025-03-25T16:46:07.540000
|
||||
@ -281877,7 +281879,7 @@ CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf
|
||||
CVE-2025-1538,0,0,13e428f2e0a70ca29f792d43841bea06ccb32609b695e1ccad7a3e5c918f65a6,2025-02-25T20:54:42.947000
|
||||
CVE-2025-1539,0,0,5be918eac13b456089d712df20e654187887e4c08708a48e1848fdb356188426,2025-03-03T16:36:49.113000
|
||||
CVE-2025-1540,0,0,cb4999aaeeb60402765c3628ea219ecf33f2a8090fd69a8d886ff441036aa008,2025-03-06T09:15:26.317000
|
||||
CVE-2025-1542,1,1,4e2adf2ff25372013a2918c53c097d77c36d83ea6791050655febde2e8aa25a1,2025-03-26T11:15:38.240000
|
||||
CVE-2025-1542,0,0,4e2adf2ff25372013a2918c53c097d77c36d83ea6791050655febde2e8aa25a1,2025-03-26T11:15:38.240000
|
||||
CVE-2025-1543,0,0,dfb74998b01a6403cafc6b46cb4c4c78345f8468d3e985eba5ddcbda95801293,2025-02-21T16:15:32.787000
|
||||
CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de177,2025-02-21T16:15:32.953000
|
||||
CVE-2025-1546,0,0,51ef3cbc8ac56bb33fe743735a6d072664b6eb44d4e8fe737f496fc69a6fe775,2025-02-21T18:15:21.523000
|
||||
@ -282018,7 +282020,7 @@ CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa0910
|
||||
CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000
|
||||
CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000
|
||||
CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000
|
||||
CVE-2025-1769,1,1,bc5badcb36958e1f8f1dd29e22fb474934c2e43fca72c5983c3edb91637d4ceb,2025-03-26T12:15:15.040000
|
||||
CVE-2025-1769,0,0,bc5badcb36958e1f8f1dd29e22fb474934c2e43fca72c5983c3edb91637d4ceb,2025-03-26T12:15:15.040000
|
||||
CVE-2025-1770,0,0,dabca41c99283c1e30c784be93a5fbf7941611623d961fbc22d34f6c0b873c34,2025-03-20T06:15:22.903000
|
||||
CVE-2025-1771,0,0,f941eeb87406f27b32688fc24536403440e01c6f12dad32afe5e745de8f06ad7,2025-03-15T05:15:47.253000
|
||||
CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92e5,2025-03-15T05:15:47.403000
|
||||
@ -282125,9 +282127,9 @@ CVE-2025-1903,0,0,6d340e8ed917a821f64df99818d24e210d21c9915d508adde3298f17a8197a
|
||||
CVE-2025-1904,0,0,f1403f89463521fa6ecf20ea0b63150d28c96f5825eb8230b39ee2a81e24b378,2025-03-06T12:20:33.473000
|
||||
CVE-2025-1905,0,0,2b4eb6efb4aab05c0b5f79955f2e8fa7379c3a611db1f2d5266246ca15810f0c,2025-03-06T12:21:06.503000
|
||||
CVE-2025-1906,0,0,25be12853bbdada8a0f0b6f9783f2e12a1ead904ee5fe2efcc8d708d8d5a84e0,2025-03-06T12:17:27.613000
|
||||
CVE-2025-1911,1,1,fda2ee948a7e9dc10da88e86e64ec48c3e958c0e13e09dddebed25db73a20631,2025-03-26T12:15:15.197000
|
||||
CVE-2025-1912,1,1,52e94094a51833e8f6daebbbcb34134e997db747948d39dc047a1d5773606455,2025-03-26T12:15:15.353000
|
||||
CVE-2025-1913,1,1,b97da76f8fdcb485607fc8cacd478099fc4d9428d282394b8b42280342910b19,2025-03-26T12:15:15.513000
|
||||
CVE-2025-1911,0,0,fda2ee948a7e9dc10da88e86e64ec48c3e958c0e13e09dddebed25db73a20631,2025-03-26T12:15:15.197000
|
||||
CVE-2025-1912,0,0,52e94094a51833e8f6daebbbcb34134e997db747948d39dc047a1d5773606455,2025-03-26T12:15:15.353000
|
||||
CVE-2025-1913,0,0,b97da76f8fdcb485607fc8cacd478099fc4d9428d282394b8b42280342910b19,2025-03-26T12:15:15.513000
|
||||
CVE-2025-1914,0,0,187c21953cf4a3bb0942d3a4ab2c435e7f496e314b9f90d9d30af8457a4151bb,2025-03-05T15:15:15.560000
|
||||
CVE-2025-1915,0,0,8c5ae217f132591a153953e83bf0fd453c3706a9955aee72137219d75a19a23c,2025-03-05T15:15:15.743000
|
||||
CVE-2025-1916,0,0,089ca37827fcfe2123f7e680bf24d5eeed87218e78fb702864a4ae52e0027b8e,2025-03-05T15:15:15.900000
|
||||
@ -282427,7 +282429,7 @@ CVE-2025-21092,0,0,03af17d12271d3564885d10071c53bea8826591d692686e1c0d8803603e1f
|
||||
CVE-2025-21095,0,0,c386ac503377b743afd9fcbb59e3f9db50d4310fdf761d76706a482de8cda7b5,2025-03-05T16:15:37.487000
|
||||
CVE-2025-21097,0,0,56c8f54b537437305f22923caf43b164fc28222de6fd60b26bf16c417f5c9c3c,2025-03-06T18:07:39.457000
|
||||
CVE-2025-21098,0,0,dc52a3f16e39fecc93d1ee27a67287d6db18a4b95402eb98c08a4da2374cbce4,2025-03-06T18:08:03.217000
|
||||
CVE-2025-2110,1,1,2dc6f3ad983af11b81f9e9f47b8d3392e7d319c21fd83923f4df7d536bfee3e7,2025-03-26T12:15:15.827000
|
||||
CVE-2025-2110,0,0,2dc6f3ad983af11b81f9e9f47b8d3392e7d319c21fd83923f4df7d536bfee3e7,2025-03-26T12:15:15.827000
|
||||
CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000
|
||||
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
|
||||
CVE-2025-21103,0,0,e47eb06001984d8500d168dff51756d65a465cd5cf145d2cfc8ed0911d350714,2025-02-17T14:15:08.597000
|
||||
@ -283184,6 +283186,7 @@ CVE-2025-22273,0,0,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb76
|
||||
CVE-2025-22274,0,0,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
|
||||
CVE-2025-2228,1,1,7c4dbf9df3e2041d0f72623d538d0cfea3524f59e553085385573320f86576ff,2025-03-26T13:15:36.373000
|
||||
CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000
|
||||
CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000
|
||||
CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000
|
||||
@ -283755,6 +283758,7 @@ CVE-2025-2320,0,0,54ae946db1d94a75f9dee3622c14a5b8a38a4658dc5f404d7fbaa5736fae52
|
||||
CVE-2025-23200,0,0,fcacc2d32c11a77659f45b1c51ab5a2465fad7ac9e692296dea6d4d1e65fa678,2025-03-25T15:12:30.793000
|
||||
CVE-2025-23201,0,0,4d8c8be7d792ec95ab743052e2d6709ed532d05183a33bd3169c195787cd72a5,2025-03-25T14:57:12.250000
|
||||
CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83bb0,2025-01-17T21:15:11.713000
|
||||
CVE-2025-23203,1,1,779e9fb4b3e6743c7670bff2c8e35aa04cae5b5468ccae62545313736f6b0e82,2025-03-26T14:15:32.250000
|
||||
CVE-2025-23204,0,0,852563d4629aa8d2f2c033762b9d2f2c48787d0793c09ac0c2cd01bbaa7239d7,2025-03-24T17:15:20.417000
|
||||
CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000
|
||||
CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000
|
||||
@ -284897,6 +284901,7 @@ CVE-2025-24804,0,0,f7d104b626bdf579e836087298c08c14a0ce3cc2eea658e65d733074620ff
|
||||
CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537407,2025-02-05T19:15:46.487000
|
||||
CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000
|
||||
CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000
|
||||
CVE-2025-24808,1,1,0aa13ed25a26648a2b5dcde507dfbc4d121d040e062cdf4833c05f1c70d9015e,2025-03-26T14:15:32.417000
|
||||
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
|
||||
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
||||
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
||||
@ -285138,7 +285143,7 @@ CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aa
|
||||
CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000
|
||||
CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000
|
||||
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
|
||||
CVE-2025-25193,0,1,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e690105ec,2025-03-26T13:14:32.087000
|
||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
|
||||
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
|
||||
@ -285218,10 +285223,10 @@ CVE-2025-2536,0,0,6c8f59f7c1397de65b62b4e0ffba855ba6e95346e685349bc06dd79321df74
|
||||
CVE-2025-25361,0,0,9f115844287b15ce6dc125807b19b8e446ec3f37878f01ccb8db0422e8bb780e,2025-03-07T20:15:37.673000
|
||||
CVE-2025-25362,0,0,c8d9b00ad653f3fefb15ba0fdb75a1597ea822f23192e332e875ad1563a7f537,2025-03-06T15:15:17.277000
|
||||
CVE-2025-25363,0,0,2ff7284dab4cf6e7dac449878bc4c3befcaefea48f9623fa86a7928dded159ae,2025-03-19T19:15:44.390000
|
||||
CVE-2025-25371,0,0,88b63a5350e0e602b1196160ea76918c39c74c36267dc493de3c33c8292924a7,2025-03-25T21:15:41.907000
|
||||
CVE-2025-25372,0,0,d97b90d55cf576c67e4c0bc6a2de4a571c71921f86cf7bba487eb4af33d886d9,2025-03-25T21:15:42.027000
|
||||
CVE-2025-25371,0,1,801e4b37189c9dad7fb5e2e3396fb3093f554bca1f5d91f21ec9b2ccbd67a971,2025-03-26T14:15:32.570000
|
||||
CVE-2025-25372,0,1,bd6c798a3d63a7e4b9e6386b41594605579638469d2ad087e0afb7050c816f73,2025-03-26T14:15:32.750000
|
||||
CVE-2025-25373,0,0,7e04f63e8920527d9c23c4bf431b95c25c533789674eda06c7715d56abc84e7f,2025-03-25T21:15:42.140000
|
||||
CVE-2025-25374,0,0,4e7418487958e762ae51eab65af43636665c6a65ac15f76ffdafd52dac3286b5,2025-03-25T21:15:42.250000
|
||||
CVE-2025-25374,0,1,7d8ed1f91d3b52bd8231a49b1c9b1c1eed580edf57511466a9bc5a1b312dc6a8,2025-03-26T14:15:32.930000
|
||||
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
|
||||
CVE-2025-2538,0,0,f2c0784ab082ec7998020fccbee47813e4a5143320b7cba59c05b6b8071d6104,2025-03-25T14:15:29.270000
|
||||
CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000
|
||||
@ -285442,7 +285447,7 @@ CVE-2025-25952,0,0,733f7d41a569ab0086bde2648edacf6a1480bd27bad80edec358adfce1ddd
|
||||
CVE-2025-25953,0,0,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b025,2025-03-05T17:15:15.810000
|
||||
CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000
|
||||
CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
|
||||
CVE-2025-2596,1,1,4c94c23c20af6ad264e3d4fbadeebf650d242c9fafd94b949253e5235652ab1b,2025-03-26T11:15:39.183000
|
||||
CVE-2025-2596,0,0,4c94c23c20af6ad264e3d4fbadeebf650d242c9fafd94b949253e5235652ab1b,2025-03-26T11:15:39.183000
|
||||
CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000
|
||||
CVE-2025-25967,0,0,989386a4237cbda80018de244f1663bcd7537e8be154d2ce1f656a6eb97ba253,2025-03-06T12:25:50.837000
|
||||
CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000
|
||||
@ -285623,7 +285628,7 @@ CVE-2025-26534,0,0,ab467a5c9c98bcf93d9b7ea4108c47f6694cf2610d3631b8a1fb0fc39b004
|
||||
CVE-2025-26535,0,0,565367cf0af5ec55fb84aa51b9f3cdbadac3508258cd3a35844455f68691b45e,2025-03-03T14:15:54.900000
|
||||
CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000
|
||||
CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000
|
||||
CVE-2025-2654,0,0,58b7251fcb2327098709236979de9e00fe7c93fa7a4a8e55b8e5e5a1ed218067,2025-03-24T13:15:27.943000
|
||||
CVE-2025-2654,0,1,9e79f29088bbaf11c5508f96c7fac0e9b201880a1d7548c53811e79a32728bf7,2025-03-26T14:54:37.560000
|
||||
CVE-2025-26540,0,0,08a03edcb3fb5cbf83ab6f143d7641096163430d54f5e1cdf4c07f2284606837,2025-03-03T14:15:55.037000
|
||||
CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000
|
||||
CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000
|
||||
@ -285726,11 +285731,11 @@ CVE-2025-26706,0,0,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e74
|
||||
CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000
|
||||
CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000
|
||||
CVE-2025-2671,0,0,ff323274946feee978f3035f65d2b13b8471bd80748e845b932a8fcd6a7349f8,2025-03-23T22:15:13.513000
|
||||
CVE-2025-2672,0,0,e60be056000c3794aeb40f03b1dcc605d5a476eed5bfdaa50ce9047fc277f17a,2025-03-23T23:15:13.847000
|
||||
CVE-2025-2673,0,0,2ac1749d8d95232b7c846038cd89aa75eea434347b3a8ea44c68691c31d5aef0,2025-03-24T00:15:12.467000
|
||||
CVE-2025-2674,0,0,95659c8444f57d3f93cedcbe0d2d5c415745fe292281900a5ec3057139e7b063,2025-03-24T00:15:13.533000
|
||||
CVE-2025-2672,0,1,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b322,2025-03-26T14:37:30.087000
|
||||
CVE-2025-2673,0,1,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000
|
||||
CVE-2025-2674,0,1,234b19a0f4d2045310cc995f98433e6e71ee9c2c3ff27b3472c279a410384106,2025-03-26T14:09:08.730000
|
||||
CVE-2025-26742,0,0,d153ad3877dccd4a4de0cc8817c1b7a7991210fc5c296b3ca1c8b12dcf86929e,2025-03-25T15:15:24.803000
|
||||
CVE-2025-2675,0,0,864573dee006d6a0afd7d678790325514acf3894e9839d4ef1138fac8ea9dfbe,2025-03-24T01:15:16.490000
|
||||
CVE-2025-2675,0,1,a44c23b3c6eb403feede7f07b62a3195c75d0aaf189d379810936f38997636fe,2025-03-26T14:03:31.380000
|
||||
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
|
||||
CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000
|
||||
CVE-2025-26752,0,0,de5f26c0c725b106ce7f39cb1c013f91e7db3ad53711569dd4e04f93f6febcc6,2025-02-25T15:15:23.597000
|
||||
@ -285741,7 +285746,7 @@ CVE-2025-26756,0,0,a7d018e1af803d931a8df90ebdc612d9159f81541f17aec331fcf30be95f9
|
||||
CVE-2025-26757,0,0,80d208c1ae63305798dd96e121d883ba1652b7f9f061f31e63f086130d7d717b,2025-02-22T16:15:31.493000
|
||||
CVE-2025-26758,0,0,25b40533aee409aa2cd331b2ce18cbaf3edeb379df8662b725fd0ff6cbb28f34,2025-02-17T12:15:28.407000
|
||||
CVE-2025-26759,0,0,711cfe1a3f1e64585c04ae86c12c769c732825e1fb249553e9081d3ae4e51992,2025-02-16T23:15:10.777000
|
||||
CVE-2025-2676,0,0,94b0ded74705d14e973110e2e49a6cbe6a9f59e1b96c1d37226f2cd248187696,2025-03-24T01:15:17.177000
|
||||
CVE-2025-2676,0,1,f651abf35c4fd02355a5eedd8dc46ad5582fdbba97477491fd397ab68e7704ef,2025-03-26T13:55:26.630000
|
||||
CVE-2025-26760,0,0,6ce75bdb24ca7f76541cf2fd588811a129a1da7e93670a47e5e982b0f015f1a0,2025-02-22T16:15:31.633000
|
||||
CVE-2025-26761,0,0,00fb3a7da1af944660d71a3efffc99fa612b6b6a3bd94f13b9ebbbe6b2a8b567,2025-02-16T23:15:10.920000
|
||||
CVE-2025-26763,0,0,51c2f2b0f162ff62e0ae405c36d1c1d4c6cd19c1cec4a143ce94453f0be82b6c,2025-02-22T16:15:31.773000
|
||||
@ -285751,7 +285756,7 @@ CVE-2025-26766,0,0,6fee40560b10bf615ff77815533156ec331161a872ec1edc4de985dac44c7
|
||||
CVE-2025-26767,0,0,a90bd9c7131cd1561c4ae5dbfe01302d49d2ae2d85536054fa888129574ed5cd,2025-02-16T23:15:11.350000
|
||||
CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a05b,2025-02-16T23:15:11.487000
|
||||
CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000
|
||||
CVE-2025-2677,0,0,90dff24a69e6bd6b85e91ff08f3496e9f1ae8ed6b2c96ddc7e08b5ba2cd649b3,2025-03-24T02:15:15.540000
|
||||
CVE-2025-2677,0,1,38d8cf48265c9b7e92bbc3a46f3b767ff2a93a7fc7e35c0cd70297734f40d657,2025-03-26T13:48:38.670000
|
||||
CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000
|
||||
CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000
|
||||
CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
|
||||
@ -285761,15 +285766,15 @@ CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c04
|
||||
CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000
|
||||
CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000
|
||||
CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000
|
||||
CVE-2025-2678,0,0,3d9b311d89b438e0907180ef397afd1a0490362bb650dc0c77fdd6b6d8fec1d1,2025-03-24T03:15:14.573000
|
||||
CVE-2025-2678,0,1,7e1a91aed29821d8f3580fde3c82f83b41d6d7459dd9f3cbdc7289217ba1ab54,2025-03-26T13:42:31.437000
|
||||
CVE-2025-26788,0,0,5fac6b93304aa80bc7a573b7eaa3933fb509b5a737cf70fd7551789f71a19205,2025-02-15T16:15:30.090000
|
||||
CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2c79,2025-02-14T08:15:31.357000
|
||||
CVE-2025-2679,0,0,169f41591fb4905806636fc9e7f300f9215918ca1a085683c3b503ecafc3764b,2025-03-24T03:15:15.553000
|
||||
CVE-2025-2679,0,1,fc23340601b0242e345b387da555239ec620056960eb96b4e1c5fddfa9cab616,2025-03-26T13:35:46.297000
|
||||
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
|
||||
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
|
||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||
CVE-2025-26796,0,0,b75ca789edaf2db40a83c7e39a3f34d24eef54f2ef7ca40bedf7bca90f834758,2025-03-24T14:15:18.500000
|
||||
CVE-2025-2680,0,0,5b2d82e1da8d4f5b5849755dc0c1154d4196889828cbec1024ab3bf93e06c00a,2025-03-24T03:15:15.727000
|
||||
CVE-2025-2680,0,1,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040da0,2025-03-26T13:23:41.867000
|
||||
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
|
||||
CVE-2025-2681,0,0,78ee3ddf825d238c6f883ba830d0eb70659b8c1893a974fe40f8558dd8fa6674,2025-03-24T17:37:02.203000
|
||||
CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000
|
||||
@ -286136,8 +286141,8 @@ CVE-2025-27521,0,0,238fcbb4ddab85c97db2ebf1a5930f855cf28b2ad902f1b11a70a00fedb15
|
||||
CVE-2025-2753,0,0,c4f223f01f43a4bc41fb6e6000479abc3fcfdfa8bea381ce5d291229dae4b9e3,2025-03-25T09:15:17.247000
|
||||
CVE-2025-2754,0,0,a326bc3858285141a99f7245126546f196cdca853219c40a22fbd6bab233bcc7,2025-03-25T09:15:17.730000
|
||||
CVE-2025-2755,0,0,2be4e1e06353a961288a1ac89a57890790aa2d17e4e656d7cb4215a8ecda9be5,2025-03-25T09:15:17.983000
|
||||
CVE-2025-27551,1,1,9fbc2489ec80e9de647c2e8ff1734eff43438393501575b7372498c02dea54d9,2025-03-26T11:15:38.943000
|
||||
CVE-2025-27552,1,1,57a3ef3068d58ee4a0b541b28f35dc104129aded6f6e2313b1880a5379244811,2025-03-26T11:15:39.063000
|
||||
CVE-2025-27551,0,0,9fbc2489ec80e9de647c2e8ff1734eff43438393501575b7372498c02dea54d9,2025-03-26T11:15:38.943000
|
||||
CVE-2025-27552,0,0,57a3ef3068d58ee4a0b541b28f35dc104129aded6f6e2313b1880a5379244811,2025-03-26T11:15:39.063000
|
||||
CVE-2025-27553,0,0,183dc3a86b8b1f61354b767d69fc5cfccf39fac83a814abf975899e48ebf1d50,2025-03-24T14:15:18.687000
|
||||
CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000
|
||||
CVE-2025-2756,0,0,58b5bd5add05519b3703c9867b1ef41f7806d55535cab28fb5b5ea6f68937930,2025-03-25T10:15:16.627000
|
||||
@ -286264,14 +286269,14 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f
|
||||
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
|
||||
CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000
|
||||
CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000
|
||||
CVE-2025-27830,0,0,45b45915bc610574d2c272796816f37cd9ca4264142af3c70b776a92b7e6c99f,2025-03-25T21:15:42.353000
|
||||
CVE-2025-27831,0,0,599b93e020e38fe8b09fe78fc24f93b428861fd2ecb23e85266845352701a8b4,2025-03-25T21:15:42.467000
|
||||
CVE-2025-27832,0,0,acea1da6f42641f7bfd51f4656d93617e01558eebf4e1a93db99dde751012d92,2025-03-25T21:15:42.570000
|
||||
CVE-2025-27833,0,0,79093008bec95a39f2dd9a54c903c71e97633a120d365afd5888ba18158fdcf3,2025-03-25T21:15:42.683000
|
||||
CVE-2025-27834,0,0,30be74f855287a77a94112ee8d783753c9be2a7bca8b5601abce70c053e886d8,2025-03-25T21:15:42.870000
|
||||
CVE-2025-27835,0,0,60a5f486140c23f117bdc283eaa0352fd406fef7d0adcc349d5e76860f3ebe8c,2025-03-25T21:15:43.013000
|
||||
CVE-2025-27836,0,0,d773496d750e9b8bf163a6baf12e748b997bdea6865f9bb6dd6af045a1746faa,2025-03-25T21:15:43.137000
|
||||
CVE-2025-27837,0,0,ff1467d3d2b53490dd0f9767d4e375a427dded62490d067e8bac1ab9606da74d,2025-03-25T21:15:43.250000
|
||||
CVE-2025-27830,0,1,591d304aa3413454e6c36f403d57e6e7fb68dd3e87c7475e01da8a6cc7ee321c,2025-03-26T14:15:33.113000
|
||||
CVE-2025-27831,0,1,a856c87addb965c8d40d0fec7d4afbf3a702b291a038c6e068c8005453755f7a,2025-03-26T14:15:33.290000
|
||||
CVE-2025-27832,0,1,f9356ac13ae89841b48c3557e37745524f648c2c9dd9a4890cf23e515298b004,2025-03-26T14:15:33.483000
|
||||
CVE-2025-27833,0,1,475cd4728a7a1a1a0747a86c93b884ca8116e42396c94a241c7a930af361307e,2025-03-26T14:15:33.680000
|
||||
CVE-2025-27834,0,1,89a3f5a622cd820cd9e0d428b7820c2a7c682650c72c84824fec35fd0c9090a4,2025-03-26T14:15:33.867000
|
||||
CVE-2025-27835,0,1,91cae51ecf99354b5ec210871fc28ef49c2dd1e14b195c8c2246a12caff661ea,2025-03-26T14:15:34.057000
|
||||
CVE-2025-27836,0,1,14e100902788579e844a415137e5577df44c2a330e72f88e240d32b8e8d8328c,2025-03-26T14:15:34.253000
|
||||
CVE-2025-27837,0,1,ffcf6acdc5938d9300228367dc8e762a2ebbd0b34f218cd6fb26e12c8e2bf13c,2025-03-26T14:15:34.440000
|
||||
CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000
|
||||
CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000
|
||||
CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000
|
||||
@ -286423,7 +286428,7 @@ CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5b
|
||||
CVE-2025-29789,0,0,1c633e11107467992fc71529da9430044de9bd0ee056bad183e53d21d3a98dc7,2025-03-25T21:15:43.363000
|
||||
CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000
|
||||
CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000
|
||||
CVE-2025-29806,0,0,a35a41b55c2532a6a7b5d5365a6e904c2be7b4ba79db1ad5389566415b6789e8,2025-03-24T13:15:26.083000
|
||||
CVE-2025-29806,0,1,a0731b88c2dc4e18b008ec219ba55467523f3caa42666518a3bc46a169274d95,2025-03-26T14:50:45.523000
|
||||
CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000
|
||||
CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000
|
||||
CVE-2025-29891,0,0,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000
|
||||
@ -286500,7 +286505,7 @@ CVE-2025-30213,0,0,07d038b7f8cbba366d7d7089646b379e2d42b8eacb99af017cd5481988eed
|
||||
CVE-2025-30214,0,0,45af31722af71f686115a72cd03f20a765bbb57d5c106731d43d97862d46ec16,2025-03-25T15:15:26.460000
|
||||
CVE-2025-30216,0,0,3c250555862a00c85e62f5af912e4703f1addd59a33c81c242c247fcda4637ab,2025-03-25T20:15:22.567000
|
||||
CVE-2025-30219,0,0,66bcfd7287f996f51dac83b22863b0043a284b85a69d60a646aeb12737a881d2,2025-03-25T23:15:36.560000
|
||||
CVE-2025-30222,0,0,dc75ff60780411177c40fb28315eb43b7ca3f3d3edeb99386ab4edb0a05d8049,2025-03-25T23:15:36.707000
|
||||
CVE-2025-30222,0,1,8ac52073be044af5c89f8460a87904edf3bd6e6d29d9ffdf89ef9b568874274d,2025-03-26T14:15:34.817000
|
||||
CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000
|
||||
CVE-2025-30235,0,0,9222f9a2278ce550ac692bab27bb8a819d1de8dee62df51cf264df3162d55e58,2025-03-19T06:15:16.043000
|
||||
CVE-2025-30236,0,0,3f73c2c498a83243d93d66190e1e818a0ccbcdd521592f269afac288686f067a,2025-03-19T07:15:34.313000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user