mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-19T16:00:20.308673+00:00
This commit is contained in:
parent
c95081a347
commit
5386f51c9c
@ -2,174 +2,15 @@
|
||||
"id": "CVE-2021-47144",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-25T09:15:08.950",
|
||||
"lastModified": "2024-12-17T14:49:22.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T14:15:24.327",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: fix refcount leak\n\n[Why]\nthe gem object rfb->base.obj[0] is get according to num_planes\nin amdgpufb_create, but is not put according to num_planes\n\n[How]\nput rfb->base.obj[0] in amdgpu_fbdev_destroy according to num_planes"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu: corrige la fuga de refcount [Por qu\u00e9] el objeto gema rfb->base.obj[0] se obtiene seg\u00fan num_planes en amdgpufb_create, pero no se coloca seg\u00fan num_planes en amdgpufb_create num_planes [C\u00f3mo] poner rfb->base.obj[0] en amdgpu_fbdev_destroy seg\u00fan num_planes"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.193",
|
||||
"matchCriteriaId": "A3FDF344-70E4-41FE-8424-F05D70B8DC0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.0",
|
||||
"versionEndExcluding": "5.4.124",
|
||||
"matchCriteriaId": "F717E3E3-B420-411F-AECC-2D26A9F33F0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.0",
|
||||
"versionEndExcluding": "5.10.42",
|
||||
"matchCriteriaId": "18765089-FB00-4E06-82C2-69FE64CAB42D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12.0",
|
||||
"versionEndExcluding": "5.12.9",
|
||||
"matchCriteriaId": "B1F28E29-3C08-49BB-BCE1-C601F43C091D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,185 +2,15 @@
|
||||
"id": "CVE-2022-49299",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:06.727",
|
||||
"lastModified": "2025-04-14T19:49:30.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T14:15:34.170",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: gadget: don't reset gadget's driver->bus\n\nUDC driver should not touch gadget's driver internals, especially it\nshould not reset driver->bus. This wasn't harmful so far, but since\ncommit fc274c1e9973 (\"USB: gadget: Add a new bus for gadgets\") gadget\nsubsystem got it's own bus and messing with ->bus triggers the\nfollowing NULL pointer dereference:\n\ndwc2 12480000.hsotg: bound driver g_ether\n8<--- cut here ---\nUnable to handle kernel NULL pointer dereference at virtual address 00000000\n[00000000] *pgd=00000000\nInternal error: Oops: 5 [#1] SMP ARM\nModules linked in: ...\nCPU: 0 PID: 620 Comm: modprobe Not tainted 5.18.0-rc5-next-20220504 #11862\nHardware name: Samsung Exynos (Flattened Device Tree)\nPC is at module_add_driver+0x44/0xe8\nLR is at sysfs_do_create_link_sd+0x84/0xe0\n...\nProcess modprobe (pid: 620, stack limit = 0x(ptrval))\n...\n module_add_driver from bus_add_driver+0xf4/0x1e4\n bus_add_driver from driver_register+0x78/0x10c\n driver_register from usb_gadget_register_driver_owner+0x40/0xb4\n usb_gadget_register_driver_owner from do_one_initcall+0x44/0x1e0\n do_one_initcall from do_init_module+0x44/0x1c8\n do_init_module from load_module+0x19b8/0x1b9c\n load_module from sys_finit_module+0xdc/0xfc\n sys_finit_module from ret_fast_syscall+0x0/0x54\nException stack(0xf1771fa8 to 0xf1771ff0)\n...\ndwc2 12480000.hsotg: new device is high-speed\n---[ end trace 0000000000000000 ]---\n\nFix this by removing driver->bus entry reset."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc2: gadget: no restablezca el controlador UDC del bus del gadget->controlador no debe tocar los componentes internos del controlador del gadget, especialmente no debe restablecer el controlador UDC del bus del gadget->controlador. Esto no fue da\u00f1ino hasta ahora, pero desde el commit fc274c1e9973 (\"USB: gadget: Agregar un nuevo bus para gadgets\") el subsistema de gadget tiene su propio bus y jugar con ->bus desencadena la siguiente desreferencia de puntero NULL: dwc2 12480000.hsotg: controlador vinculado g_ether 8<--- corte aqu\u00ed --- No se puede manejar la desreferencia de puntero NULL del kernel en la direcci\u00f3n virtual 00000000 [00000000] *pgd=00000000 Error interno: Oops: 5 [#1] M\u00f3dulos SMP ARM vinculados en: ... CPU: 0 PID: 620 Comm: modprobe No contaminado 5.18.0-rc5-next-20220504 #11862 Nombre del hardware: Samsung Exynos (\u00e1rbol de dispositivos aplanado) La PC est\u00e1 en module_add_driver+0x44/0xe8 LR est\u00e1 en sysfs_do_create_link_sd+0x84/0xe0 ... Procesar modprobe (pid: 620, l\u00edmite de pila = 0x(ptrval)) ... module_add_driver desde bus_add_driver+0xf4/0x1e4 bus_add_driver desde driver_register+0x78/0x10c driver_register desde usb_gadget_register_driver_owner+0x40/0xb4 usb_gadget_register_driver_owner desde do_one_initcall+0x44/0x1e0 do_one_initcall desde do_init_module+0x44/0x1c8 do_init_module desde load_module+0x19b8/0x1b9c load_module desde sys_finit_module+0xdc/0xfc sys_finit_module de ret_fast_syscall+0x0/0x54 Pila de excepciones (0xf1771fa8 a 0xf1771ff0) ... dwc2 12480000.hsotg: el nuevo dispositivo es de alta velocidad ---[ fin de seguimiento 000000000000000 ]--- Solucione esto eliminando el restablecimiento de la entrada del bus del controlador."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/172cfc167c8ee6238f24f9c16efd598602af643c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3120aac6d0ecd9accf56894aeac0e265f74d3d5a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5127c0f365265bb69cd776ad6e4b872c309f3fa8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/547ebdc200b862dff761ff4890f66d8217c33316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5b0c0298f7c3b57417f1729ec4071f76864b72dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bee8f9808a7e82addfc73a0973b16a8bb684205b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2159feb9d28ce496d77df98313ab454646372ac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d232ca0bbc7d03144bad0ffd1792c3352bfd03fa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/efb15ff4a77fe053c941281775fefa91c87770e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
56
CVE-2024/CVE-2024-249xx/CVE-2024-24916.json
Normal file
56
CVE-2024/CVE-2024-249xx/CVE-2024-24916.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-24916",
|
||||
"sourceIdentifier": "cve@checkpoint.com",
|
||||
"published": "2025-06-19T14:15:44.983",
|
||||
"lastModified": "2025-06-19T14:15:44.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Untrusted DLLs in the installer's directory may be loaded and executed, leading to potentially arbitrary code execution with the installer's privileges (admin)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@checkpoint.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@checkpoint.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.checkpoint.com/results/sk/sk183342",
|
||||
"source": "cve@checkpoint.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,36 +2,15 @@
|
||||
"id": "CVE-2024-36022",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-30T15:15:49.263",
|
||||
"lastModified": "2024-11-21T09:21:27.403",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T14:15:45.160",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Init zone device and drm client after mode-1 reset on reload\n\nIn passthrough environment, when amdgpu is reloaded after unload, mode-1\nis triggered after initializing the necessary IPs, That init does not\ninclude KFD, and KFD init waits until the reset is completed. KFD init\nis called in the reset handler, but in this case, the zone device and\ndrm client is not initialized, causing app to create kernel panic.\n\nv2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create.\nAs the previous version has the potential of creating DRM client twice.\n\nv3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA\nbefore SDMA init. Adding the condition to in drm client creation, on top of v1,\nto guard against drm client creation call multiple times."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: dispositivo de zona de inicio y cliente drm despu\u00e9s del restablecimiento del modo 1 al recargar. En el entorno de paso a trav\u00e9s, cuando amdgpu se recarga despu\u00e9s de la descarga, el modo 1 se activa despu\u00e9s de inicializar las IP necesarias. Ese inicio no incluye KFD, y el inicio de KFD espera hasta que se complete el reinicio. Se llama a KFD init en el controlador de reinicio, pero en este caso, el dispositivo de zona y el cliente drm no se inicializan, lo que hace que la aplicaci\u00f3n genere p\u00e1nico en el kernel. v2: Eliminaci\u00f3n de la condici\u00f3n KFD inicial de amdgpu_amdkfd_drm_client_create. Como la versi\u00f3n anterior tiene el potencial de crear un cliente DRM dos veces. v3: el parche v2 hace que el motor SDMA se bloquee porque la apertura de DRM hace que la VM se borre a SDMA antes de que se inicie SDMA. Agregar la condici\u00f3n a la creaci\u00f3n del cliente DRM, adem\u00e1s de la versi\u00f3n 1, para protegerse contra llamadas de creaci\u00f3n del cliente DRM varias veces."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,91 +2,15 @@
|
||||
"id": "CVE-2024-44955",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-04T19:15:30.423",
|
||||
"lastModified": "2024-12-09T13:10:03.600",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-19T14:15:45.237",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute\n\n[Why]\nWhen unplug one of monitors connected after mst hub, encounter null pointer dereference.\n\nIt's due to dc_sink get released immediately in early_unregister() or detect_ctx(). When\ncommit new state which directly referring to info stored in dc_sink will cause null pointer\ndereference.\n\n[how]\nRemove redundant checking condition. Relevant condition should already be covered by checking\nif dsc_aux is null or not. Also reset dsc_aux to NULL when the connector is disconnected."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: No hacer referencia a dc_sink en is_dsc_need_re_compute [Por qu\u00e9] Cuando se desconecta uno de los monitores conectados despu\u00e9s del concentrador mst, se produce una desreferencia de puntero nulo. Esto se debe a que dc_sink se libera inmediatamente en early_unregister() o detect_ctx(). Cuando se confirma un nuevo estado que hace referencia directa a la informaci\u00f3n almacenada en dc_sink, se producir\u00e1 una desreferencia de puntero nulo. [C\u00f3mo] Eliminar la condici\u00f3n de comprobaci\u00f3n redundante. La condici\u00f3n relevante ya deber\u00eda estar cubierta comprobando si dsc_aux es nulo o no. Tambi\u00e9n se restablece dsc_aux a NULL cuando se desconecta el conector."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.5",
|
||||
"matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39b217193729aa45eded8de24d9245468a0c0263",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c7e65cab54a89f4df54110f0b44c4ade93d1a911",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fcf6a49d79923a234844b8efe830a61f3f0584e4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
64
CVE-2025/CVE-2025-488xx/CVE-2025-48886.json
Normal file
64
CVE-2025/CVE-2025-488xx/CVE-2025-48886.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-48886",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-19T15:15:20.473",
|
||||
"lastModified": "2025-06-19T15:15:20.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hydra is a layer-two scalability solution for Cardano. Prior to version 0.22.0, the process assumes L1 event finality and does not consider failed transactions. Currently, Cardano L1 is monitored for certain events which are necessary for state progression. At the moment, Hydra considers those events as finalized as soon as they are recognized by the node participants making such transactions the target of re-org attacks. The system does not currently consider the fact that failed transactions on the Cardano L1 can indeed appear in blocks because these transactions are so infrequent. This issue has been patched in version 0.22.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cardano-scaling/hydra/commit/2bc6a82ef6dbfa8b94e1c11d55253713065f605e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cardano-scaling/hydra/commit/fb22d968964bf5d5b79227cc845d871147044ce7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cardano-scaling/hydra/security/advisories/GHSA-qr9f-mpgf-wp25",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-490xx/CVE-2025-49014.json
Normal file
82
CVE-2025/CVE-2025-490xx/CVE-2025-49014.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-49014",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-19T15:15:20.650",
|
||||
"lastModified": "2025-06-19T15:15:20.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jqlang/jq/commit/499c91bca9d4d027833bc62787d1bb075c03680e",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jqlang/jq/security/advisories/GHSA-rmjp-cr27-wpg2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-62xx/CVE-2025-6267.json
Normal file
137
CVE-2025/CVE-2025-62xx/CVE-2025-6267.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-6267",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-19T14:15:55.323",
|
||||
"lastModified": "2025-06-19T14:15:55.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in zhilink \u667a\u4e92\u8054(\u6df1\u5733)\u79d1\u6280\u6709\u9650\u516c\u53f8 ADP Application Developer Platform \u5e94\u7528\u5f00\u53d1\u8005\u5e73\u53f0 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /adpweb/a/base/barcodeDetail/. The manipulation of the argument barcodeNo/barcode/itemNo leads to sql injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313271",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313271",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.586697",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-62xx/CVE-2025-6268.json
Normal file
137
CVE-2025/CVE-2025-62xx/CVE-2025-6268.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-6268",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-19T15:15:20.810",
|
||||
"lastModified": "2025-06-19T15:15:20.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Luna Imaging up to 7.5.5.6. Affected is an unknown function of the file /luna/servlet/view/search. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313272",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313272",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592218",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
47
README.md
47
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-19T14:00:19.951536+00:00
|
||||
2025-06-19T16:00:20.308673+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-19T13:15:51.840000+00:00
|
||||
2025-06-19T15:15:20.810000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,47 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298704
|
||||
298709
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2025-4738](CVE-2025/CVE-2025-47xx/CVE-2025-4738.json) (`2025-06-19T13:15:51.840`)
|
||||
- [CVE-2025-6019](CVE-2025/CVE-2025-60xx/CVE-2025-6019.json) (`2025-06-19T12:15:19.727`)
|
||||
- [CVE-2025-6266](CVE-2025/CVE-2025-62xx/CVE-2025-6266.json) (`2025-06-19T12:15:20.537`)
|
||||
- [CVE-2024-24916](CVE-2024/CVE-2024-249xx/CVE-2024-24916.json) (`2025-06-19T14:15:44.983`)
|
||||
- [CVE-2025-48886](CVE-2025/CVE-2025-488xx/CVE-2025-48886.json) (`2025-06-19T15:15:20.473`)
|
||||
- [CVE-2025-49014](CVE-2025/CVE-2025-490xx/CVE-2025-49014.json) (`2025-06-19T15:15:20.650`)
|
||||
- [CVE-2025-6267](CVE-2025/CVE-2025-62xx/CVE-2025-6267.json) (`2025-06-19T14:15:55.323`)
|
||||
- [CVE-2025-6268](CVE-2025/CVE-2025-62xx/CVE-2025-6268.json) (`2025-06-19T15:15:20.810`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `32`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2022-49558](CVE-2022/CVE-2022-495xx/CVE-2022-49558.json) (`2025-06-19T13:15:23.990`)
|
||||
- [CVE-2023-52569](CVE-2023/CVE-2023-525xx/CVE-2023-52569.json) (`2025-06-19T13:15:25.037`)
|
||||
- [CVE-2023-52681](CVE-2023/CVE-2023-526xx/CVE-2023-52681.json) (`2025-06-19T13:15:25.340`)
|
||||
- [CVE-2023-52733](CVE-2023/CVE-2023-527xx/CVE-2023-52733.json) (`2025-06-19T13:15:25.540`)
|
||||
- [CVE-2023-52760](CVE-2023/CVE-2023-527xx/CVE-2023-52760.json) (`2025-06-19T13:15:30.487`)
|
||||
- [CVE-2023-52921](CVE-2023/CVE-2023-529xx/CVE-2023-52921.json) (`2025-06-19T13:15:30.640`)
|
||||
- [CVE-2024-26710](CVE-2024/CVE-2024-267xx/CVE-2024-26710.json) (`2025-06-19T13:15:31.147`)
|
||||
- [CVE-2024-26774](CVE-2024/CVE-2024-267xx/CVE-2024-26774.json) (`2025-06-19T13:15:31.303`)
|
||||
- [CVE-2024-26794](CVE-2024/CVE-2024-267xx/CVE-2024-26794.json) (`2025-06-19T13:15:31.510`)
|
||||
- [CVE-2024-26829](CVE-2024/CVE-2024-268xx/CVE-2024-26829.json) (`2025-06-19T13:15:35.917`)
|
||||
- [CVE-2024-27410](CVE-2024/CVE-2024-274xx/CVE-2024-27410.json) (`2025-06-19T13:15:36.097`)
|
||||
- [CVE-2024-35788](CVE-2024/CVE-2024-357xx/CVE-2024-35788.json) (`2025-06-19T13:15:36.360`)
|
||||
- [CVE-2024-35927](CVE-2024/CVE-2024-359xx/CVE-2024-35927.json) (`2025-06-19T13:15:40.283`)
|
||||
- [CVE-2024-36288](CVE-2024/CVE-2024-362xx/CVE-2024-36288.json) (`2025-06-19T13:15:40.433`)
|
||||
- [CVE-2024-43835](CVE-2024/CVE-2024-438xx/CVE-2024-43835.json) (`2025-06-19T13:15:41.177`)
|
||||
- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2025-06-19T13:15:41.423`)
|
||||
- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2025-06-19T13:15:41.600`)
|
||||
- [CVE-2024-45025](CVE-2024/CVE-2024-450xx/CVE-2024-45025.json) (`2025-06-19T13:15:41.733`)
|
||||
- [CVE-2024-46700](CVE-2024/CVE-2024-467xx/CVE-2024-46700.json) (`2025-06-19T13:15:42.090`)
|
||||
- [CVE-2024-46852](CVE-2024/CVE-2024-468xx/CVE-2024-46852.json) (`2025-06-19T13:15:46.410`)
|
||||
- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-06-19T13:15:46.560`)
|
||||
- [CVE-2024-56786](CVE-2024/CVE-2024-567xx/CVE-2024-56786.json) (`2025-06-19T13:15:46.830`)
|
||||
- [CVE-2024-57920](CVE-2024/CVE-2024-579xx/CVE-2024-57920.json) (`2025-06-19T13:15:50.980`)
|
||||
- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-06-19T13:15:51.193`)
|
||||
- [CVE-2025-38030](CVE-2025/CVE-2025-380xx/CVE-2025-38030.json) (`2025-06-19T13:15:51.760`)
|
||||
- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2025-06-19T14:15:24.327`)
|
||||
- [CVE-2022-49299](CVE-2022/CVE-2022-492xx/CVE-2022-49299.json) (`2025-06-19T14:15:34.170`)
|
||||
- [CVE-2024-36022](CVE-2024/CVE-2024-360xx/CVE-2024-36022.json) (`2025-06-19T14:15:45.160`)
|
||||
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2025-06-19T14:15:45.237`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
83
_state.csv
83
_state.csv
@ -187473,7 +187473,7 @@ CVE-2021-47140,0,0,c3dcf5ccce19de7e841d31a01af1a7c0a0ac783be101cc1ae90902a46a0b7
|
||||
CVE-2021-47141,0,0,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000
|
||||
CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000
|
||||
CVE-2021-47143,0,0,e3b00c03aadd7fe0eba996ce0aa700ffe68266a62c0c1a319c4d75334f72fab4,2025-03-13T21:09:12.133000
|
||||
CVE-2021-47144,0,0,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000
|
||||
CVE-2021-47144,0,1,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000
|
||||
CVE-2021-47145,0,0,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000
|
||||
CVE-2021-47146,0,0,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000
|
||||
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
|
||||
@ -213233,7 +213233,7 @@ CVE-2022-48845,0,0,94f22e9b9acbbb5c8519471c83937a2c7a9147a8e77f1ee3045c80f48a468
|
||||
CVE-2022-48846,0,0,7258287e68639fcdfd0b4f5144cd503eacb792f0f2fcee8ccf75e40bdfddba68,2024-11-21T07:34:12.050000
|
||||
CVE-2022-48847,0,0,3321217cd4af573aa5e073a85425079ad5809712d2d6c94889f79663c3d8a616,2024-11-21T07:34:12.187000
|
||||
CVE-2022-48848,0,0,1f1e31d119acbcb86505cd74e9774b42844323114bdc27c89f05c0211a90e033,2024-11-21T07:34:12.343000
|
||||
CVE-2022-48849,0,1,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000
|
||||
CVE-2022-48849,0,0,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000
|
||||
CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e9258,2024-11-21T07:36:08.490000
|
||||
CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000
|
||||
CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000
|
||||
@ -213327,14 +213327,14 @@ CVE-2022-48931,0,0,1dbe2b8984115e6c4128eb39c49ee06011d1a2ee34417caca08b34d6a5e74
|
||||
CVE-2022-48932,0,0,5ee1a19583d0c4a9467a8feaaebf9dcf3b1db8ef04aca34fdc4cff7132f23fec,2024-08-23T01:48:35.663000
|
||||
CVE-2022-48933,0,0,1b4c1a1516a577d3b1652e29f5c3e786a949e8aaa7e38c23472c7d258c831a43,2024-08-23T01:50:09.313000
|
||||
CVE-2022-48934,0,0,aaf1356acfd8d3dd84aa39b3fd1fddb548a57947b1cb9a25af1e11990bb7dc62,2024-08-22T20:33:29.860000
|
||||
CVE-2022-48935,0,1,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000
|
||||
CVE-2022-48935,0,0,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000
|
||||
CVE-2022-48936,0,0,314cbb90d15468a6b1d7555d054a6b503128a9503d9ec5951ea48c3a9258d9c6,2024-08-31T06:15:06.460000
|
||||
CVE-2022-48937,0,0,6b478b1435d78a7ab05467250f2242aae473c24e90fe3a1aff6615918f5c8a52,2024-08-22T19:07:28.567000
|
||||
CVE-2022-48938,0,0,b6e9be5213f1247d08ffa614fc1a1459598f240582d9fb96da5e9999e511826e,2024-11-08T16:15:17.730000
|
||||
CVE-2022-48939,0,0,377615ee29b1087387ff6e3464436ee4fcda9ed9ec30aadbb16f8c0936d8933b,2024-08-22T19:02:08.770000
|
||||
CVE-2022-4894,0,0,22ed899d22580fa7ff41b74dfe422d716a5c9906a1ee5a472871f1ebbf4474fb,2024-11-21T07:36:09.560000
|
||||
CVE-2022-48940,0,0,38b69bd3209b0e7ac4d9cbe453d62a205ba4033bc58506aead5aeef18a85020c,2024-08-22T18:37:46.133000
|
||||
CVE-2022-48941,0,1,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000
|
||||
CVE-2022-48941,0,0,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000
|
||||
CVE-2022-48942,0,0,54372a0406f1cc0b6657cde2dcb6c662b4713c79f47b57e794248039c65b1eca,2024-08-22T18:25:14.867000
|
||||
CVE-2022-48943,0,0,0264fe83c8bd61ffaa8ed7a29a1240090d6282de98f79a1469d8e8bd5f420b46,2024-08-22T18:27:42.807000
|
||||
CVE-2022-48944,0,0,16d9e14c1e4833622d1d49b030ba3e3e9b9c0c99940a3d2a711a2b623c1bcade,2024-09-03T14:26:56.393000
|
||||
@ -213564,7 +213564,7 @@ CVE-2022-49149,0,0,8297fdf184d8a7e40f01ea0d5664b49cf40330e7583bc4ef95ce788771a41
|
||||
CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000
|
||||
CVE-2022-49150,0,0,89648067971d85640435933caa498e9b7904e2151ba4ff335e966223ae328796,2025-03-13T22:05:03.087000
|
||||
CVE-2022-49151,0,0,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000
|
||||
CVE-2022-49152,0,1,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000
|
||||
CVE-2022-49152,0,0,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000
|
||||
CVE-2022-49153,0,0,95eb9c7e8ee8ba4b1a97012606c13b8f5d719ee8b39c0fa9f873eb03c309eaff,2025-03-13T21:59:52.070000
|
||||
CVE-2022-49154,0,0,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000
|
||||
CVE-2022-49155,0,0,ccc5982f599632c5a9bc700e79ff0e33f7c79bed37c3808f82465d1a36b59668,2025-03-13T22:06:01.560000
|
||||
@ -213725,7 +213725,7 @@ CVE-2022-49295,0,0,5e38c4c123787e1ee751a94134f2b29ad572a5b12c9b6211fdebdc37dfbd2
|
||||
CVE-2022-49296,0,0,588351356d12270e478dd63a43a961d11715903a90acd8e6708c24c601fcaa4b,2025-04-14T20:08:21.310000
|
||||
CVE-2022-49297,0,0,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000
|
||||
CVE-2022-49298,0,0,6ef51ed7003ff5ce2a107fdf5b5fd431bea1536c5c9ba8aad25226015ac10a10,2025-04-14T20:08:32.443000
|
||||
CVE-2022-49299,0,0,f197f91d925185ae89eedd3f194e3948bdc958a01200036420aad81b79f27842,2025-04-14T19:49:30.960000
|
||||
CVE-2022-49299,0,1,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000
|
||||
CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000
|
||||
CVE-2022-49300,0,0,b797c5faa060878b9beb923e26a960451e4ac34b94b1fc227e08b825a7d5668b,2025-04-14T20:08:41.297000
|
||||
CVE-2022-49301,0,0,136481d6f3b44bb5b873bb10b1c743de69545e148cb371975e40d2524eedecd4,2025-04-14T20:08:57.483000
|
||||
@ -213784,7 +213784,7 @@ CVE-2022-49349,0,0,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11ce
|
||||
CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000
|
||||
CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000
|
||||
CVE-2022-49351,0,0,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000
|
||||
CVE-2022-49352,0,1,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000
|
||||
CVE-2022-49352,0,0,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000
|
||||
CVE-2022-49353,0,0,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000
|
||||
CVE-2022-49354,0,0,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000
|
||||
CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000
|
||||
@ -213850,13 +213850,13 @@ CVE-2022-49409,0,0,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d7
|
||||
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
|
||||
CVE-2022-49410,0,0,84d3e0f7bc21d558aec3b4e0ae8dee5a83279109778732c277deb256b86bb2fc,2025-04-17T20:31:34.340000
|
||||
CVE-2022-49411,0,0,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000
|
||||
CVE-2022-49412,0,1,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000
|
||||
CVE-2022-49412,0,0,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000
|
||||
CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000
|
||||
CVE-2022-49414,0,0,78bee9ca007908a24f772b14094ada9ee18d2cc4a2d938908fbffbcb58ba4b45,2025-04-17T20:35:12.403000
|
||||
CVE-2022-49415,0,0,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000
|
||||
CVE-2022-49416,0,0,09c89d207391df88211f0618c2195524a326b2439f8e7dc7ec1d9f0561573089,2025-03-24T19:57:30.150000
|
||||
CVE-2022-49417,0,0,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000
|
||||
CVE-2022-49418,0,1,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000
|
||||
CVE-2022-49418,0,0,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000
|
||||
CVE-2022-49419,0,0,5e829714eda436088a7d4e2a3f319dbfd17b45b8ecc959b900f607e63f922a81,2025-03-24T19:57:48.187000
|
||||
CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000
|
||||
CVE-2022-49420,0,0,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000
|
||||
@ -214008,7 +214008,7 @@ CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4c
|
||||
CVE-2022-49555,0,0,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000
|
||||
CVE-2022-49556,0,0,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000
|
||||
CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000
|
||||
CVE-2022-49558,0,1,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000
|
||||
CVE-2022-49558,0,0,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000
|
||||
CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000
|
||||
CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000
|
||||
CVE-2022-49560,0,0,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000
|
||||
@ -241994,7 +241994,7 @@ CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947
|
||||
CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000
|
||||
CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000
|
||||
CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000
|
||||
CVE-2023-52569,0,1,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000
|
||||
CVE-2023-52569,0,0,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000
|
||||
CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000
|
||||
CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000
|
||||
CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000
|
||||
@ -242118,7 +242118,7 @@ CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425
|
||||
CVE-2023-52679,0,0,c478e813ddd4b4ce1343e3f27409449fa8ed702ee1034440fed17cea99bc0916,2025-01-10T17:43:16.480000
|
||||
CVE-2023-5268,0,0,f9bebe86fa585dfcbe060b1fc00adb16b0d04aa3d4d18f7175ba3a6e3d9791b3,2024-11-21T08:41:24.927000
|
||||
CVE-2023-52680,0,0,ae64b074c35060884727ad53684f53cc03f000222f0fa8eecc3a6d877d9f2721,2024-11-21T08:40:20.917000
|
||||
CVE-2023-52681,0,1,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000
|
||||
CVE-2023-52681,0,0,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000
|
||||
CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a253f,2024-11-21T08:40:21.140000
|
||||
CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000
|
||||
CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000
|
||||
@ -242174,7 +242174,7 @@ CVE-2023-5273,0,0,6f26df3fc1e6203409f37349c999afab7055cfb5e89e02483db488eefca53f
|
||||
CVE-2023-52730,0,0,1ebdd041e2bc78bea11061473cc34d19a52a846428c3eec8b8c107820fac7c23,2024-11-21T08:40:27.883000
|
||||
CVE-2023-52731,0,0,f8ad5fad613ade1f6ee5f3c6074ef9d4461b8891819ac9a19a1d924438b4937a,2024-11-21T08:40:28.007000
|
||||
CVE-2023-52732,0,0,1eb76b8d97f2e3d09be2caf803604d47c4ef9e424628d8acb55510ffc20a29aa,2024-11-21T08:40:28.117000
|
||||
CVE-2023-52733,0,1,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000
|
||||
CVE-2023-52733,0,0,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000
|
||||
CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93b84,2024-05-28T19:15:09.773000
|
||||
CVE-2023-52735,0,0,f478ba3b373cd433bb5aee25a220a182cbf53291e6340b29288cf9162f927cfd,2025-04-02T14:51:07.620000
|
||||
CVE-2023-52736,0,0,c35bcc1b2cba606129c818a936155ca214b02693b11b04934035f9ed16c416ef,2024-11-21T08:40:28.620000
|
||||
@ -242204,7 +242204,7 @@ CVE-2023-52757,0,0,59eb322f34bc12b8711c834c3ce346bda3ca5214ddbf962c381360374341e
|
||||
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
|
||||
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
||||
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
|
||||
CVE-2023-52760,0,1,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000
|
||||
CVE-2023-52760,0,0,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000
|
||||
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
|
||||
CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000
|
||||
CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000
|
||||
@ -242381,7 +242381,7 @@ CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb
|
||||
CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000
|
||||
CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000
|
||||
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
|
||||
CVE-2023-52921,0,1,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000
|
||||
CVE-2023-52921,0,0,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000
|
||||
CVE-2023-52922,0,0,4ae9be38bb6e6ca23829d038f55e60ad12898283b6085540928abd9ae32559e4,2025-06-13T20:15:22.450000
|
||||
CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000
|
||||
CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000
|
||||
@ -253939,6 +253939,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b
|
||||
CVE-2024-24911,0,0,000ec366e410a6c31f93ab7f8a2e5fcf30159e4251e9a0263b609a65802a079d,2025-02-06T14:15:29.577000
|
||||
CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000
|
||||
CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000
|
||||
CVE-2024-24916,1,1,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000
|
||||
CVE-2024-24919,0,0,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000
|
||||
CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000
|
||||
CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000
|
||||
@ -255274,7 +255275,7 @@ CVE-2024-26707,0,0,1c758f00ff80d3ca5b813ab085c0f9ff555bb1b0aa5a49dbcb6e9068a2759
|
||||
CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000
|
||||
CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
|
||||
CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000
|
||||
CVE-2024-26710,0,1,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000
|
||||
CVE-2024-26710,0,0,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000
|
||||
CVE-2024-26711,0,0,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000
|
||||
CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000
|
||||
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||
@ -255344,7 +255345,7 @@ CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c49
|
||||
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
|
||||
CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000
|
||||
CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000
|
||||
CVE-2024-26774,0,1,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000
|
||||
CVE-2024-26774,0,0,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000
|
||||
CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000
|
||||
CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000
|
||||
CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000
|
||||
@ -255366,7 +255367,7 @@ CVE-2024-26790,0,0,da7993ff6ba918c2f5e13339b4c718269282ee965a1c6bb70f04c36e1ddd8
|
||||
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,1,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000
|
||||
CVE-2024-26794,0,0,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000
|
||||
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
||||
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
||||
CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000
|
||||
@ -255404,7 +255405,7 @@ CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cf
|
||||
CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000
|
||||
CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000
|
||||
CVE-2024-26828,0,0,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000
|
||||
CVE-2024-26829,0,1,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000
|
||||
CVE-2024-26829,0,0,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000
|
||||
CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000
|
||||
CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000
|
||||
CVE-2024-26831,0,0,f65b722d125da32d24604f127879b9206512a4f102e576e5645c679ad672606e,2025-04-02T13:19:02.103000
|
||||
@ -256014,7 +256015,7 @@ CVE-2024-27407,0,0,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0be
|
||||
CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000
|
||||
CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000
|
||||
CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000
|
||||
CVE-2024-27410,0,1,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000
|
||||
CVE-2024-27410,0,0,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000
|
||||
CVE-2024-27411,0,0,f33ed05b1af79c8798dce10b734b807cfd3c3c0280cda3312cace7d33a168919,2024-11-21T09:04:33.923000
|
||||
CVE-2024-27412,0,0,a702c5879aeed78b48b36d8ae6b313b965796547c99b174c28ae0bc5c2f82542,2024-11-21T09:04:34.063000
|
||||
CVE-2024-27413,0,0,bd327b327f16ab52d01828f6d316a044860ba7af430fc81075dcfbe2d6b40958,2024-11-21T09:04:34.300000
|
||||
@ -262266,7 +262267,7 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312
|
||||
CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000
|
||||
CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000
|
||||
CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000
|
||||
CVE-2024-35788,0,1,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000
|
||||
CVE-2024-35788,0,0,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000
|
||||
CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000
|
||||
CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000
|
||||
CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000
|
||||
@ -262417,7 +262418,7 @@ CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243a
|
||||
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
|
||||
CVE-2024-35925,0,0,c69da8bf3be050c34947dfbb2cbe6b517f550618f4e390b45d64a13e545dc166,2024-12-31T18:51:18.303000
|
||||
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
||||
CVE-2024-35927,0,1,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000
|
||||
CVE-2024-35927,0,0,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000
|
||||
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
||||
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
||||
@ -262522,7 +262523,7 @@ CVE-2024-36019,0,0,f02053cb973e1c96d485baf06035b62edccf042bea033f3776e823e91a178
|
||||
CVE-2024-3602,0,0,d3cbf668ee81c993c6c1a222abdc99fc263e0a164b77fb771b4ebab250b2fbc2,2024-11-21T09:29:57.953000
|
||||
CVE-2024-36020,0,0,25e42c8a88f0ddc6971355bfaa1fe3e1077dd58b980e3b76b47fcef300a19108,2024-11-21T09:21:27.090000
|
||||
CVE-2024-36021,0,0,e329f3d46bec53961296646b95182fcee51db869a5da34a000bb9ec4b09a82e5,2024-11-21T09:21:27.280000
|
||||
CVE-2024-36022,0,0,40f30287ca8f6630a5bb77986ebb699becfdb9ff88e433c3855f4e9840bd131d,2024-11-21T09:21:27.403000
|
||||
CVE-2024-36022,0,1,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000
|
||||
CVE-2024-36023,0,0,e5bd5a963b07073a291c96616b254515ad4a6774864c3c2874fadf0832668b50,2024-11-21T09:21:27.523000
|
||||
CVE-2024-36024,0,0,e81683da475e946ecb026d2acbb1cb6964660d51a3ff9882d05006bff012115d,2024-11-21T09:21:27.663000
|
||||
CVE-2024-36025,0,0,33c56aef941738177fa17f1493b08e4d2d3a3e4eea32429e0a62f0a601334f80,2024-11-21T09:21:27.783000
|
||||
@ -262772,7 +262773,7 @@ CVE-2024-36284,0,0,5dd896a891af07144a56a3845fc97f090935104348eba8ca7b12ce82fc1d0
|
||||
CVE-2024-36285,0,0,0c7823d3ace3df8d9b320bdafb5965f47e49d2f414a435615a3b8f24fcb2140d,2025-02-12T22:15:34.737000
|
||||
CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000
|
||||
CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000
|
||||
CVE-2024-36288,0,1,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000
|
||||
CVE-2024-36288,0,0,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000
|
||||
CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000
|
||||
CVE-2024-3629,0,0,95cbbd26104b7fd2dcbc50917364d61467d72e4899fadcb6f1fb0df19afa4d01,2025-05-15T14:16:37.597000
|
||||
CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000
|
||||
@ -268736,7 +268737,7 @@ CVE-2024-43831,0,0,a9268ace7dacd553d87b45d213b555879d8348eca66f21b44f2f371c23948
|
||||
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43833,0,0,5b7f17e91a1832d7c0ad5164e31831087a6aefdb4e7b61c82a3de3880edd76b6,2024-08-22T15:42:46.827000
|
||||
CVE-2024-43834,0,0,d5ef14ae2ffbc2e7669580090c9ce16cedbf19f89cc0924be7d59abe1e2c67e4,2024-10-30T21:44:22.570000
|
||||
CVE-2024-43835,0,1,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000
|
||||
CVE-2024-43835,0,0,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000
|
||||
CVE-2024-43836,0,0,f4c655bb2f56247f5d81fd742c3fcdd23416972e391d432e6e172ae5a57cc892,2024-08-22T15:43:26.303000
|
||||
CVE-2024-43837,0,0,1226778b7252461769175d745fa085c5a9c87889904d99a3bba5d59789b343af,2024-08-22T15:44:03.417000
|
||||
CVE-2024-43838,0,0,a5d4b7b522d8e67215b6ea2369694b147dcc49e3947e9b76857a7ed426025c6a,2024-10-29T16:24:43.273000
|
||||
@ -268747,7 +268748,7 @@ CVE-2024-43841,0,0,38746749d86e4f534fafdf8b478fa91ff1f5e1f65eb119200a1d6855c1feb
|
||||
CVE-2024-43842,0,0,15812ad8d85131679f82ea4663681c7db021618aa78b78cc9c9aed3923db1d1f,2024-09-30T13:55:17.007000
|
||||
CVE-2024-43843,0,0,7e3bdccf9d6054cb61c364d96f8741fe73ef63f682003f6ac63ebd930248bda3,2024-10-29T16:29:16.960000
|
||||
CVE-2024-43844,0,0,892289f8fc772f3f240038fccb3ec1dc83964292e0a1f838b372b21b4d76a86c,2024-10-25T19:49:05.987000
|
||||
CVE-2024-43845,0,1,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000
|
||||
CVE-2024-43845,0,0,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000
|
||||
CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3225,2024-10-25T19:52:01.380000
|
||||
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
|
||||
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
|
||||
@ -268820,7 +268821,7 @@ CVE-2024-43908,0,0,53a4829da8a8a1ad7fa0dc717c980975a2bb5c37e29b8800bdfbda1733423
|
||||
CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000
|
||||
CVE-2024-4391,0,0,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000
|
||||
CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000
|
||||
CVE-2024-43911,0,1,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000
|
||||
CVE-2024-43911,0,0,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000
|
||||
CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000
|
||||
CVE-2024-43913,0,0,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000
|
||||
CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000
|
||||
@ -269448,7 +269449,7 @@ CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cd
|
||||
CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000
|
||||
CVE-2024-44953,0,0,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000
|
||||
CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000
|
||||
CVE-2024-44955,0,0,2bc6b0d941fdfccf3c93972ebd5efd5058cb7c721673095ebdd7739bcf15a6cb,2024-12-09T13:10:03.600000
|
||||
CVE-2024-44955,0,1,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000
|
||||
CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000
|
||||
CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000
|
||||
CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000
|
||||
@ -269525,7 +269526,7 @@ CVE-2024-45021,0,0,b5c8b3592be5699bf0881de00fd5b0362eb80914279b4a5a7d96fef6a9675
|
||||
CVE-2024-45022,0,0,2cea89592199656ec921a3999b1ae285f1db04da7aaf687ce93a2d7242a86506,2024-09-13T16:36:39.043000
|
||||
CVE-2024-45023,0,0,f8e0a62a83abee054b0294c32d7a5d15b03d0cc79f4e4a9ba7f0506ba34b6cb4,2024-09-13T16:30:30.427000
|
||||
CVE-2024-45024,0,0,4feaf532db5af8cbee0e911fe09f5676ea54d7e53f7e82578a612b5e947edf46,2024-09-13T16:30:17.277000
|
||||
CVE-2024-45025,0,1,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000
|
||||
CVE-2024-45025,0,0,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000
|
||||
CVE-2024-45026,0,0,89a8af0ac58952e722e5a53de5f494d1f681def0babb2de65d80753f6e55d193,2024-09-13T16:29:55.927000
|
||||
CVE-2024-45027,0,0,906b9ad56781558d74178ff20f312e7339b089bddb5d18b11ef9c6d75d05a75a,2025-05-09T08:15:18.677000
|
||||
CVE-2024-45028,0,0,af25595a666e3b491983ae69084787c84baeb2d3f88bb766b24cec6d0cfb83a7,2024-09-13T16:29:35.877000
|
||||
@ -270653,7 +270654,7 @@ CVE-2024-46697,0,0,9943cf76deb7cd05c4635bc9d12865f4ae0e9cc1d23e6f8d61c4587524e0e
|
||||
CVE-2024-46698,0,0,be3a5928ad47004b2d560db3d5df5b16cf4a67d11c1a9ecc79fc9d1af2a3eb53,2024-09-13T16:53:03
|
||||
CVE-2024-46699,0,0,b9f4243f64b3f749473025d5fece9ff74365febeb983013139a1c61713f6b89a,2024-09-13T16:53:10.620000
|
||||
CVE-2024-4670,0,0,20450840160cca1402ceff3ad240b158e7c98a105624c4f901b79d8d80b04786,2024-11-21T09:43:20.563000
|
||||
CVE-2024-46700,0,1,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000
|
||||
CVE-2024-46700,0,0,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000
|
||||
CVE-2024-46701,0,0,e529b0621330ae5ac1d4b33df08f71883ab0b3900295daf37d0dfe30c681ef31,2024-09-19T13:40:27.817000
|
||||
CVE-2024-46702,0,0,f5b7fc9bcaeb54226afdebb2f9f120b5650bb150fd7460409201dbd777ad9b41,2024-09-19T13:35:58.637000
|
||||
CVE-2024-46703,0,0,d926face52ba1a18b356030e2a43e186ee85e58145f49e8ade11cb932899dc19,2024-09-19T13:33:57.563000
|
||||
@ -270820,7 +270821,7 @@ CVE-2024-46849,0,0,55f5b24a78843dcc8538314aaf7fc9612b26c57281c0bbf2f4b0fed08fece
|
||||
CVE-2024-4685,0,0,dcc1995af2e9fd1e34a2f9668e5bc3a683e3cfc7906d3660a8b9bcf75f88030b,2025-02-19T18:38:59.740000
|
||||
CVE-2024-46850,0,0,41be926e86dd8c952ae96807dd33a02f26b5880c97e6286fb0ffb5c599a187f6,2024-10-04T15:30:32.110000
|
||||
CVE-2024-46851,0,0,b0993c3439c6fdf7de7e13034429b55167ffbe1f88b2ed8118656fa5260e8c01,2024-10-04T16:00:43.913000
|
||||
CVE-2024-46852,0,1,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000
|
||||
CVE-2024-46852,0,0,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000
|
||||
CVE-2024-46853,0,0,7013163bb0b0de8fcc4deccdec036fc108843e6740181da643a0cc828a7da7b8,2024-11-08T16:15:23.727000
|
||||
CVE-2024-46854,0,0,d2b8ace374763a38df18b61a469d196e1746b4597f0027e5c9c667cf2f8fd171,2024-11-08T16:15:23.857000
|
||||
CVE-2024-46855,0,0,46b0faa9ce85540614181cf4962008995b9781bd009434c91e4d733a9654cd2a,2024-10-17T14:15:12.790000
|
||||
@ -277898,7 +277899,7 @@ CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c
|
||||
CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000
|
||||
CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000
|
||||
CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000
|
||||
CVE-2024-56694,0,1,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000
|
||||
CVE-2024-56694,0,0,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000
|
||||
CVE-2024-56695,0,0,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000
|
||||
CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000
|
||||
CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000
|
||||
@ -277997,7 +277998,7 @@ CVE-2024-56782,0,0,8ea8c1c6076121ccd6387cd73e62b29831bb97f162a193d72c4089bf509d6
|
||||
CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000
|
||||
CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5b7f,2025-01-09T21:25:55.693000
|
||||
CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000
|
||||
CVE-2024-56786,0,1,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000
|
||||
CVE-2024-56786,0,0,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000
|
||||
CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000
|
||||
CVE-2024-56788,0,0,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000
|
||||
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
||||
@ -278575,7 +278576,7 @@ CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5f
|
||||
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
||||
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
||||
CVE-2024-57920,0,1,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000
|
||||
CVE-2024-57920,0,0,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000
|
||||
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
||||
CVE-2024-57922,0,0,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000
|
||||
CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000
|
||||
@ -278728,7 +278729,7 @@ CVE-2024-58073,0,0,eb683fa11db3d5ae68d3f6675819692177d4c529e62bda8352837736a5636
|
||||
CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000
|
||||
CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000
|
||||
CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000
|
||||
CVE-2024-58077,0,1,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000
|
||||
CVE-2024-58077,0,0,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000
|
||||
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
|
||||
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
|
||||
@ -294291,7 +294292,7 @@ CVE-2025-38027,0,0,471ef0d7ca5d24c18ccb08a9eddf5cbddd30470e775a52cb01bc90f38e1ce
|
||||
CVE-2025-38028,0,0,0a7639190a1937774dbcb851869664e12bc334f75a4870acae02cc8069cfea0a,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38029,0,0,92d383e3593af7bcce9265075a2e2f877017899966aa410dfe02a30304d4b909,2025-06-18T13:46:52.973000
|
||||
CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000
|
||||
CVE-2025-38030,0,1,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000
|
||||
CVE-2025-38030,0,0,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000
|
||||
CVE-2025-38031,0,0,486b5cbb4cd98022b686c86aee16cd270c1eb4dd11847090fa684f4f14929793,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38032,0,0,e6efe23d93f2ffe49e4bc29b5d8bd527975896df0c10a6b76bd704bff3a8d41f,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38033,0,0,22e8c97a0b2b90d6c86a7604c284682b993460d61d5c6c03c971671c669696d0,2025-06-18T13:46:52.973000
|
||||
@ -296586,7 +296587,7 @@ CVE-2025-4734,0,0,99bf1e4024c1482ea99fe0fd5315f4fee30ed05717e4831cdd0b865abb118a
|
||||
CVE-2025-4735,0,0,f96e4d2d2fb70e0f1c88cd9e2e0e0d4de95ba2f9e43dcc187f8debac18edd909,2025-05-28T14:26:46.997000
|
||||
CVE-2025-4736,0,0,1dca037a7f0cbc80e91cfd83149841017fcad28a58750ed26439191bb836bb26,2025-05-27T19:50:59.997000
|
||||
CVE-2025-4737,0,0,f9f82f092173f94badf92602e6f8f404f3e0568cce6afc358521e7171b0637d3,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4738,1,1,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000
|
||||
CVE-2025-4738,0,0,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000
|
||||
CVE-2025-4739,0,0,cc2e318d2f840424b36b046688f8220e8357f337cbe30ff9f4e8c26b1723a285,2025-05-28T14:26:55.127000
|
||||
CVE-2025-4740,0,0,6c6357004a26b75a6edf5c8b51b4eebaf151da15d33a0ac49a5219d302fb606d,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4741,0,0,ef8421e0cde45e475879357ff0c51cc359c029c130dc5d6beb431eec100b6596,2025-05-28T14:27:04.720000
|
||||
@ -297391,6 +297392,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe
|
||||
CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48886,1,1,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000
|
||||
CVE-2025-48887,0,0,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000
|
||||
CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000
|
||||
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
|
||||
@ -297478,6 +297480,7 @@ CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e
|
||||
CVE-2025-49011,0,0,3665e61b0cd57a602b77e200d37022bd1c16f58fa0f0e634b56cbf0760aaef11,2025-06-09T12:15:47.880000
|
||||
CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000
|
||||
CVE-2025-49013,0,0,53845c94e81c77646a01f8c00c78ad71027f55ce3164819fe14a34a7c91aff28,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49014,1,1,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000
|
||||
CVE-2025-49015,0,0,7a51f7c5ae45f0bd54ecb4209bb2e64263c11f32f2190e16ff2a6f3efe9375e5,2025-06-18T15:15:27.550000
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
@ -298588,7 +298591,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399
|
||||
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
||||
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6019,1,1,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000
|
||||
CVE-2025-6019,0,0,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000
|
||||
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
@ -298702,4 +298705,6 @@ CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f5
|
||||
CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d08,2025-06-19T03:15:26.017000
|
||||
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
||||
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
|
||||
CVE-2025-6266,1,1,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
|
||||
CVE-2025-6266,0,0,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
|
||||
CVE-2025-6267,1,1,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000
|
||||
CVE-2025-6268,1,1,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user