Auto-Update: 2025-04-22T18:00:20.818874+00:00

This commit is contained in:
cad-safe-bot 2025-04-22 18:03:53 +00:00
parent 86060ac0d4
commit 54782a1525
184 changed files with 5631 additions and 937 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46933",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T10:15:07.807",
"lastModified": "2024-11-21T06:34:57.927",
"lastModified": "2025-04-22T17:15:36.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46939",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:05.873",
"lastModified": "2024-11-21T06:34:58.803",
"lastModified": "2025-04-22T16:15:19.423",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-662"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46950",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.420",
"lastModified": "2024-11-21T06:35:00.680",
"lastModified": "2025-04-22T16:15:20.283",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46961",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.907",
"lastModified": "2024-12-11T14:49:59.620",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-22T16:15:20.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47068",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-29T23:15:08.170",
"lastModified": "2024-12-10T19:50:49.147",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-22T16:15:20.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23741",
"sourceIdentifier": "product-cna@github.com",
"published": "2022-12-14T19:15:10.143",
"lastModified": "2024-11-21T06:49:13.100",
"lastModified": "2025-04-22T16:15:21.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25667",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:10.700",
"lastModified": "2024-11-21T06:52:34.453",
"lastModified": "2025-04-22T16:15:21.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25671",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:13.793",
"lastModified": "2024-11-21T06:52:35.470",
"lastModified": "2025-04-22T16:15:21.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25672",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:17.640",
"lastModified": "2024-11-21T06:52:35.600",
"lastModified": "2025-04-22T16:15:21.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25673",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:17.737",
"lastModified": "2024-11-21T06:52:35.747",
"lastModified": "2025-04-22T16:15:21.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25675",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:17.803",
"lastModified": "2024-11-21T06:52:36.047",
"lastModified": "2025-04-22T16:15:22.177",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25676",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:14.490",
"lastModified": "2024-11-21T06:52:36.240",
"lastModified": "2025-04-22T16:15:22.393",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25677",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:17.870",
"lastModified": "2024-11-21T06:52:36.520",
"lastModified": "2025-04-22T16:15:22.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25679",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:14.667",
"lastModified": "2024-11-21T06:52:37.000",
"lastModified": "2025-04-22T16:15:23.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25681",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:17.997",
"lastModified": "2024-11-21T06:52:42.083",
"lastModified": "2025-04-22T16:15:23.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25682",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.097",
"lastModified": "2024-11-21T06:52:42.317",
"lastModified": "2025-04-22T16:15:23.637",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-119"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25685",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.163",
"lastModified": "2024-11-21T06:52:42.673",
"lastModified": "2025-04-22T16:15:24.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25689",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.230",
"lastModified": "2024-11-21T06:52:43.763",
"lastModified": "2025-04-22T16:15:24.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25691",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.297",
"lastModified": "2024-11-21T06:52:44.190",
"lastModified": "2025-04-22T16:15:24.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25692",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.363",
"lastModified": "2024-11-21T06:52:44.340",
"lastModified": "2025-04-22T16:15:24.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25695",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.427",
"lastModified": "2024-11-21T06:52:45.030",
"lastModified": "2025-04-22T16:15:24.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25697",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.490",
"lastModified": "2024-11-21T06:52:45.573",
"lastModified": "2025-04-22T16:15:25.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25698",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.553",
"lastModified": "2024-11-21T06:52:45.703",
"lastModified": "2025-04-22T16:15:25.367",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25702",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.620",
"lastModified": "2024-11-21T06:52:45.840",
"lastModified": "2025-04-22T16:15:25.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25710",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:14.767",
"lastModified": "2024-11-21T06:52:46.957",
"lastModified": "2025-04-22T16:15:25.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25711",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.683",
"lastModified": "2024-11-21T06:52:47.133",
"lastModified": "2025-04-22T16:15:26.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25712",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:18.750",
"lastModified": "2024-11-21T06:52:47.313",
"lastModified": "2025-04-22T16:15:26.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25724",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:14.853",
"lastModified": "2024-11-21T06:52:49.703",
"lastModified": "2025-04-22T16:15:26.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25727",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:14.997",
"lastModified": "2024-11-21T06:52:50.393",
"lastModified": "2025-04-22T16:15:26.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-1284"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25741",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.103",
"lastModified": "2024-11-21T06:52:53.210",
"lastModified": "2025-04-22T16:15:27.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25742",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.177",
"lastModified": "2024-11-21T06:52:53.467",
"lastModified": "2025-04-22T16:15:27.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25743",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.300",
"lastModified": "2024-11-21T06:52:53.600",
"lastModified": "2025-04-22T16:15:27.493",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25748",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-10-19T11:15:10.853",
"lastModified": "2024-11-21T06:52:54.570",
"lastModified": "2025-04-22T16:15:27.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25749",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-10-19T11:15:10.903",
"lastModified": "2024-11-21T06:52:55.020",
"lastModified": "2025-04-22T16:15:28.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27124",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-05T20:15:09.217",
"lastModified": "2024-11-21T06:55:11.400",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:03:52.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27581",
"sourceIdentifier": "psirt@sick.de",
"published": "2022-12-13T16:15:18.817",
"lastModified": "2024-11-21T06:55:59.280",
"lastModified": "2025-04-22T16:15:28.830",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -59,6 +79,16 @@
"value": "CWE-327"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29998",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-12T16:15:07.937",
"lastModified": "2024-11-21T07:00:08.700",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:03:35.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29999",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-12T16:15:07.973",
"lastModified": "2024-11-21T07:00:08.840",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:03:59.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30000",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-12T16:15:08.017",
"lastModified": "2024-11-21T07:02:03.717",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:09:16.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30001",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-12T16:15:08.073",
"lastModified": "2024-11-21T07:02:03.863",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:09:09.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30002",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-12T16:15:08.120",
"lastModified": "2024-11-21T07:02:04.007",
"vulnStatus": "Modified",
"lastModified": "2025-04-22T16:09:24.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54E656E7-6742-4ADF-B32D-96350623AEA1"
"criteria": "cpe:2.3:a:angeljudesuarez:insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40454C88-4167-42E0-9A97-F334E51E2498"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31358",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T15:15:10.173",
"lastModified": "2024-11-21T07:04:24.023",
"lastModified": "2025-04-22T16:15:29.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31696",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-13T16:15:19.733",
"lastModified": "2024-11-21T07:05:09.130",
"lastModified": "2025-04-22T16:15:29.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31697",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-13T16:15:19.790",
"lastModified": "2024-11-21T07:05:09.370",
"lastModified": "2025-04-22T16:15:29.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-312"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31699",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-13T16:15:19.903",
"lastModified": "2024-11-21T07:05:09.690",
"lastModified": "2025-04-22T16:15:29.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31700",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-14T19:15:12.860",
"lastModified": "2024-11-21T07:05:09.880",
"lastModified": "2025-04-22T16:15:29.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31701",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-14T19:15:12.950",
"lastModified": "2024-11-21T07:05:10.017",
"lastModified": "2025-04-22T16:15:30.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31702",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-14T19:15:13.047",
"lastModified": "2024-11-21T07:05:10.157",
"lastModified": "2025-04-22T16:15:30.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31703",
"sourceIdentifier": "security@vmware.com",
"published": "2022-12-14T19:15:13.123",
"lastModified": "2024-11-21T07:05:10.293",
"lastModified": "2025-04-22T16:15:30.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3104",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-14T21:15:11.407",
"lastModified": "2024-11-21T07:18:50.067",
"lastModified": "2025-04-22T16:15:34.623",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33234",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.403",
"lastModified": "2024-11-21T07:07:48.553",
"lastModified": "2025-04-22T16:15:30.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33235",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-12-13T16:15:21.207",
"lastModified": "2024-11-21T07:07:48.813",
"lastModified": "2025-04-22T16:15:30.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33236",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.497",
"lastModified": "2024-11-21T07:07:49.263",
"lastModified": "2025-04-22T16:15:31.540",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33237",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.573",
"lastModified": "2024-11-21T07:07:49.480",
"lastModified": "2025-04-22T16:15:31.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-33239",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.673",
"lastModified": "2024-11-21T07:07:51.277",
"lastModified": "2025-04-22T16:15:32.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3359",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-12T18:15:10.550",
"lastModified": "2024-11-21T07:19:22.123",
"lastModified": "2025-04-22T16:15:34.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34560",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.420",
"lastModified": "2024-11-21T07:09:45.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T16:06:20.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpfox:phpfox:4.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54282957-1915-4703-81EA-C13A766831B4"
}
]
}
]
}
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/79.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cwe.mitre.org/data/definitions/79.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34561",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.490",
"lastModified": "2024-11-21T07:09:45.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T16:06:09.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpfox:phpfox:4.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54282957-1915-4703-81EA-C13A766831B4"
}
]
}
]
}
],
"references": [
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://v4.phpfox.com/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://v4.phpfox.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34562",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.540",
"lastModified": "2024-11-21T07:09:45.750",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T16:05:32.070",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpfox:phpfox:4.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "54282957-1915-4703-81EA-C13A766831B4"
}
]
}
]
}
],
"references": [
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://v4.phpfox.com/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://v4.phpfox.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37155",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T00:15:09.973",
"lastModified": "2024-11-21T07:14:32.087",
"lastModified": "2025-04-22T16:15:33.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38488",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T21:15:11.230",
"lastModified": "2024-11-21T07:16:34.690",
"lastModified": "2025-04-22T16:15:33.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38628",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-13T21:15:11.670",
"lastModified": "2024-11-21T07:16:50.597",
"lastModified": "2025-04-22T16:15:33.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-384"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3882",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-12T18:15:11.267",
"lastModified": "2024-11-21T07:20:25.860",
"lastModified": "2025-04-22T16:15:34.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3883",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-12T18:15:11.343",
"lastModified": "2024-11-21T07:20:25.993",
"lastModified": "2025-04-22T16:15:35.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3908",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-12T18:15:11.690",
"lastModified": "2024-11-21T07:20:30.620",
"lastModified": "2025-04-22T16:15:35.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3912",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-12-12T18:15:11.753",
"lastModified": "2024-11-21T07:20:31.107",
"lastModified": "2025-04-22T16:15:35.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42139",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T00:15:10.120",
"lastModified": "2024-11-21T07:24:26.347",
"lastModified": "2025-04-22T16:15:38.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42140",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T00:15:10.170",
"lastModified": "2024-11-21T07:24:26.487",
"lastModified": "2025-04-22T16:15:38.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42141",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-14T00:15:10.220",
"lastModified": "2024-11-21T07:24:26.630",
"lastModified": "2025-04-22T16:15:38.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42793",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-11-01T20:15:22.637",
"lastModified": "2024-11-21T07:25:21.613",
"lastModified": "2025-04-22T16:15:38.847",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-347"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42795",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-11-01T20:15:22.700",
"lastModified": "2024-11-21T07:25:21.783",
"lastModified": "2025-04-22T16:15:39.063",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42796",
"sourceIdentifier": "product-security@apple.com",
"published": "2022-11-01T20:15:22.770",
"lastModified": "2024-11-21T07:25:21.910",
"lastModified": "2025-04-22T16:15:39.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43722",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.070",
"lastModified": "2024-11-21T07:27:08.057",
"lastModified": "2025-04-22T16:15:39.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43723",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.250",
"lastModified": "2024-11-21T07:27:08.190",
"lastModified": "2025-04-22T16:15:39.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -52,6 +72,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43724",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.327",
"lastModified": "2024-11-21T07:27:08.317",
"lastModified": "2025-04-22T16:15:39.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -52,6 +72,16 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46255",
"sourceIdentifier": "product-cna@github.com",
"published": "2022-12-14T18:15:23.193",
"lastModified": "2024-11-21T07:30:17.597",
"lastModified": "2025-04-22T16:15:40.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46256",
"sourceIdentifier": "product-cna@github.com",
"published": "2022-12-14T18:15:23.553",
"lastModified": "2024-11-21T07:30:17.730",
"lastModified": "2025-04-22T16:15:40.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -59,6 +79,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46340",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-14T21:15:13.110",
"lastModified": "2024-11-21T07:30:25.067",
"lastModified": "2025-04-22T16:15:40.820",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46341",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-14T21:15:13.293",
"lastModified": "2024-11-21T07:30:25.220",
"lastModified": "2025-04-22T16:15:41.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46342",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-14T21:15:13.487",
"lastModified": "2024-11-21T07:30:25.353",
"lastModified": "2025-04-22T16:15:41.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46343",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-14T21:15:13.543",
"lastModified": "2024-11-21T07:30:25.490",
"lastModified": "2025-04-22T16:15:41.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24203",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T17:15:13.123",
"lastModified": "2024-11-21T07:47:34.870",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T16:52:27.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sourcecodester:simple_customer_relationship_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA5D563-D29A-412F-9664-F42D56525F5C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://momonguyen.com/2023/cve-2023-24203/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "https://www.sourcecodester.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://momonguyen.com/2023/cve-2023-24203/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"URL Repurposed"
]
},
{
"url": "https://www.sourcecodester.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24204",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T17:15:15.740",
"lastModified": "2024-11-21T07:47:35.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T16:51:58.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sourcecodester:simple_customer_relationship_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA5D563-D29A-412F-9664-F42D56525F5C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://momonguyen.com/2023/cve-2023-24203/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "https://www.sourcecodester.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://momonguyen.com/2023/cve-2023-24203/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"URL Repurposed"
]
},
{
"url": "https://www.sourcecodester.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37002",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:09.757",
"lastModified": "2025-01-28T21:15:15.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:26.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37003",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:09.867",
"lastModified": "2025-01-28T21:15:15.313",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:22.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37004",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:09.970",
"lastModified": "2025-01-28T21:15:15.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:16.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37005",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.067",
"lastModified": "2025-01-28T21:15:15.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:13.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37006",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.170",
"lastModified": "2025-01-28T21:15:15.873",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:11.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37007",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.270",
"lastModified": "2025-01-28T22:15:15.220",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:08.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37008",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.373",
"lastModified": "2025-01-28T22:15:15.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:06.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37009",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.473",
"lastModified": "2025-01-27T22:15:10.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:04.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37010",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.580",
"lastModified": "2025-01-27T22:15:11.113",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:14:00.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37011",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.683",
"lastModified": "2025-01-27T22:15:11.250",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:13:57.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37012",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.783",
"lastModified": "2025-01-27T21:15:11.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:13:53.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37013",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.883",
"lastModified": "2025-01-23T22:15:12.007",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:29.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37014",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:10.987",
"lastModified": "2025-03-20T16:15:13.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:26.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37015",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:11.100",
"lastModified": "2025-02-06T22:15:36.193",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:23.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37016",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:11.207",
"lastModified": "2025-02-06T22:15:36.333",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:20.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37017",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:11.310",
"lastModified": "2025-02-06T22:15:36.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:17.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37018",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-22T15:15:11.410",
"lastModified": "2025-02-06T22:15:36.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-22T17:15:13.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,33 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8"
}
]
}
]
}
],
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Technical Description"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More