mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-14T20:00:20.152842+00:00
This commit is contained in:
parent
192dd6f13b
commit
573b05b552
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-16135",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T22:15:10.127",
|
||||
"lastModified": "2024-11-21T03:52:08.247",
|
||||
"lastModified": "2025-04-14T19:15:27.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-11851",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T22:15:10.193",
|
||||
"lastModified": "2024-11-21T04:21:53.930",
|
||||
"lastModified": "2025-04-14T18:15:17.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-14802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T21:15:10.327",
|
||||
"lastModified": "2024-11-21T04:27:23.327",
|
||||
"lastModified": "2025-04-14T18:15:18.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18177",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T21:15:10.380",
|
||||
"lastModified": "2024-11-21T04:32:46.273",
|
||||
"lastModified": "2025-04-14T18:15:18.447",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-30134",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T07:15:11.310",
|
||||
"lastModified": "2024-11-21T06:03:22.483",
|
||||
"lastModified": "2025-04-14T19:15:28.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35065",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T07:15:11.730",
|
||||
"lastModified": "2024-11-21T06:11:46.787",
|
||||
"lastModified": "2025-04-14T19:15:29.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T06:15:09.770",
|
||||
"lastModified": "2024-11-21T06:12:49.140",
|
||||
"lastModified": "2025-04-14T19:15:29.943",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35952",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T06:15:10.397",
|
||||
"lastModified": "2024-11-21T06:12:49.303",
|
||||
"lastModified": "2025-04-14T19:15:30.100",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35953",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T06:15:10.457",
|
||||
"lastModified": "2024-11-21T06:12:49.457",
|
||||
"lastModified": "2025-04-14T19:15:30.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-35954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T06:15:10.507",
|
||||
"lastModified": "2024-11-21T06:12:49.610",
|
||||
"lastModified": "2025-04-14T19:15:30.383",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-25948",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2022-12-22T05:15:10.487",
|
||||
"lastModified": "2024-11-21T06:53:15.380",
|
||||
"lastModified": "2025-04-14T18:15:19.417",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29852",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T04:15:10.333",
|
||||
"lastModified": "2024-11-21T06:59:49.423",
|
||||
"lastModified": "2025-04-14T19:15:30.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29853",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T04:15:10.387",
|
||||
"lastModified": "2024-11-21T06:59:49.597",
|
||||
"lastModified": "2025-04-14T19:15:30.913",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3347",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2022-12-28T03:15:10.193",
|
||||
"lastModified": "2024-11-21T07:19:20.620",
|
||||
"lastModified": "2025-04-14T18:15:19.670",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T19:15:10.440",
|
||||
"lastModified": "2024-11-21T07:15:05.530",
|
||||
"lastModified": "2025-04-14T19:15:31.087",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40005",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T19:15:10.707",
|
||||
"lastModified": "2024-11-21T07:20:43.237",
|
||||
"lastModified": "2025-04-14T19:15:31.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4097",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:13.233",
|
||||
"lastModified": "2024-11-21T07:34:34.627",
|
||||
"lastModified": "2025-04-14T19:15:33.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41317",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T19:15:10.767",
|
||||
"lastModified": "2024-11-21T07:23:02.073",
|
||||
"lastModified": "2025-04-14T19:15:31.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T19:15:10.820",
|
||||
"lastModified": "2024-11-21T07:23:02.240",
|
||||
"lastModified": "2025-04-14T19:15:31.607",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4104",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2022-11-28T19:15:11.063",
|
||||
"lastModified": "2024-11-21T07:34:35.460",
|
||||
"lastModified": "2025-04-14T18:15:23.520",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4106",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-19T14:15:12.187",
|
||||
"lastModified": "2024-11-21T07:34:35.663",
|
||||
"lastModified": "2025-04-14T19:15:33.830",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4107",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-19T14:15:12.277",
|
||||
"lastModified": "2024-11-21T07:34:35.760",
|
||||
"lastModified": "2025-04-14T19:15:33.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4108",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-19T14:15:12.347",
|
||||
"lastModified": "2024-11-21T07:34:35.857",
|
||||
"lastModified": "2025-04-14T19:15:34.140",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4124",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-19T14:15:12.513",
|
||||
"lastModified": "2024-11-21T07:34:37.430",
|
||||
"lastModified": "2025-04-14T19:15:34.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4127",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-11-28T22:15:11.053",
|
||||
"lastModified": "2024-11-21T07:34:37.770",
|
||||
"lastModified": "2025-04-14T18:15:24.170",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4128",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-11-28T22:15:11.117",
|
||||
"lastModified": "2024-11-21T07:34:37.880",
|
||||
"lastModified": "2025-04-14T18:15:24.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4129",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-11-28T22:15:11.180",
|
||||
"lastModified": "2024-11-21T07:34:37.987",
|
||||
"lastModified": "2025-04-14T18:15:24.593",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4130",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-16T16:15:25.173",
|
||||
"lastModified": "2024-11-21T07:34:38.103",
|
||||
"lastModified": "2025-04-14T19:15:34.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4144",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-11-29T18:15:10.550",
|
||||
"lastModified": "2024-11-21T07:34:39.677",
|
||||
"lastModified": "2025-04-14T18:15:24.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4147",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-06T19:15:10.613",
|
||||
"lastModified": "2024-11-21T07:34:40.077",
|
||||
"lastModified": "2025-04-14T18:15:25.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4151",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-26T13:15:12.570",
|
||||
"lastModified": "2024-11-21T07:34:40.593",
|
||||
"lastModified": "2025-04-14T19:15:34.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4170",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2022-12-09T18:15:20.327",
|
||||
"lastModified": "2024-11-21T07:34:42.607",
|
||||
"lastModified": "2025-04-14T18:15:25.293",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4172",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-11-29T18:15:10.623",
|
||||
"lastModified": "2024-11-21T07:34:42.873",
|
||||
"lastModified": "2025-04-14T18:15:25.480",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T06:15:09.427",
|
||||
"lastModified": "2024-11-21T07:25:33.423",
|
||||
"lastModified": "2025-04-14T19:15:31.810",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4223",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-13T16:15:26.277",
|
||||
"lastModified": "2025-03-17T17:46:47.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-04-14T19:15:34.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4269",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-05T16:15:10.283",
|
||||
"lastModified": "2024-11-21T07:34:54.643",
|
||||
"lastModified": "2025-04-14T18:15:25.830",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4283",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-14T21:15:14.980",
|
||||
"lastModified": "2024-11-21T07:34:56.373",
|
||||
"lastModified": "2025-04-14T19:15:34.943",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4287",
|
||||
"sourceIdentifier": "security@devolutions.net",
|
||||
"published": "2022-12-21T17:15:10.477",
|
||||
"lastModified": "2024-11-21T07:34:56.767",
|
||||
"lastModified": "2025-04-14T19:15:35.137",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4336",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-09T18:15:20.727",
|
||||
"lastModified": "2024-11-21T07:35:04.800",
|
||||
"lastModified": "2025-04-14T18:15:26.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4390",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2022-12-09T20:15:10.863",
|
||||
"lastModified": "2024-11-21T07:35:10.843",
|
||||
"lastModified": "2025-04-14T18:15:26.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45197",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.170",
|
||||
"lastModified": "2024-11-21T07:28:56.833",
|
||||
"lastModified": "2025-04-14T19:15:32.297",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T04:15:07.660",
|
||||
"lastModified": "2024-11-21T07:29:54.123",
|
||||
"lastModified": "2025-04-14T18:15:20.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45890",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T04:15:08.137",
|
||||
"lastModified": "2024-11-21T07:29:54.283",
|
||||
"lastModified": "2025-04-14T18:15:20.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45892",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T04:15:08.230",
|
||||
"lastModified": "2024-11-21T07:29:54.573",
|
||||
"lastModified": "2025-04-14T18:15:20.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45893",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.233",
|
||||
"lastModified": "2024-11-21T07:29:54.717",
|
||||
"lastModified": "2025-04-14T18:15:20.570",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45894",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.293",
|
||||
"lastModified": "2024-11-21T07:29:54.857",
|
||||
"lastModified": "2025-04-14T18:15:22.513",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.360",
|
||||
"lastModified": "2024-11-21T07:29:54.993",
|
||||
"lastModified": "2025-04-14T18:15:22.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.427",
|
||||
"lastModified": "2024-11-21T07:29:55.137",
|
||||
"lastModified": "2025-04-14T19:15:32.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4515",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-20T19:15:25.190",
|
||||
"lastModified": "2024-11-21T07:35:25.033",
|
||||
"lastModified": "2025-04-14T19:15:35.290",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-30T21:15:10.947",
|
||||
"lastModified": "2024-11-21T07:30:48.330",
|
||||
"lastModified": "2025-04-14T19:15:32.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-23T16:15:12.290",
|
||||
"lastModified": "2024-11-21T07:32:35.527",
|
||||
"lastModified": "2025-04-14T19:15:32.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47940",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-23T16:15:12.533",
|
||||
"lastModified": "2024-11-21T07:32:35.773",
|
||||
"lastModified": "2025-04-14T19:15:33.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47949",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-24T23:15:09.010",
|
||||
"lastModified": "2024-11-21T07:32:37.143",
|
||||
"lastModified": "2025-04-14T19:15:33.247",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49299",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:06.727",
|
||||
"lastModified": "2025-02-26T07:01:06.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:49:30.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,172 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc2: gadget: no restablezca el controlador UDC del bus del gadget->controlador no debe tocar los componentes internos del controlador del gadget, especialmente no debe restablecer el controlador UDC del bus del gadget->controlador. Esto no fue da\u00f1ino hasta ahora, pero desde el commit fc274c1e9973 (\"USB: gadget: Agregar un nuevo bus para gadgets\") el subsistema de gadget tiene su propio bus y jugar con ->bus desencadena la siguiente desreferencia de puntero NULL: dwc2 12480000.hsotg: controlador vinculado g_ether 8<--- corte aqu\u00ed --- No se puede manejar la desreferencia de puntero NULL del kernel en la direcci\u00f3n virtual 00000000 [00000000] *pgd=00000000 Error interno: Oops: 5 [#1] M\u00f3dulos SMP ARM vinculados en: ... CPU: 0 PID: 620 Comm: modprobe No contaminado 5.18.0-rc5-next-20220504 #11862 Nombre del hardware: Samsung Exynos (\u00e1rbol de dispositivos aplanado) La PC est\u00e1 en module_add_driver+0x44/0xe8 LR est\u00e1 en sysfs_do_create_link_sd+0x84/0xe0 ... Procesar modprobe (pid: 620, l\u00edmite de pila = 0x(ptrval)) ... module_add_driver desde bus_add_driver+0xf4/0x1e4 bus_add_driver desde driver_register+0x78/0x10c driver_register desde usb_gadget_register_driver_owner+0x40/0xb4 usb_gadget_register_driver_owner desde do_one_initcall+0x44/0x1e0 do_one_initcall desde do_init_module+0x44/0x1c8 do_init_module desde load_module+0x19b8/0x1b9c load_module desde sys_finit_module+0xdc/0xfc sys_finit_module de ret_fast_syscall+0x0/0x54 Pila de excepciones (0xf1771fa8 a 0xf1771ff0) ... dwc2 12480000.hsotg: el nuevo dispositivo es de alta velocidad ---[ fin de seguimiento 000000000000000 ]--- Solucione esto eliminando el restablecimiento de la entrada del bus del controlador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/172cfc167c8ee6238f24f9c16efd598602af643c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3120aac6d0ecd9accf56894aeac0e265f74d3d5a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5127c0f365265bb69cd776ad6e4b872c309f3fa8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/547ebdc200b862dff761ff4890f66d8217c33316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5b0c0298f7c3b57417f1729ec4071f76864b72dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bee8f9808a7e82addfc73a0973b16a8bb684205b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2159feb9d28ce496d77df98313ab454646372ac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d232ca0bbc7d03144bad0ffd1792c3352bfd03fa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/efb15ff4a77fe053c941281775fefa91c87770e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49313",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:08.143",
|
||||
"lastModified": "2025-02-26T07:01:08.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:59:26.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,172 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers: usb: host: Corregir interbloqueo en oxu_bus_suspend() Hay un interbloqueo en oxu_bus_suspend(), que se muestra a continuaci\u00f3n: (Hilo 1) | (Hilo 2) | timer_action() oxu_bus_suspend() | mod_timer() spin_lock_irq() //(1) | (esperar un tiempo) ... | oxu_watchdog() del_timer_sync() | spin_lock_irq() //(2) (esperar a que el temporizador se detenga) | ... Mantenemos oxu->lock en la posici\u00f3n (1) del hilo 1, y usamos del_timer_sync() para esperar a que el temporizador se detenga, pero el controlador del temporizador tambi\u00e9n necesita oxu->lock en la posici\u00f3n (2) del hilo 2. Como resultado, oxu_bus_suspend() se bloquear\u00e1 para siempre. Este parche extrae del_timer_sync() de la protecci\u00f3n de spin_lock_irq(), lo que podr\u00eda permitir que el controlador del temporizador obtenga el bloqueo necesario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2dcec0bc142be2096af71a5703d63237127db204",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4187b291a76664a3c03d3f0d9bfadc8322881868",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4d378f2ae58138d4c55684e1d274e7dd94aa6524",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b58d255f27b0ed6a2e43208960864d67579db58",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a3d380188bde8900c3f604e82b56572896499124",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b97aae8b43b718314012e8170b7e03dbfd2e7677",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d888753872190abd18f68a7d77b9c7c367f0a7ab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8242044c91cafbba9e320b0fb31abf2429a3221",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ffe9440d698274c6462d2e304562c6ddfc8c84df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49314",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:08.270",
|
||||
"lastModified": "2025-02-26T07:01:08.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:59:14.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,172 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: corrige una posible p\u00e9rdida de recursos en icom_probe Cuando pci_read_config_dword falla, llama a pci_release_regions() y pci_disable_device() para reciclar el recurso previamente asignado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23e155b51d403c0ccedc60c0d6c3c452afed07fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5f9b2e4ca88cab1a96b86ecd45544e488ca43faf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8c014373f178a4f13a08e045ef63bdb23f62e892",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a8305f357a8d03698fc7bc855ff9c6865d5486b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a2df0b4d080cc770b4da7bff487048c803dfd07e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb7147afd328c07edeeee287710d8d96ac0459f5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d703d912a985c1c5b50dd38c3181fc3540fa77cb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ee157a79e7c82b01ae4c25de0ac75899801f322c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f4c836d90da1ece88905d62ce2ce39a962f25d1a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49318",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:08.660",
|
||||
"lastModified": "2025-02-26T07:01:08.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:59:06.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,130 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: eliminar WARN_ON en f2fs_is_valid_blkaddr Syzbot activa dos WARN en f2fs_is_valid_blkaddr y __is_bitmap_valid. Por ejemplo, en f2fs_is_valid_blkaddr, si el tipo es DATA_GENERIC_ENHANCE o DATA_GENERIC_ENHANCE_READ, invoca WARN_ON si blkaddr no est\u00e1 en el rango correcto. El seguimiento de la llamada es el siguiente: f2fs_get_node_info+0x45f/0x1070 read_node_page+0x577/0x1190 __get_node_page.part.0+0x9e/0x10e0 __get_node_page f2fs_get_node_page+0x109/0x180 do_read_inode f2fs_iget+0x2a5/0x58b0 f2fs_fill_super+0x3b39/0x7ca0 Corrija estas dos ADVERTENCIAS reemplazando WARN_ON con dump_stack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "C1C86ABC-337F-46B3-BCD8-22DC5A66E45A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a7a1fc7e71eecf2e5053a6c312c9f0dcbb9b8fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/32bea51fe4c6e92c00403739f7547c89219bea88",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8c62c5e26345c34d199b4b8c8e69255ba3d0e751",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/99c09b298e47ebbe345a6da9f268b32a6b0f4582",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cd6374af36cc548464d8c47a93fdba7303bb82a4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc2f78e2d4cc844a1458653d57ce1b54d4a29f21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49322",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:09.030",
|
||||
"lastModified": "2025-02-26T07:01:09.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:45:44.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,158 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Seguimiento: se corrige la funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en el kernel RT Al configurar bootparams=\"trace_event=initcall:initcall_start tp_printk=1\" en la l\u00ednea de comandos, se llam\u00f3 a output_printk() y a spin_lock_irqsave() en la adecuaci\u00f3n del contexto de interrupci\u00f3n at\u00f3mica y deshabilitada de irq. En el kernel PREEMPT_RT, estos bloqueos se reemplazan con rt-spinlock sleepable, por lo que se activar\u00e1 la llamada de pila trace. Corr\u00edjalo con raw_spin_lock_irqsave cuando PREEMPT_RT y \"trace_event=initcall:initcall_start tp_printk=1\" est\u00e9n habilitados. ERROR: funci\u00f3n de suspensi\u00f3n llamada desde un contexto no v\u00e1lido en kernel/locking/spinlock_rt.c:46 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0 preempt_count: 2, expected: 0 Profundidad de anidamiento de RCU: 0, expected: 0 Preempci\u00f3n deshabilitada en: [] try_to_wake_up+0x7e/0xba0 CPU: 0 PID: 1 Comm: swapper/0 No contaminado 5.17.1-rt17+ #19 34c5812404187a875f32bee7977f7367f9679ea7 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 01/04/2014 Seguimiento de llamadas: dump_stack_lvl+0x60/0x8c dump_stack+0x10/0x12 __might_resched.cold+0x11d/0x155 rt_spin_lock+0x40/0x70 trace_event_buffer_commit+0x2fa/0x4c0 ? map_vsyscall+0x93/0x93 trace_event_raw_event_initcall_start+0xbe/0x110 ? perf_trace_initcall_finish+0x210/0x210 ? probe_sched_wakeup+0x34/0x40 ? ttwu_do_wakeup+0xda/0x310 ? trace_hardirqs_on+0x35/0x170 ? map_vsyscall+0x93/0x93 do_one_initcall+0x217/0x3c0 ? trace_event_raw_event_initcall_level+0x170/0x170 ? push_cpu_stop+0x400/0x400 ? cblist_init_generic+0x241/0x290 kernel_init_freeable+0x1ac/0x347 ? _raw_spin_unlock_irq+0x65/0x80 ? rest_init+0xf0/0xf0 kernel_init+0x1e/0x150 ret_from_fork+0x22/0x30 "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "42074657-A7B6-4740-88B7-67B440018C1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/12025abdc8539ed9d5014e2d647a3fd1bd3de5cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1788e6dbb61286215442b1af99e51405a6206762",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40f9fde06b25884baa0c4bd138b909a9b67218b4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/43bfc4dccc416c964b53cbdc430e814f8b6f770b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/48c6ee7d6c614f09b2c8553a95eefef6ecf196e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9abf3db8bdb63ab545034148ef2118f4d088ca59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b534640a2c6a8d88168febc82ec6d161184f2ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be1f323fb9d9b14a505ca22d742d321769454de1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49346",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:11.340",
|
||||
"lastModified": "2025-02-26T07:01:11.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:45:55.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,136 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: lantiq_gswip: Se corrige la p\u00e9rdida de recuento de referencias en gswip_gphy_fw_list Cada iteraci\u00f3n de for_each_available_child_of_node() disminuye el recuento de referencias del nodo anterior. Al salir antes de un bucle for_each_available_child_of_node(), debemos llamar expl\u00edcitamente a of_node_put() en gphy_fw_np. Agregue of_node_put() faltante para evitar la p\u00e9rdida de recuento de referencias."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0737e018a05e2aa352828c52bdeed3b02cff2930",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2e007ac6fa7c9c94ad84da075c5c504afad690a0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/32cd78c5610f02a929f63cac985e73692d05f33e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/54d6802c4d83fa8de7696cfec06f475d5fd92d27",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7c8df6fad43d9d5d77f281f794b2a93cd02fd1a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c2ae49a113a5344232f1ebb93bcf18bbd11e9c39",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49351",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:11.823",
|
||||
"lastModified": "2025-02-26T07:01:11.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:46:06.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,178 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: altera: Se corrige la p\u00e9rdida de recuento de referencias en altera_tse_mdio_create Cada iteraci\u00f3n de for_each_child_of_node() disminuye el recuento de referencias del nodo anterior. Cuando se interrumpe un bucle for_each_child_of_node(), debemos llamar expl\u00edcitamente a of_node_put() en el nodo secundario cuando ya no lo necesitamos. Agregue of_node_put() faltante para evitar la p\u00e9rdida de recuento de referencias."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.15",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "AF11B50A-98D1-4E4E-83EA-AAD2562751B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/11ec18b1d8d92b9df307d31950dcba0b3dd7283c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1fd12298a0e0ca23478c715e672ee64c85670584",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4f850fe0a32c3f1e19b76996a3b1ca32637a14de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5cd0e22fa11f4a21a8c09cc258f20b1474c95801",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/803b217f1fb49a2dbb2123acdb45111b9c48b8be",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8174acbef87b8dd8bf3731eba2a5af1ac857e239",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/96bf5ed057df2d157274d4e2079002f9a9404bb8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a013fa884d8738ad8455aa1a843b8c9d80c6c833",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e31d9ba169860687dba19bdc8fccbfd34077f655",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49353",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:12.013",
|
||||
"lastModified": "2025-02-26T07:01:12.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:45:00.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/papr_scm: no solicita estad\u00edsticas con un b\u00fafer de estad\u00edsticas de tama\u00f1o '0' Sachin inform\u00f3 [1] que en un LPAR POWER-10 est\u00e1 viendo un p\u00e1nico del kernel que se informa con vPMEM cuando se llama a la sonda papr_scm. El p\u00e1nico tiene el formato siguiente y se observa solo con la siguiente opci\u00f3n deshabilitada (perfil) para dicho LPAR 'Habilitar recopilaci\u00f3n de informaci\u00f3n de rendimiento' en la HMC: El kernel intent\u00f3 escribir la p\u00e1gina del usuario (1c): \u00bfintento de explotaci\u00f3n? (uid: 0) ERROR: Desreferencia de puntero NULL del kernel al escribir en 0x0000001c Direcci\u00f3n de instrucci\u00f3n con error: 0xc008000001b90844 Oops: Acceso del kernel al \u00e1rea defectuosa, sig: 11 [#1] NIP [c008000001b90844] drc_pmem_query_stats+0x5c/0x270 [papr_scm] LR [c008000001b92794] papr_scm_probe+0x2ac/0x6ec [papr_scm] Seguimiento de llamadas: 0xc00000000941bca0 (no confiable) papr_scm_probe+0x2ac/0x6ec [papr_scm] platform_probe+0x98/0x150 really_probe+0xfc/0x510 __driver_probe_device+0x17c/0x230 ---[ fin del seguimiento 0000000000000000 ]--- P\u00e1nico del kernel: no se sincroniza: excepci\u00f3n fatal En la investigaci\u00f3n, parece que este p\u00e1nico se produjo debido a que se proporcion\u00f3 un 'stat_buffer' de tama\u00f1o==0 a drc_pmem_query_stats() para obtener todos los identificadores de estad\u00edsticas de rendimiento de un NVDIMM. Sin embargo, no se deber\u00eda haber llamado a drc_pmem_query_stats() ya que el NVDIMM vPMEM no admite ning\u00fan identificador de estad\u00edsticas de rendimiento. Esto se produjo debido a la falta de verificaci\u00f3n de 'p->stat_buffer_len' al comienzo de papr_scm_pmu_check_events(), lo que indica que el NVDIMM no admite estad\u00edsticas de rendimiento. Solucione este problema introduciendo la comprobaci\u00f3n de 'p->stat_buffer_len' al comienzo de papr_scm_pmu_check_events(). [1] https://lore.kernel.org/all/6B3A522A-6A5F-4CC9-B268-0C63AA6E07D3@linux.ibm.com"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F3E9542-4AD8-4E33-8FFD-E0DC34E99EA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/07bf9431b1590d1cd7a8d62075d0b50b073f0495",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e1295aab2ebcda1c1a9ed342baedc080e5c393e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49354",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:12.103",
|
||||
"lastModified": "2025-02-26T07:01:12.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:44:14.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,178 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: pata_octeon_cf: se corrige la p\u00e9rdida de recuento de referencias en octeon_cf_probe. La referencia que toma la funci\u00f3n de _find_device_by_node() se debe liberar cuando ya no se necesite. Se agrega la funci\u00f3n put_device() que falta para evitar la p\u00e9rdida de recuento de referencias."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.8",
|
||||
"versionEndExcluding": "4.9.318",
|
||||
"matchCriteriaId": "24FAA318-690B-47AA-B767-63041A5296DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10d6bdf532902be1d8aa5900b3c03c5671612aa2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/19cb3ece14547cb1ca2021798aaf49a3f82643d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7bd85c5ba1687daf54e3b6907673c3604b1e75cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/888312dc297a8a103f6371ef668c7e04f57a7679",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8d8ad067b90f231b8fdb14acee673ca4012f6045",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a4d3e5f1d7d4f8b5e3834fec0f057a762c55806b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c9782e1b21bee4b783a64b2a91e7e71406c21a21",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d5a1e7f33c88780b279835d63665d7e38ccb671f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fb2cb409b504bb3a69e65a17f3120328c8e50219",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49358",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:12.487",
|
||||
"lastModified": "2025-02-26T07:01:12.487",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T19:44:01.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,136 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_tables: regla de flujo de memleak de la ruta de confirmaci\u00f3n. La ruta de cancelaci\u00f3n libera el objeto de regla de flujo, pero la ruta de confirmaci\u00f3n no lo hace. Actualice el c\u00f3digo para destruir estos objetos antes de liberar la transacci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.3",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "9C4F7493-E51F-47D3-9A59-0B528168B495"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.122",
|
||||
"matchCriteriaId": "1B42AA01-44D8-4572-95E6-FF8E374CF9C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.47",
|
||||
"matchCriteriaId": "FC042EE3-4864-4325-BE0B-4BCDBF11AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.17.15",
|
||||
"matchCriteriaId": "53E7AA2E-2FB4-45CA-A22B-08B4EDBB51AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "5.18.4",
|
||||
"matchCriteriaId": "FA6D643C-6D6A-4821-8A8D-B5776B8F0103"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/330c0c6cd2150a2d7f47af16aa590078b0d2f736",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5b8d63489c3b701eb2a76f848ec94d8cbc9373b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80de9ea1f5b808a6601e91111fae601df2b26369",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9dd732e0bdf538b1b76dc7c157e2b5e560ff30d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab9f34a30c23f656e76f4c5b83125a4e7b53c86e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e33d9bd563e71f6c6528b96008d65524a459c4dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42961",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-04-11T15:15:44.860",
|
||||
"lastModified": "2025-04-11T15:39:52.920",
|
||||
"lastModified": "2025-04-14T19:15:35.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in iOS 17 and iPadOS 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14, macOS Ventura 13.6, macOS Monterey 12.7. A sandboxed process may be able to circumvent sandbox restrictions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120328",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42982",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-04-11T15:15:45.810",
|
||||
"lastModified": "2025-04-11T15:39:52.920",
|
||||
"lastModified": "2025-04-14T19:15:35.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Processing a file may lead to a denial-of-service or potentially disclose memory contents. This issue is fixed in macOS 14. The issue was addressed with improved checks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120950",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42983",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-04-11T15:15:45.890",
|
||||
"lastModified": "2025-04-11T15:39:52.920",
|
||||
"lastModified": "2025-04-14T19:15:35.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Processing a file may lead to a denial-of-service or potentially disclose memory contents. This issue is fixed in macOS 14. The issue was addressed with improved checks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120950",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6270",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-04T17:15:08.803",
|
||||
"lastModified": "2025-02-07T03:15:11.343",
|
||||
"lastModified": "2025-04-14T19:15:35.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -129,6 +129,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/block/aoe?h=v6.9&id=f98364e926626c678fb4b9004b75cacf92ff0662",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6270",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-11447",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-21T11:15:31.603",
|
||||
"lastModified": "2024-11-21T13:57:24.187",
|
||||
"lastModified": "2025-04-14T19:15:36.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Community by PeepSo \u2013 Download from PeepSo.com plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018filter\u2019 parameter in all versions up to, and including, 6.4.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
"value": "The Community by PeepSo \u2013 Download from PeepSo.com plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018filter\u2019 parameter in all versions up to, and including, 7.0.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -64,6 +64,10 @@
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/trunk/classes/template.php#L68",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/7.0.4.0/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/049a36b1-4e24-4ac9-a594-9cabdc0dfe0f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12335",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-25T07:15:11.980",
|
||||
"lastModified": "2024-12-25T07:15:11.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-14T18:38:36.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.11.12",
|
||||
"matchCriteriaId": "3CCBA736-C203-441D-B931-63C70455D236"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://avada.com",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181dcad-b5bd-46db-b47c-3cdee427123c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12477",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-22T22:15:08.683",
|
||||
"lastModified": "2025-01-22T22:15:08.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-14T18:38:40.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.11.11",
|
||||
"matchCriteriaId": "F690C96B-C6DD-4227-8BCE-2CAABF662EF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://avada.com",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c54588f-6436-406f-93cb-b08965586d11?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13345",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-13T07:15:08.177",
|
||||
"lastModified": "2025-02-24T17:09:19.853",
|
||||
"lastModified": "2025-04-14T19:07:59.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.11.14",
|
||||
"matchCriteriaId": "20FD83FE-D8AA-4B77-99FE-A910F08DEC7F"
|
||||
"matchCriteriaId": "42ADDD9D-A27D-40E2-A16E-9681F6979895"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56370",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-04-05T19:15:38.857",
|
||||
"lastModified": "2025-04-07T14:17:50.220",
|
||||
"lastModified": "2025-04-14T18:15:28.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Net::Xero 0.044 y versiones anteriores para Perl utilizan la funci\u00f3n rand() como fuente predeterminada de entrop\u00eda, la cual no es criptogr\u00e1ficamente segura para funciones criptogr\u00e1ficas. En concreto, Net::Xero utiliza la librer\u00eda Data::Random, que indica espec\u00edficamente que es \u00fatil principalmente para programas de prueba. Data::Random utiliza la funci\u00f3n rand()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1665",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-01T06:15:47.853",
|
||||
"lastModified": "2025-04-10T14:28:40.157",
|
||||
"lastModified": "2025-04-14T19:07:49.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:theme-fusion:avada_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.11.14",
|
||||
"matchCriteriaId": "28C4EF94-B074-4B76-A35B-CDAFAD57C158"
|
||||
"matchCriteriaId": "9FF8D208-6149-4DEB-B689-F687D0742EC8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1782.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1782.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1782",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-04-14T19:15:36.277",
|
||||
"lastModified": "2025-04-14T19:15:36.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In HylaFAX Enterprise Web Interface and AvantFAX, the language form element is not properly sanitized \nbefore being used and can be misused to include an arbitrary file in the\n PHP code allowing an attacker to do anything as the web server user. \nThis flaw requires the attacker to be authenticated with a valid user account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ifax.com/security/CVE-2025-1782.html",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26055",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T19:15:44.310",
|
||||
"lastModified": "2025-04-01T20:26:01.990",
|
||||
"lastModified": "2025-04-14T18:15:28.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el m\u00f3dulo Troubleshoot de Infinxt iEdge 100 2.1.32, espec\u00edficamente en el par\u00e1metro tracertVal de la funci\u00f3n Tracert."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rohan-pt/CVE-2025-26055",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26056",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T19:15:44.427",
|
||||
"lastModified": "2025-04-01T20:26:01.990",
|
||||
"lastModified": "2025-04-14T18:15:28.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en Infinxt iEdge 100 2.1.32, en la funcionalidad \"MTR\" del m\u00f3dulo de soluci\u00f3n de problemas. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario en el par\u00e1metro mtrIp. Un atacante puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema operativo en el sistema subyacente con los mismos privilegios que el proceso de la aplicaci\u00f3n web."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rohan-pt/CVE-2025-26056",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27829",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T17:15:46.303",
|
||||
"lastModified": "2025-04-01T20:26:01.990",
|
||||
"lastModified": "2025-04-14T18:15:28.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se detect\u00f3 un problema en Stormshield Network Security (SNS) 4.3.x anterior a la versi\u00f3n 4.3.35. Si se habilitan los flujos de multidifusi\u00f3n en diferentes interfaces, es posible que se interrumpa el tr\u00e1fico de multidifusi\u00f3n en algunas de ellas. Esto podr\u00eda provocar la denegaci\u00f3n del servicio de enrutamiento de multidifusi\u00f3n en el firewall."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisories.stormshield.eu/2025-002/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-28395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T14:15:32.917",
|
||||
"lastModified": "2025-04-01T20:26:11.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T18:15:28.833",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "D-LINK DI-8100 16.07.26A1 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n ipsec_road_asp a trav\u00e9s del par\u00e1metro host_ip."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-28398",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T14:15:33.047",
|
||||
"lastModified": "2025-04-01T20:26:11.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-14T18:15:28.970",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "D-LINK DI-8100 16.07.26A1 es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n ipsec_net_asp a trav\u00e9s del par\u00e1metro remot_ip."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow2.md",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-2814",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-04-13T00:15:14.997",
|
||||
"lastModified": "2025-04-13T00:15:14.997",
|
||||
"lastModified": "2025-04-14T19:15:36.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.\n\nThis issue affects operating systems where \"/dev/urandom'\" is unavailable.\u00a0 In that case, Crypt::CBC will fallback to use the insecure rand() function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de Crypt::CBC entre la 1.21 y la 3.04 para Perl pueden usar la funci\u00f3n rand() como fuente predeterminada de entrop\u00eda, la cual no es criptogr\u00e1ficamente segura, para funciones criptogr\u00e1ficas. Este problema afecta a sistemas operativos donde \"/dev/urandom'\" no est\u00e1 disponible. En ese caso, Crypt::CBC recurrir\u00e1 a la funci\u00f3n rand(), que no es segura."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
@ -22,6 +49,16 @@
|
||||
"value": "CWE-338"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-338"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T18:15:29.780",
|
||||
"lastModified": "2025-04-01T20:26:01.990",
|
||||
"lastModified": "2025-04-14T18:15:29.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "CodeZips Gym Management System v1.0 es vulnerable a la inyecci\u00f3n de SQL en el par\u00e1metro de nombre dentro de /dashboard/admin/deleteroutine.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LLz-7/CVE/blob/main/CVE_1.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29720",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-14T17:15:26.880",
|
||||
"lastModified": "2025-04-14T17:15:26.880",
|
||||
"lastModified": "2025-04-14T19:15:36.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Dify v1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component controllers.console.remote_files.RemoteFileUploadApi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://dify.ai",
|
||||
|
145
CVE-2025/CVE-2025-35xx/CVE-2025-3585.json
Normal file
145
CVE-2025/CVE-2025-35xx/CVE-2025-3585.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3585",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-14T18:15:29.657",
|
||||
"lastModified": "2025-04-14T19:15:36.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in westboy CicadasCMS 1.0. This affects an unknown part of the file /upload/ of the component JSP Parser. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Bae-ke/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.304641",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.304641",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.549981",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Bae-ke/cve/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-14T18:00:20.310157+00:00
|
||||
2025-04-14T20:00:20.152842+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-14T17:50:37.680000+00:00
|
||||
2025-04-14T19:59:26.907000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289803
|
||||
289805
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-14T16:15:21.450`)
|
||||
- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-14T16:15:21.630`)
|
||||
- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-14T16:15:21.767`)
|
||||
- [CVE-2025-2572](CVE-2025/CVE-2025-25xx/CVE-2025-2572.json) (`2025-04-14T16:15:21.903`)
|
||||
- [CVE-2025-29720](CVE-2025/CVE-2025-297xx/CVE-2025-29720.json) (`2025-04-14T17:15:26.880`)
|
||||
- [CVE-2025-3277](CVE-2025/CVE-2025-32xx/CVE-2025-3277.json) (`2025-04-14T17:15:27.297`)
|
||||
- [CVE-2025-32931](CVE-2025/CVE-2025-329xx/CVE-2025-32931.json) (`2025-04-14T16:15:22.157`)
|
||||
- [CVE-2025-1782](CVE-2025/CVE-2025-17xx/CVE-2025-1782.json) (`2025-04-14T19:15:36.277`)
|
||||
- [CVE-2025-3585](CVE-2025/CVE-2025-35xx/CVE-2025-3585.json) (`2025-04-14T18:15:29.657`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `51`
|
||||
Recently modified CVEs: `81`
|
||||
|
||||
- [CVE-2023-0449](CVE-2023/CVE-2023-04xx/CVE-2023-0449.json) (`2025-04-14T17:15:26.173`)
|
||||
- [CVE-2023-0511](CVE-2023/CVE-2023-05xx/CVE-2023-0511.json) (`2025-04-14T17:15:26.240`)
|
||||
- [CVE-2023-0582](CVE-2023/CVE-2023-05xx/CVE-2023-0582.json) (`2025-04-14T17:15:26.367`)
|
||||
- [CVE-2023-1656](CVE-2023/CVE-2023-16xx/CVE-2023-1656.json) (`2025-04-14T17:15:26.507`)
|
||||
- [CVE-2024-11155](CVE-2024/CVE-2024-111xx/CVE-2024-11155.json) (`2025-04-14T17:17:56.877`)
|
||||
- [CVE-2024-38988](CVE-2024/CVE-2024-389xx/CVE-2024-38988.json) (`2025-04-14T16:58:20.987`)
|
||||
- [CVE-2024-42196](CVE-2024/CVE-2024-421xx/CVE-2024-42196.json) (`2025-04-14T17:16:43.817`)
|
||||
- [CVE-2024-44676](CVE-2024/CVE-2024-446xx/CVE-2024-44676.json) (`2025-04-14T16:15:21.090`)
|
||||
- [CVE-2024-49697](CVE-2024/CVE-2024-496xx/CVE-2024-49697.json) (`2025-04-14T17:15:40.523`)
|
||||
- [CVE-2024-52531](CVE-2024/CVE-2024-525xx/CVE-2024-52531.json) (`2025-04-14T16:15:21.263`)
|
||||
- [CVE-2024-54357](CVE-2024/CVE-2024-543xx/CVE-2024-54357.json) (`2025-04-14T17:47:41.763`)
|
||||
- [CVE-2024-56975](CVE-2024/CVE-2024-569xx/CVE-2024-56975.json) (`2025-04-14T16:50:35.247`)
|
||||
- [CVE-2024-57083](CVE-2024/CVE-2024-570xx/CVE-2024-57083.json) (`2025-04-14T17:02:15.813`)
|
||||
- [CVE-2025-20661](CVE-2025/CVE-2025-206xx/CVE-2025-20661.json) (`2025-04-14T16:36:48.130`)
|
||||
- [CVE-2025-20662](CVE-2025/CVE-2025-206xx/CVE-2025-20662.json) (`2025-04-14T16:31:19.480`)
|
||||
- [CVE-2025-22953](CVE-2025/CVE-2025-229xx/CVE-2025-22953.json) (`2025-04-14T17:04:43.747`)
|
||||
- [CVE-2025-28256](CVE-2025/CVE-2025-282xx/CVE-2025-28256.json) (`2025-04-14T17:06:52.373`)
|
||||
- [CVE-2025-2927](CVE-2025/CVE-2025-29xx/CVE-2025-2927.json) (`2025-04-14T17:09:19.427`)
|
||||
- [CVE-2025-30286](CVE-2025/CVE-2025-302xx/CVE-2025-30286.json) (`2025-04-14T17:43:28.940`)
|
||||
- [CVE-2025-30287](CVE-2025/CVE-2025-302xx/CVE-2025-30287.json) (`2025-04-14T17:46:20.293`)
|
||||
- [CVE-2025-30288](CVE-2025/CVE-2025-302xx/CVE-2025-30288.json) (`2025-04-14T17:48:04.153`)
|
||||
- [CVE-2025-30289](CVE-2025/CVE-2025-302xx/CVE-2025-30289.json) (`2025-04-14T17:50:37.680`)
|
||||
- [CVE-2025-30293](CVE-2025/CVE-2025-302xx/CVE-2025-30293.json) (`2025-04-14T16:01:39.640`)
|
||||
- [CVE-2025-30294](CVE-2025/CVE-2025-302xx/CVE-2025-30294.json) (`2025-04-14T16:05:16.407`)
|
||||
- [CVE-2025-3571](CVE-2025/CVE-2025-35xx/CVE-2025-3571.json) (`2025-04-14T16:15:22.713`)
|
||||
- [CVE-2022-49318](CVE-2022/CVE-2022-493xx/CVE-2022-49318.json) (`2025-04-14T19:59:06.820`)
|
||||
- [CVE-2022-49322](CVE-2022/CVE-2022-493xx/CVE-2022-49322.json) (`2025-04-14T19:45:44.123`)
|
||||
- [CVE-2022-49346](CVE-2022/CVE-2022-493xx/CVE-2022-49346.json) (`2025-04-14T19:45:55.220`)
|
||||
- [CVE-2022-49351](CVE-2022/CVE-2022-493xx/CVE-2022-49351.json) (`2025-04-14T19:46:06.033`)
|
||||
- [CVE-2022-49353](CVE-2022/CVE-2022-493xx/CVE-2022-49353.json) (`2025-04-14T19:45:00.240`)
|
||||
- [CVE-2022-49354](CVE-2022/CVE-2022-493xx/CVE-2022-49354.json) (`2025-04-14T19:44:14.093`)
|
||||
- [CVE-2022-49358](CVE-2022/CVE-2022-493xx/CVE-2022-49358.json) (`2025-04-14T19:44:01.833`)
|
||||
- [CVE-2023-42961](CVE-2023/CVE-2023-429xx/CVE-2023-42961.json) (`2025-04-14T19:15:35.480`)
|
||||
- [CVE-2023-42982](CVE-2023/CVE-2023-429xx/CVE-2023-42982.json) (`2025-04-14T19:15:35.610`)
|
||||
- [CVE-2023-42983](CVE-2023/CVE-2023-429xx/CVE-2023-42983.json) (`2025-04-14T19:15:35.743`)
|
||||
- [CVE-2023-6270](CVE-2023/CVE-2023-62xx/CVE-2023-6270.json) (`2025-04-14T19:15:35.987`)
|
||||
- [CVE-2024-11447](CVE-2024/CVE-2024-114xx/CVE-2024-11447.json) (`2025-04-14T19:15:36.150`)
|
||||
- [CVE-2024-12335](CVE-2024/CVE-2024-123xx/CVE-2024-12335.json) (`2025-04-14T18:38:36.037`)
|
||||
- [CVE-2024-12477](CVE-2024/CVE-2024-124xx/CVE-2024-12477.json) (`2025-04-14T18:38:40.160`)
|
||||
- [CVE-2024-13345](CVE-2024/CVE-2024-133xx/CVE-2024-13345.json) (`2025-04-14T19:07:59.540`)
|
||||
- [CVE-2024-56370](CVE-2024/CVE-2024-563xx/CVE-2024-56370.json) (`2025-04-14T18:15:28.220`)
|
||||
- [CVE-2025-1665](CVE-2025/CVE-2025-16xx/CVE-2025-1665.json) (`2025-04-14T19:07:49.010`)
|
||||
- [CVE-2025-26055](CVE-2025/CVE-2025-260xx/CVE-2025-26055.json) (`2025-04-14T18:15:28.427`)
|
||||
- [CVE-2025-26056](CVE-2025/CVE-2025-260xx/CVE-2025-26056.json) (`2025-04-14T18:15:28.560`)
|
||||
- [CVE-2025-27829](CVE-2025/CVE-2025-278xx/CVE-2025-27829.json) (`2025-04-14T18:15:28.697`)
|
||||
- [CVE-2025-2814](CVE-2025/CVE-2025-28xx/CVE-2025-2814.json) (`2025-04-14T19:15:36.543`)
|
||||
- [CVE-2025-28395](CVE-2025/CVE-2025-283xx/CVE-2025-28395.json) (`2025-04-14T18:15:28.833`)
|
||||
- [CVE-2025-28398](CVE-2025/CVE-2025-283xx/CVE-2025-28398.json) (`2025-04-14T18:15:28.970`)
|
||||
- [CVE-2025-29208](CVE-2025/CVE-2025-292xx/CVE-2025-29208.json) (`2025-04-14T18:15:29.100`)
|
||||
- [CVE-2025-29720](CVE-2025/CVE-2025-297xx/CVE-2025-29720.json) (`2025-04-14T19:15:36.413`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
278
_state.csv
278
_state.csv
@ -116554,7 +116554,7 @@ CVE-2018-16131,0,0,8752b9675b6f965991e0e96c90f0e5f502f04d2ba509f358ec7ed4f532bd8
|
||||
CVE-2018-16132,0,0,4a9ae097ac57c9f72ad36e6976ce2484372bc6a9e02a2ddd3899b1bb9492e324,2024-11-21T03:52:07.783000
|
||||
CVE-2018-16133,0,0,cc9255c0a002df654ff2187fecbd4f2c7ae04eef75b52a9012385b8f2a3423db,2024-11-21T03:52:07.930000
|
||||
CVE-2018-16134,0,0,17e6ee8ae1eec66603b4ea55e66e13eb62da6ab33150f2ae6978e8619b906d84,2024-11-21T03:52:08.080000
|
||||
CVE-2018-16135,0,0,cabe08090febb67affd3132b02ca2616ada8cd7210d4b9c4e9bd3f1f4f71474d,2024-11-21T03:52:08.247000
|
||||
CVE-2018-16135,0,1,666d456d2d5c90d1147add7e373a9d1a60b5a650829b379c4f63770de294e056,2025-04-14T19:15:27.770000
|
||||
CVE-2018-16136,0,0,1376c47d7747564d9d53ae1b5cb422eb2050df31d7a99779df94fb90bbab7f03,2024-11-21T03:52:08.403000
|
||||
CVE-2018-16137,0,0,762548ad5a05f963da9474bda4e740da0bdb228b199aa2ba608082e0cc752784,2024-11-21T03:52:08.553000
|
||||
CVE-2018-16138,0,0,4dac1cda3133410f0b3eedd8f5363c2f5e4638630be88eef0a5b6e95e996f5f0,2024-11-21T03:52:08.700000
|
||||
@ -130212,7 +130212,7 @@ CVE-2019-11848,0,0,0aa2fd62af0bd9ea91d9054f42ae540f2049b06cc39279b4663103989e1de
|
||||
CVE-2019-11849,0,0,0e286b66b2038100bd9e5bf622b987c1457dffb54ad59cf29fad9feb1d2d8729,2024-11-21T04:21:53.653000
|
||||
CVE-2019-1185,0,0,d2f6307587dfa5a980a6060d0698f2a584834c5040c1d72893221f1c16cd8298,2024-11-21T04:36:12.120000
|
||||
CVE-2019-11850,0,0,c45c6c2d197f1c70d9bab696ff20fff86524bb063b049fd036738fc374723986,2024-11-21T04:21:53.797000
|
||||
CVE-2019-11851,0,0,106f2ed379efddecdb7a3122867dbb6798b41911a25c87b72d1f5ef0f05abd0c,2024-11-21T04:21:53.930000
|
||||
CVE-2019-11851,0,1,b17a0b2c9b38b3ae3467ab222422b1d0b73156f04e0eefa16930b58ec07474e7,2025-04-14T18:15:17.260000
|
||||
CVE-2019-11852,0,0,322defbac1a33bfe9e49b6a76bf8d33e3461ca77ed34d4384715d9077c85d271,2024-11-21T04:21:54.067000
|
||||
CVE-2019-11853,0,0,56ac4f310e7601b8f2681d8bad5bbede585cc18550ecc40bd03a3bb99a544dbf,2024-11-21T04:21:54.203000
|
||||
CVE-2019-11855,0,0,40a5fb2cefde1fd9c7b2d70e422841f58c14be9ff8012c35c79c9bd3129ff95a,2024-11-21T04:21:54.343000
|
||||
@ -132032,7 +132032,7 @@ CVE-2019-13981,0,0,ea07d2bb6d531de4a1e84efd02162665c7d0965a761d0690d2bce8995fd84
|
||||
CVE-2019-13982,0,0,0db3b9068aa6367d1842c4a1c154a3e4753ea6173e611c0d5a2370bc7aa93505,2024-11-21T04:25:49.783000
|
||||
CVE-2019-13983,0,0,85e149100b59ba0980d4c2d215865335fa35a73ff0b12c3130547ce876bffe21,2024-11-21T04:25:49.923000
|
||||
CVE-2019-13984,0,0,fcfc045281c331ccf055f71a56eb1e5a4fa2178b4700dfe4ec5ed9b2e9c4bfe0,2024-11-21T04:25:50.060000
|
||||
CVE-2019-13988,0,1,16fcf14171e7ca9fea287f89d69b4ad1431ba779ff4b1078e8c9cbdb70a4f0c2,2025-04-14T17:15:21.187000
|
||||
CVE-2019-13988,0,0,16fcf14171e7ca9fea287f89d69b4ad1431ba779ff4b1078e8c9cbdb70a4f0c2,2025-04-14T17:15:21.187000
|
||||
CVE-2019-13989,0,0,a5811404f9c5a9332efe439a29da99957934f91fd1484e7be55184c5760f382b,2024-11-21T04:25:50.343000
|
||||
CVE-2019-1399,0,0,dd5ce9690594ac3a7bc6251a9b94f061b8401b9a5e267ecec59a5adf3318a0ef,2024-11-21T04:36:37.933000
|
||||
CVE-2019-13990,0,0,d8d512d255a8b3024855526d14140ce6c615be7acd84c9b595efefdf0265254e,2024-11-21T04:25:50.490000
|
||||
@ -132833,7 +132833,7 @@ CVE-2019-14799,0,0,b0cbdf24ccf2f160a342039ce2b3d3e1ba3c62b7a74ee5fe95c2678cede68
|
||||
CVE-2019-1480,0,0,e228cae017a0f23be5136b73222fa7386075b9ca4dff513d2c0ede5f9e207afb,2024-11-21T04:36:46.200000
|
||||
CVE-2019-14800,0,0,53e003912e6b7d03ac9e09b3447fb5bc7d972416c828a31b6f2e413b2cd6aa2b,2024-11-21T04:27:23
|
||||
CVE-2019-14801,0,0,fab702fd194e88475447df86869c1cf3b48fc0ae71c602351e6f88d4e333a785,2024-11-21T04:27:23.167000
|
||||
CVE-2019-14802,0,0,c19422731985ab8ef5948bdb04f2af5e94585ea3255f666f220def1f7e3bfee0,2024-11-21T04:27:23.327000
|
||||
CVE-2019-14802,0,1,01991d1a4f5caa53179e1c027774f4ce5e67ceadd01bd635c37af8a34e5a739f,2025-04-14T18:15:18.280000
|
||||
CVE-2019-14804,0,0,63c7b47de1a82508683913ec433fe48639f504df78b61e7427aab8a023e4e642,2024-11-21T04:27:23.470000
|
||||
CVE-2019-14805,0,0,2db52da7ba6e061b37e2c5866f37ac86cb53590d7295eb46fd4a5f21a718485d,2024-11-21T04:27:23.613000
|
||||
CVE-2019-14806,0,0,42d9754a15042a34b7aa6887bd7f0c9a9ef6a4c676434e8fe6b3b557422faeed,2024-11-21T04:27:23.750000
|
||||
@ -135494,7 +135494,7 @@ CVE-2019-1814,0,0,6b482a1984164225f91a406f53c4f46d9a97fe53faff00d706359495047344
|
||||
CVE-2019-1815,0,0,e25a988059cd055b47dd6d5d6b9f10425523eb6335ee29a9b8153dfed096dfe9,2025-03-04T19:15:36.177000
|
||||
CVE-2019-1816,0,0,bc1b96179ad9e6dc3efe1c98de6af983824c419aa24897dd76fe2ae3535bf76d,2024-11-21T04:37:26.523000
|
||||
CVE-2019-1817,0,0,b37f886c116df24d0ef11fd8cd0180a420714c8f2b41e09b3f99177374f69a57,2024-11-21T04:37:26.647000
|
||||
CVE-2019-18177,0,0,997596f59e0036f91e0b923e8d3cab2e9e3873b57aa1cfd4f381e2447e82c231,2024-11-21T04:32:46.273000
|
||||
CVE-2019-18177,0,1,2c4ab34ab21acb4a388ae06e87f95acdd405e21ce47770599186db3d02e56c4a,2025-04-14T18:15:18.447000
|
||||
CVE-2019-18178,0,0,4014754098609c269ccd37e16c70e7959f7f1db6a3796fd3f3684fc82a2086bf,2024-11-21T04:32:46.407000
|
||||
CVE-2019-18179,0,0,f8ec20cab5aeaec90d0dc5ea3b6119ac224af602e436eac536be52ace47ae53e,2024-11-21T04:32:46.540000
|
||||
CVE-2019-1818,0,0,3d1a9790a6b995e50f8a9799d3172dfae1cd6d7c6e0f7f158914ad39cbc3acef,2024-11-21T04:37:26.773000
|
||||
@ -136303,7 +136303,7 @@ CVE-2019-19025,0,0,93e2908599ad43f5f427582f2d1677824f31c9efb4b715da17321d013cf0d
|
||||
CVE-2019-19026,0,0,3f9263eb3c9ee3c64e82dc3dc30f177d98e64ce2e0fa1a671dc1101325dd6c6b,2024-11-21T04:34:01.290000
|
||||
CVE-2019-19029,0,0,fe88c484a10b77f3ffc5201d2aa64dd1d17a6fe2ba2892c9a028d95aaecf1b3b,2024-11-21T04:34:01.437000
|
||||
CVE-2019-1903,0,0,6ff2594fff582733cc14f1358ff681bbf89acdcb17071143c21dfab617acd818,2024-11-21T04:37:39.163000
|
||||
CVE-2019-19030,0,1,ed81c66c13846c461b1f3a8d0a8c092afc649cc90212304855553d67fa6a9830,2025-04-14T17:15:22.360000
|
||||
CVE-2019-19030,0,0,ed81c66c13846c461b1f3a8d0a8c092afc649cc90212304855553d67fa6a9830,2025-04-14T17:15:22.360000
|
||||
CVE-2019-19031,0,0,a2b702e12106df718f9c108c36b2e07e8a4873562e2bd4f3398f1ebbfde44015,2024-11-21T04:34:01.730000
|
||||
CVE-2019-19032,0,0,b5429f178b1da5bfe0aa69e449a4799a4ff10039c9e5c7c67b5284550deb35c0,2024-11-21T04:34:01.877000
|
||||
CVE-2019-19033,0,0,0f72061de7f4ab67321a416c0418d8bb6a5b369528f54e403f433af02934aaa5,2024-11-21T04:34:02.023000
|
||||
@ -136870,7 +136870,7 @@ CVE-2019-1970,0,0,fd0b28d9e55ecc20a675839941eeff86679d250475ab9457dbfec753183a15
|
||||
CVE-2019-19702,0,0,dbf6df8929ad895c6c8d85156afbd6cac9d25da1a26c4a1f5a09fafc232ad008,2024-11-21T04:35:13.300000
|
||||
CVE-2019-19703,0,0,63f0680d8cca515f1d9e30d83a20ce770d06e995ba2140c70f4aca4939b8cc71,2024-11-21T04:35:13.457000
|
||||
CVE-2019-19704,0,0,cf0ece0e7e8eb23be432eaf7027dd50ee05cde290294b510770290c5c3225618,2024-11-21T04:35:13.630000
|
||||
CVE-2019-19705,0,1,9baf22c59b0922b83be8c8478fc2068c8dc75d70b284d476c09246d49073c6a8,2025-04-14T17:15:22.570000
|
||||
CVE-2019-19705,0,0,9baf22c59b0922b83be8c8478fc2068c8dc75d70b284d476c09246d49073c6a8,2025-04-14T17:15:22.570000
|
||||
CVE-2019-19707,0,0,9fb3069c921248e786df5ebfa0b2b83997ea77c697f4b6bdd24d87ee28c687d3,2024-11-21T04:35:14.117000
|
||||
CVE-2019-19708,0,0,00588cb8b95ea7186817d874af924df267b32fcf75aefb3d38252ddef2ab78d9,2024-11-21T04:35:14.277000
|
||||
CVE-2019-19709,0,0,c3f517ffc4c1d93403b740397e3359d19091e45a20acbc682b39a46a0b064308,2024-11-21T04:35:14.450000
|
||||
@ -143454,7 +143454,7 @@ CVE-2019-9005,0,0,22f134a795f4dec61c4be24843eb39191c0ce616d348afc7de4e3daec1a37b
|
||||
CVE-2019-9008,0,0,f380c96fd4bd0eac796b5fa044421b4c0cff7b903bdc8a8b5bc2cdc779793805,2024-11-21T04:50:48.050000
|
||||
CVE-2019-9009,0,0,e8320df71423bc99c3ed160ae9a308449901c44e8835ddc55e3e84c1986e43ac,2024-11-21T04:50:48.197000
|
||||
CVE-2019-9010,0,0,bc808d7c1237a723c844fad1788d553a1d708c17da75b23be10ce14509c43c57,2024-11-21T04:50:48.343000
|
||||
CVE-2019-9011,0,1,b4d4f4609775d4194109edfe71d7298c92f0eaaee862b32c6a544e6e76dbef7b,2025-04-14T17:15:22.920000
|
||||
CVE-2019-9011,0,0,b4d4f4609775d4194109edfe71d7298c92f0eaaee862b32c6a544e6e76dbef7b,2025-04-14T17:15:22.920000
|
||||
CVE-2019-9012,0,0,bdda1a7bad7a9f8a25a8518a15e692850a4b4970e8e6602dc7eedd91fe4484f3,2024-11-21T04:50:48.627000
|
||||
CVE-2019-9013,0,0,a7bfd0fa299855eec9908e4fcb0cfbd2d7accb3ac8ee45c6fe233ed06e712ba2,2024-11-21T04:50:48.770000
|
||||
CVE-2019-9015,0,0,75029bb8d04f7c69b12947fe24411f8af94981b3d8bd57e49718957a5f3f91b7,2024-11-21T04:50:48.913000
|
||||
@ -143960,7 +143960,7 @@ CVE-2019-9574,0,0,a96ef0f445ca1bbb655a0e26601e4e8180f360054c975bf5aa14805d48714b
|
||||
CVE-2019-9575,0,0,35cac0ec6d1bef5172211efa274d9283abb0afefeaf43cd75435e3cabffe1eec,2024-11-21T04:51:53.153000
|
||||
CVE-2019-9576,0,0,27593cfb66ea817f5efab7ec174e5e8c0f4c7b8a286756188eaeffa43315a59e,2024-11-21T04:51:53.293000
|
||||
CVE-2019-9578,0,0,49e683eeec94fe2cf56e8e25d91d6fb7f0fb7ebccbcee7a5ed1348e9c262899a,2024-11-21T04:51:53.433000
|
||||
CVE-2019-9579,0,1,2684c4a42fe6defbaad3b9ab3c795c89924e635b7bac6bd48c3b12c07e6781f8,2025-04-14T17:15:23.140000
|
||||
CVE-2019-9579,0,0,2684c4a42fe6defbaad3b9ab3c795c89924e635b7bac6bd48c3b12c07e6781f8,2025-04-14T17:15:23.140000
|
||||
CVE-2019-9580,0,0,2f5381159e7bb8ef6029f9475888a252d54a39506791dc419cc915642fa0b5bd,2024-11-21T04:51:53.740000
|
||||
CVE-2019-9581,0,0,fda938739c455822e10d8afc8d2f9e24449a934e8feb611106fe9e67fa080787,2024-11-21T04:51:53.887000
|
||||
CVE-2019-9582,0,0,5e3a1315001026930e17b9865a47e407cd86a8f2726330520b098a08f39b2d12,2024-11-21T04:51:54.033000
|
||||
@ -145854,7 +145854,7 @@ CVE-2020-10647,0,0,a07fd49b012e151f6cfe6aec653835d26d5a15bbd143ccae8ebc67554ead0
|
||||
CVE-2020-10648,0,0,b806df1e61c302a61b417a2d41b1e9addb4e45b12e3fd16f0f5aeb7490086e41,2024-11-21T04:55:46.037000
|
||||
CVE-2020-10649,0,0,727287d1cf70f955d5f7c8ed07531127ce782a367b96899812e2538d7e2198d3,2024-11-21T04:55:46.177000
|
||||
CVE-2020-1065,0,0,6948a993563f2e884fd0ae4a3581b32e33e146d8db8104cec0849aa22bd6897e,2024-11-21T05:09:40.523000
|
||||
CVE-2020-10650,0,1,146db4822a1e375be1a8a03a8664c580ab3e4a9c7dd18651f524e33548a8a243,2025-04-14T17:15:23.347000
|
||||
CVE-2020-10650,0,0,146db4822a1e375be1a8a03a8664c580ab3e4a9c7dd18651f524e33548a8a243,2025-04-14T17:15:23.347000
|
||||
CVE-2020-10654,0,0,663a9db14c5848456f44339619dee57a5927404e245485d52d4e1ecac4c4470e,2024-11-21T04:55:46.493000
|
||||
CVE-2020-10655,0,0,160434e451f6876b5eca7f1db3e50619ea6e3cd6f0c6322d4e9c0f8b589c9427,2024-11-21T04:55:46.637000
|
||||
CVE-2020-10656,0,0,73152245bb7abf69a490bb788feb3a30f51731bb33fccba0ab23881726b962e5,2024-11-21T04:55:46.783000
|
||||
@ -146319,7 +146319,7 @@ CVE-2020-11098,0,0,6650884710e39b977e606a8bb486bb4bc20aa11fe68fe16e84b4bc1a7bf9d
|
||||
CVE-2020-11099,0,0,409d2e471fc7a0286d5079c3c8ff253740a679d3574b5e3fb0e1dd61c6777cc2,2024-11-21T04:56:47.127000
|
||||
CVE-2020-1110,0,0,19f4fcf11864935237a7914021260024b708a7a1c466696bdb762a85a7ecd0a3,2024-11-21T05:09:46.117000
|
||||
CVE-2020-11100,0,0,0efad0746dbca49d786073ce9c3ae9ed1928c9bbb30464a99785b03b8d81c38f,2024-11-21T04:56:47.257000
|
||||
CVE-2020-11101,0,1,8477f8282ba96ae38314cc9fdb69117479ef062634bcfcca2fa988976dfbe446,2025-04-14T17:15:23.590000
|
||||
CVE-2020-11101,0,0,8477f8282ba96ae38314cc9fdb69117479ef062634bcfcca2fa988976dfbe446,2025-04-14T17:15:23.590000
|
||||
CVE-2020-11102,0,0,acfb76504881c867491a15e5c9a83c72f8226c26f64c6d7372089dca8681853d,2024-11-21T04:56:47.570000
|
||||
CVE-2020-11103,0,0,76f0b53e108542ae3af2de7181180457e49683f256be1bee156ffb1dcd44771b,2024-11-21T04:56:47.713000
|
||||
CVE-2020-11104,0,0,965c111e1b6fc6ddf28522265d642100c67977d3b6b53d8af7b08bf15b30b738,2024-11-21T04:56:47.850000
|
||||
@ -147267,7 +147267,7 @@ CVE-2020-12061,0,0,3104b338557f2995e2128c5d3870ac0621c99df5bf7b93299a7f1c9a7e041
|
||||
CVE-2020-12062,0,0,23eced06d6cfe20a560346142e2cd7810290bbed84b080edcc3078651895263f,2024-11-21T04:59:12.097000
|
||||
CVE-2020-12063,0,0,3927d1609f32771f4d98fcb7a9068645d3afb9729416544105554e064334afbe,2024-11-21T04:59:12.257000
|
||||
CVE-2020-12066,0,0,895951bef26856a4ddc9e9d5ec525999243aa1a62e9c36afbb44c5a0c7f2e18c,2024-11-21T04:59:12.393000
|
||||
CVE-2020-12067,0,1,e7632a86215c3ff7ad44c8459a3ea305227763b8380894bc00b9635614471727,2025-04-14T17:15:23.763000
|
||||
CVE-2020-12067,0,0,e7632a86215c3ff7ad44c8459a3ea305227763b8380894bc00b9635614471727,2025-04-14T17:15:23.763000
|
||||
CVE-2020-12068,0,0,ae1ee6148620821fd5671e92fdfb25e86ed80548ad6c3f471284d6788880683a,2024-11-21T04:59:12.677000
|
||||
CVE-2020-12069,0,0,fd4e0dccd60de0fc0ca027582b0d93f86e52c5208959b0ebe7d18370e8607af8,2024-11-21T04:59:12.810000
|
||||
CVE-2020-1207,0,0,a37aa041765dfb864723114083edcb2cb2c48dac881e24c30c597a5d43453854,2024-11-21T05:09:58.773000
|
||||
@ -154413,7 +154413,7 @@ CVE-2020-24594,0,0,37422f7fb0ed236a83b4382d21916136bd0102fecd9f537bc6fd517e494cf
|
||||
CVE-2020-24595,0,0,410058b1457c9972d5ab2df8c67796b96038ed747628b52aa84e37af9cba65f7,2024-11-21T05:15:07.210000
|
||||
CVE-2020-24598,0,0,0c534100e31b366752e12343f9bcf49a092042a0dfd5821f4eb2ee318b7c100b,2024-11-21T05:15:07.380000
|
||||
CVE-2020-24599,0,0,bc2e089f8b32f93933a76e4488e26a64603fbb4f93e0478c9ba22dc3453e18ad,2024-11-21T05:15:07.560000
|
||||
CVE-2020-24600,0,1,a6ee96061e176fba3c5893a39d371cc1105dace68528c2b795f35055a78bde78,2025-04-14T17:15:24.030000
|
||||
CVE-2020-24600,0,0,a6ee96061e176fba3c5893a39d371cc1105dace68528c2b795f35055a78bde78,2025-04-14T17:15:24.030000
|
||||
CVE-2020-24601,0,0,89c8d642e3a027762afe0017e2b2be42f4027c84b1ba3ea6c1eefb6969e0b6dc,2024-11-21T05:15:07.943000
|
||||
CVE-2020-24602,0,0,3d35e58df9d2f392af2107b1fae127c6c2da41975f20129aa2fc6b2382eb50ae,2024-11-21T05:15:08.130000
|
||||
CVE-2020-24604,0,0,825db592aa6915c906efee0d1b72fc976f1fa61234d507d2c0a6e434bd3f1aa0,2024-11-21T05:15:08.300000
|
||||
@ -156938,7 +156938,7 @@ CVE-2020-28188,0,0,f6c98ae45f2fd224b4c4038c02fb59b266d06ec39b93dc21a16c188935dd3
|
||||
CVE-2020-28189,0,0,f69fd84cf3f1d1fa0219067a4bbb14edab828dd9f796f70f4768d6af03acdf6c,2023-11-07T03:21:07.747000
|
||||
CVE-2020-2819,0,0,d76d15f73c8ee55d346001d65e5a7f21e30fba0714dededcf772af8724f55e67,2024-11-21T05:26:21.730000
|
||||
CVE-2020-28190,0,0,dbeb9f7d12d3f460c9088a834a7e2f1b81c1bf96323ad91b21e42e8fcc9ee4af,2024-11-21T05:22:27.177000
|
||||
CVE-2020-28191,0,1,36141dba8ed29f2d0375b2ded6ceea90391cbf129e2710ade5d0c71c64aa8ae6,2025-04-14T17:15:24.227000
|
||||
CVE-2020-28191,0,0,36141dba8ed29f2d0375b2ded6ceea90391cbf129e2710ade5d0c71c64aa8ae6,2025-04-14T17:15:24.227000
|
||||
CVE-2020-28194,0,0,dd183fc91db2aa1515f1115cfd86a3743a089b41a0e44740298484bb09eaf4e0,2024-11-21T05:22:27.467000
|
||||
CVE-2020-28196,0,0,f38b6180e894d650fd65dcdd80e79bcd496e9544c796a5fb172fab8c712871e1,2024-11-21T05:22:27.613000
|
||||
CVE-2020-28198,0,0,a8a6f6a2437a78195ee1d75d34425f199793bb45be5a8b6550eca45924567570,2024-11-21T05:22:27.827000
|
||||
@ -174669,7 +174669,7 @@ CVE-2021-3013,0,0,10d5d142e94988a2fc18ffda3a0e205561991547c042e228eeb8cd686ff9f3
|
||||
CVE-2021-30130,0,0,838a709b55da6068dba7444762b74be3d8cd5a7fa4cea3d8521342c144c98721,2024-11-21T06:03:22.027000
|
||||
CVE-2021-30132,0,0,129ccdb2d53e4b60c0a32fad514b8f5001b007fe5cd55418dcf50bd73c64d716,2024-11-21T06:03:22.187000
|
||||
CVE-2021-30133,0,0,21a3580b43d4bbcab37420bebc352f52771b2ca8b089037763052df4f352bf38,2024-11-21T06:03:22.330000
|
||||
CVE-2021-30134,0,0,f8704eeddb52f267f56441f48b99d4d630df3f5922a9b7be7fb330a116dab702,2024-11-21T06:03:22.483000
|
||||
CVE-2021-30134,0,1,cf006acb355976f68d2c33789c11746a3e2f52b56a3178108f63a2e5a1b103e9,2025-04-14T19:15:28.767000
|
||||
CVE-2021-30137,0,0,8df1b8accfa683c1f07e41115f3836683bbc8ad7e24bbdd8b55315ff5fb7d75d,2024-11-21T06:03:22.627000
|
||||
CVE-2021-30138,0,0,5848986934a682754ea4634a2a150ef0e8dbae4619b53291c7f964622ce22019,2023-11-07T03:32:58.850000
|
||||
CVE-2021-30139,0,0,aaad9440e7e6d64b69531a8dda4b714f2278686dd4f24ace0be4f9503213bc3d,2024-11-21T06:03:22.797000
|
||||
@ -178611,7 +178611,7 @@ CVE-2021-35061,0,0,0434689534b5c5166471e7bad5c6b3d6ca33ecac870068efe2291a35b2767
|
||||
CVE-2021-35062,0,0,59361a848dd37930bd41fc2bb9d8b65be0f95524806b6542d9809e5101b6af2b,2024-11-21T06:11:46.337000
|
||||
CVE-2021-35063,0,0,5563dbfbb273bc66b2ee1e7e5bb80780c93358e9d385a1b3be5fe67a5daff02b,2024-11-21T06:11:46.477000
|
||||
CVE-2021-35064,0,0,bfcda26f5a9a4b72145e35315cac8873222ecdadb3dc98d8ed058b5897a8c7fa,2024-11-21T06:11:46.647000
|
||||
CVE-2021-35065,0,0,1c7a08b8702af78b58f811378604558d69b2372aa3f7de9c490e18c4be287e0a,2024-11-21T06:11:46.787000
|
||||
CVE-2021-35065,0,1,6031b5908d5c11f9b48f429f35d924d42b6491015e1ca958fa933d993a0945d2,2025-04-14T19:15:29.767000
|
||||
CVE-2021-35066,0,0,77a2eb97c79acc9dff7d5e9dff5ae92015b72ef1efc7b32698d9bf62af01b096,2024-11-21T06:11:46.940000
|
||||
CVE-2021-35067,0,0,270743ba289c68a92e16d04a4fd0e25a9c6bf5c5288e1031891764da1ee2773b,2024-11-21T06:11:47.087000
|
||||
CVE-2021-35068,0,0,71c16459a6b6c19dab5496eea5e6a031592412a0f07c7a5b6e561f50009367e0,2024-11-21T06:11:47.240000
|
||||
@ -179076,10 +179076,10 @@ CVE-2021-35947,0,0,75d6c6ba2f97fdac41f682c845bac8b677dc4938465ee458771e68549043d
|
||||
CVE-2021-35948,0,0,add18e79a7cb81b0c98d9c57853456554abe807a2be4d6433b3385753f9336f9,2024-11-21T06:12:48.830000
|
||||
CVE-2021-35949,0,0,055fb855200ef353f84761d91d1637d018ee359d9928ac080645a476fe36e4c1,2024-11-21T06:12:48.983000
|
||||
CVE-2021-3595,0,0,b4f3b6995bbc9193cb541bdcd80f4b796d1dbd628b5d339c966dbdb4c3201756,2024-11-21T06:21:55.777000
|
||||
CVE-2021-35951,0,0,f224398ff1f84734c9c7098c04ce7cf476cc701c39e6d5998748534abf3e8a83,2024-11-21T06:12:49.140000
|
||||
CVE-2021-35952,0,0,dd304823557d38edf1c7c7353c6c62861c0af8d57f65116539d15e840a3311d5,2024-11-21T06:12:49.303000
|
||||
CVE-2021-35953,0,0,45d04490466ef9ae41b56cd5d66175cd534b77f540031a9938047b00ecdd747e,2024-11-21T06:12:49.457000
|
||||
CVE-2021-35954,0,0,56036363bca31fa47f9711c370de566a88f50c20521d6721bd472f70c1cf885a,2024-11-21T06:12:49.610000
|
||||
CVE-2021-35951,0,1,d7619c9d136a73e4b13709ef8de92a0a5441834905a8f6c237071e7519c557de,2025-04-14T19:15:29.943000
|
||||
CVE-2021-35952,0,1,67fe4bf24a8e14163273033a5f71df924721cf28123a664d23fb43d49d4dc18e,2025-04-14T19:15:30.100000
|
||||
CVE-2021-35953,0,1,0ad6fc52bce3ad7354a712f0aca156a393821203415d5e6ada53e2399f04ec98,2025-04-14T19:15:30.240000
|
||||
CVE-2021-35954,0,1,1cac7ee3ca8f7710d6d2012547d47b0945ac653879ee19b81194dbc772e3caf0,2025-04-14T19:15:30.383000
|
||||
CVE-2021-35955,0,0,aab5942d1d47194d4357dcdded6309f77489993e30ee2ab496f8b8871eb88dbe,2024-11-21T06:12:49.763000
|
||||
CVE-2021-35956,0,0,fd7ae3a020f2ca41c599b98cc9f41c48a305a03e1f323b7e86f4d28e3196af39,2024-11-21T06:12:49.920000
|
||||
CVE-2021-35957,0,0,6dc05f08e728611a039ab83d4e558fba38b995d5214224d23391535b7cdf9abc,2024-11-21T06:12:50.080000
|
||||
@ -181111,7 +181111,7 @@ CVE-2021-38557,0,0,86a0ead4907db0bc02ef2e69c972c92fa28e1501ae6bfb711b3a26b59cdcc
|
||||
CVE-2021-38559,0,0,f7c1f70e2ccdab56e73bab65e69b57c28c94275d13c6bebc5a61a3464ba6b22b,2024-11-21T06:17:26.577000
|
||||
CVE-2021-3856,0,0,d0d63e1ce7b8baed726afd3da72d72a900e9a7d2a934f89fbf1d0ff04421dda7,2024-11-21T06:22:39.990000
|
||||
CVE-2021-38560,0,0,7891f4412fecdcb079d0880f9c170e79b25dbca750da113fba972b58419498c2,2024-11-21T06:17:26.820000
|
||||
CVE-2021-38561,0,1,d4a25425dea8cdf319ec9778faa10a70ad2411cfaaf970d4ea292dc31abcd639,2025-04-14T17:15:24.427000
|
||||
CVE-2021-38561,0,0,d4a25425dea8cdf319ec9778faa10a70ad2411cfaaf970d4ea292dc31abcd639,2025-04-14T17:15:24.427000
|
||||
CVE-2021-38562,0,0,3bfbfef7345502cd442248b336431f5cbaf0a7d0a51c033c4023545923d0e2bf,2024-11-21T06:17:27.930000
|
||||
CVE-2021-38563,0,0,4ca878762f51207615fcc62157b2adf8217f4fc3f75abdbdfb02d94e41ccc923,2024-11-21T06:17:28.193000
|
||||
CVE-2021-38564,0,0,9b2ec749787945964d889901b576ddf5da25b50fd1e89d36f2897e34a0bf91ce,2024-11-21T06:17:28.623000
|
||||
@ -181768,7 +181768,7 @@ CVE-2021-39364,0,0,67e3d7b05b10b317c3b8362be7f96e987996166ccc30ed382d92347397409
|
||||
CVE-2021-39365,0,0,24952151f621f38c6e1eed018f7e6220dcf580313a4e380d86930be802d106cd,2024-11-21T06:19:25.517000
|
||||
CVE-2021-39367,0,0,8643c57c244e9edfef9040d664f13c42f065e47b0e08c1e34d90af035d755fe2,2024-11-21T06:19:25.713000
|
||||
CVE-2021-39368,0,0,b8d8bd442f701d8eed3be9c5bff7db6a73186411bc1e4fdcfadb1efe557ff06a,2024-11-21T06:19:25.890000
|
||||
CVE-2021-39369,0,1,85bd45bbd6050a9a503391be6cdf93d66de32185c97fe5d7cedaba22674c3f67,2025-04-14T17:15:24.687000
|
||||
CVE-2021-39369,0,0,85bd45bbd6050a9a503391be6cdf93d66de32185c97fe5d7cedaba22674c3f67,2025-04-14T17:15:24.687000
|
||||
CVE-2021-3937,0,0,b4c8f63714524c79aa2813fd50b29f8dfdb0fa0ba5c47a5ba320dac6758fdb9a,2023-11-07T03:38:25.633000
|
||||
CVE-2021-39371,0,0,fcd7918bb83fd938e55ab873efd9f6634d708f4c942321a16bb6ebfbdbcbf7e0,2024-11-21T06:19:26.250000
|
||||
CVE-2021-39373,0,0,75ed0acdd7103ad51c5c3f38072947dd34f5f0697fef6fdada0126f25646530f,2024-11-21T06:19:26.440000
|
||||
@ -184155,7 +184155,7 @@ CVE-2021-42386,0,0,896eb27fe5eb3cdb9005daac571731c8dfa4391419aa20d3b6440cc5fd482
|
||||
CVE-2021-42387,0,0,fa2f1e5a5c9be3f0784a71f1fa4092455ba7b63366bcdf8b7c839ec0a2b9f7b0,2024-11-21T06:27:42.900000
|
||||
CVE-2021-42388,0,0,91c7d7e989ab9a52e31e887e49abd3116adefc63a1f66ac6fe6154c3d0a976ae,2024-11-21T06:27:43.050000
|
||||
CVE-2021-42389,0,0,534135bf5d8177ec3d5d48e735eea0394e97eccf3388cf72af2f2e093fa86e3c,2024-11-21T06:27:43.173000
|
||||
CVE-2021-4239,0,1,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000
|
||||
CVE-2021-4239,0,0,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000
|
||||
CVE-2021-42390,0,0,b5fb057892128dd41c730434b7f3574de1040e603e1b455a9d5b61ad0aedaafd,2024-11-21T06:27:43.290000
|
||||
CVE-2021-42391,0,0,4facfe067402aa06cac1dca4b7ddd9107a3e98a96facf5b52836e8585e4e5b0e,2024-11-21T06:27:43.397000
|
||||
CVE-2021-42392,0,0,870225882c86a5e7bbf488d0533fd6b59fe011aabd02ab61e25a117152545425,2024-11-21T06:27:43.510000
|
||||
@ -184804,7 +184804,7 @@ CVE-2021-43391,0,0,e19d2ca17c4d49563c3b1f3dd0caf2057832985f1a7ac578698b6d630855b
|
||||
CVE-2021-43392,0,0,3a7f338110ad66dcd69a93e32870f4f9b3484b30f22e4422ec2860afff18fc2a,2024-11-21T06:29:08.873000
|
||||
CVE-2021-43393,0,0,43e3c29f7bdda25deb0afba825dbe2c6f15baa2a2ffe80d12819b24c459327b3,2024-11-21T06:29:09.033000
|
||||
CVE-2021-43394,0,0,a3488e7980f04df71416d96af15871c2186cf7c02b43929ef4c7f18f610e89c9,2024-11-21T06:29:09.200000
|
||||
CVE-2021-43395,0,1,cdb43097eb349c03ac2a76a5135f369071ba75bc23757c333c114e97e4c1b70e,2025-04-14T16:15:17.767000
|
||||
CVE-2021-43395,0,0,cdb43097eb349c03ac2a76a5135f369071ba75bc23757c333c114e97e4c1b70e,2025-04-14T16:15:17.767000
|
||||
CVE-2021-43396,0,0,026a037e3c361129898b225a2e44c9a256348167fe2f03d5b1f4ba3047aa13bd,2024-11-21T06:29:09.553000
|
||||
CVE-2021-43397,0,0,b0453e02666f15bd624e2e629b9080e07a1979214966ce91994017b6b8efc6a5,2024-11-21T06:29:09.743000
|
||||
CVE-2021-43398,0,0,131e49df0ef5fd3e7559128be014feca1505730f7c9858820296ba95211f7abb,2024-11-21T06:29:09.903000
|
||||
@ -185862,7 +185862,7 @@ CVE-2021-44749,0,0,63090b4d4d29f0e54f975fa554b3e76df53b30a6bec947e619c66c05b0c08
|
||||
CVE-2021-44750,0,0,01858f8828ba234a3f0e98c60ba8b68764f4bed49544c6e83ec68117bdcac7d8,2024-11-21T06:31:31.560000
|
||||
CVE-2021-44751,0,0,5d869d21bc772a9477ff8571f5a3aff5b22a99fb60a3843262a86d2681f46564,2024-11-21T06:31:31.687000
|
||||
CVE-2021-44757,0,0,13c9b0e5feb099b80c74fc5f7a5421c7b34d87ecffdc8ee744a95162024adbcb,2024-11-21T06:31:31.823000
|
||||
CVE-2021-44758,0,1,5bc2621ff38b316ce6435ef07d6aec28522a67dd2532356b1985aa002071f392,2025-04-14T16:15:18.003000
|
||||
CVE-2021-44758,0,0,5bc2621ff38b316ce6435ef07d6aec28522a67dd2532356b1985aa002071f392,2025-04-14T16:15:18.003000
|
||||
CVE-2021-44759,0,0,4e96c1f1b5b9aeeb312d2e0eb3b50092f53c2d013a04e8b1172d10797e7148a4,2024-11-21T06:31:32.140000
|
||||
CVE-2021-44760,0,0,7dbe661f918de0a20219cfbb2ac307b17a70b12b518924320c6f2cca226d0515,2024-11-21T06:31:32.307000
|
||||
CVE-2021-44768,0,0,e6a866f1b0098825afd422d6387d2b6dd5c3ed4972fb295a273648542fc41f08,2024-11-21T06:31:32.453000
|
||||
@ -185903,9 +185903,9 @@ CVE-2021-44847,0,0,7c75fd536f0dd702ca4b2429c39e4960ebcb4cd775b3efc433aba0aab1194
|
||||
CVE-2021-44848,0,0,40f10d75fb13b54a7c59c996190985aef727220c28ce796147d47d88d3324216,2024-11-21T06:31:36.300000
|
||||
CVE-2021-44850,0,0,5921fd7b544d9305818b06c941eebed0acdc28f127310dff89443db89195cf0a,2024-11-21T06:31:36.447000
|
||||
CVE-2021-44852,0,0,76ff4b7301fee5e00dc861a7617ddb7d2190aa65e91d142e10c8a3fe8af797cb,2024-11-21T06:31:36.600000
|
||||
CVE-2021-44854,0,1,ce68f61a351c7aff98641bd467f9847255a4016bc3250922fcde521d44a8261f,2025-04-14T16:15:18.187000
|
||||
CVE-2021-44855,0,1,eed73c6ea0f383c156586b5ce398cbb2f5bf8784965fba08fc5fb12524afb59d,2025-04-14T16:15:18.363000
|
||||
CVE-2021-44856,0,1,b074763c03e690bb53a6d6cae07343cfb533948e0b971723135ad1c13906dda5,2025-04-14T16:15:18.540000
|
||||
CVE-2021-44854,0,0,ce68f61a351c7aff98641bd467f9847255a4016bc3250922fcde521d44a8261f,2025-04-14T16:15:18.187000
|
||||
CVE-2021-44855,0,0,eed73c6ea0f383c156586b5ce398cbb2f5bf8784965fba08fc5fb12524afb59d,2025-04-14T16:15:18.363000
|
||||
CVE-2021-44856,0,0,b074763c03e690bb53a6d6cae07343cfb533948e0b971723135ad1c13906dda5,2025-04-14T16:15:18.540000
|
||||
CVE-2021-44857,0,0,d4114bb77a383a7c779f988bcda22081e1ac86d610806456780590c8f16d9fbc,2024-11-21T06:31:37.170000
|
||||
CVE-2021-44858,0,0,7533dd5bd3def658f30fa8a6b720fa48cb25edc517b4ae23414b22d9c518f6bc,2024-11-21T06:31:37.320000
|
||||
CVE-2021-44859,0,0,12e1bb76c1c0a322f9bc6a20d279200ae3a0e7f7231ad6efd35072456a7607ac,2024-11-21T06:31:37.470000
|
||||
@ -186165,7 +186165,7 @@ CVE-2021-45462,0,0,21ed3bb44a7015887829bd8e73bb3679757494b8a76ae7b20ed9de2313351
|
||||
CVE-2021-45463,0,0,8c3a102024f12e1909a6e784f0a5877051dab0e511f67a9870c9ce3d352e9f46,2024-11-21T06:32:15.640000
|
||||
CVE-2021-45464,0,0,e4a85c370f201a7acf7535c7d79947897dfd28f4c403a49f13bec6bdf4445532,2025-02-06T16:15:30.290000
|
||||
CVE-2021-45465,0,0,718c75837789da82b4a97b305c606fdd50b97fa839b06ef0b555d5b0f5dd0980,2024-11-21T06:32:15.943000
|
||||
CVE-2021-45466,0,1,d16e2385f3f310ade1e8068c0fb4aa2870cc43308014a04a09cbdb6e2000d2ba,2025-04-14T16:15:18.730000
|
||||
CVE-2021-45466,0,0,d16e2385f3f310ade1e8068c0fb4aa2870cc43308014a04a09cbdb6e2000d2ba,2025-04-14T16:15:18.730000
|
||||
CVE-2021-45467,0,0,2f15c29bf9a7c5863c444bcde611cda50761e0ccb036b3c9ffbc0e1f9ecd2008,2025-04-12T01:15:14.540000
|
||||
CVE-2021-45468,0,0,d4fb444d40be59fa41dcf127fe0fd160d32ecc7b527d9085dc1639d09760bed6,2024-11-21T06:32:16.340000
|
||||
CVE-2021-45469,0,0,56bbd3b386fef0790e24dcf528dc9b203090f7af7d6a4e38e145a872520a4ab1,2024-11-21T06:32:16.480000
|
||||
@ -195332,7 +195332,7 @@ CVE-2022-25940,0,0,89d1dff1f90916ce131570b4b5cdf8e81dc97dd0103927cd58c3d672283a4
|
||||
CVE-2022-25942,0,0,cb3b2c3dfb5658f25c8b9ca0a06083841a2864af0d45831ceead0b51213c9973,2024-11-21T06:53:15.013000
|
||||
CVE-2022-25943,0,0,0040a8dff1ea8dfd4d5dea14ff3886f870c4c7d36cbf552e0ee9aa10ebf719a9,2024-11-21T06:53:15.130000
|
||||
CVE-2022-25946,0,0,fc9fdc45b9de3a165555f685236a44f6dd1e52275e27a3ebced376d3a6600650,2024-11-21T06:53:15.250000
|
||||
CVE-2022-25948,0,0,e44646276bc2254eaf9b74a183e01f4762a5a23c2d9cad739e8c4ffcc5078c04,2024-11-21T06:53:15.380000
|
||||
CVE-2022-25948,0,1,e625147f35f8f6edbe3f46d796f044c2b5fa4c189d10550e7af5b62ae1d64728,2025-04-14T18:15:19.417000
|
||||
CVE-2022-25949,0,0,2001943b2b1c6352e9a03cc08e4e5963e4dd9f79fb1faa305ca8778bd6c12a65,2024-11-21T06:53:15.520000
|
||||
CVE-2022-2595,0,0,725672f75c57a672951edde7f3b22d63696186824274a54323dc1fac98bba4bd,2024-11-21T07:01:19.117000
|
||||
CVE-2022-25952,0,0,a33b531dda2c451ecde31edd5630f25acc0e1ecf4cf3953e2df5b471fa29bdb7,2024-11-21T06:53:15.640000
|
||||
@ -196159,7 +196159,7 @@ CVE-2022-26954,0,0,4c196cb57e7d0a2abd8aa7becffa707fc632bffdbb00f1068fa8a858942bd
|
||||
CVE-2022-26959,0,0,7198e1eccc3a7f54104174553cb81261c588ae7b9a4c4e2dc8d3093e0f9bc27c,2024-11-21T06:54:52.263000
|
||||
CVE-2022-2696,0,0,443bc6658642a5c83f863396fa42455e76b932acd84d8596b8a3e5854e8e2352,2024-11-21T07:01:32.157000
|
||||
CVE-2022-26960,0,0,82af392c14e755fc6650f106716b99abfafb2854fcbcdd1a747232d37b3c9b94,2024-11-21T06:54:52.407000
|
||||
CVE-2022-26964,0,1,ca931a9048d352c1190615575bd25b4163f0c9dadc161d55e88aff1f3ec669fa,2025-04-14T16:15:18.930000
|
||||
CVE-2022-26964,0,0,ca931a9048d352c1190615575bd25b4163f0c9dadc161d55e88aff1f3ec669fa,2025-04-14T16:15:18.930000
|
||||
CVE-2022-26965,0,0,0eee63ccef10e99830b56d975e0cd966832e99566aa6c895dd1d84e6b78dc070,2024-11-21T06:54:52.667000
|
||||
CVE-2022-26966,0,0,606492474a263c3f06e4b3cc934e12be505b96f19699b5edf65a5f479817a11b,2024-11-21T06:54:52.797000
|
||||
CVE-2022-26967,0,0,43ac7ea8a944baecd7e718ef11590bbe5759186b24182b91fc646c42e07104bf,2024-11-21T06:54:52.947000
|
||||
@ -198473,8 +198473,8 @@ CVE-2022-29849,0,0,00f6dfa0c3de15f8f3231eedbc527cd283146d7763bba3243bab5651928db
|
||||
CVE-2022-2985,0,0,1e3991814fbe70123fa57591ee000cc5dad4de7ee74c490d823af3b6350a96e9,2024-11-21T07:02:02.077000
|
||||
CVE-2022-29850,0,0,0da74970b29fdfc09c63aca41d7c8b65ab778e0810fb54d72e428baef7d8f2ee,2024-11-21T06:59:49
|
||||
CVE-2022-29851,0,0,aab0186a8d9baeec93bb76aea801c53d449393295b1554c80fda73c2363c44f1,2024-11-21T06:59:49.280000
|
||||
CVE-2022-29852,0,0,2b9a2fd524c61535f666c6f2d273ab86eddd74d0b704522ce159d8632c4a5e10,2024-11-21T06:59:49.423000
|
||||
CVE-2022-29853,0,0,c92c9d3df0197f8219f338a88b926bfc7eea1a343109b36a03715066fd941103,2024-11-21T06:59:49.597000
|
||||
CVE-2022-29852,0,1,18152f3b1f202dd0e3969dffd029cbc8ccad94029856ab86305651cff5923de0,2025-04-14T19:15:30.747000
|
||||
CVE-2022-29853,0,1,5a9a6721309a554679077e8b29c4668e12c5818c29ee8a5cee09403ad08b23aa,2025-04-14T19:15:30.913000
|
||||
CVE-2022-29854,0,0,593e2bad2ff6a85ef2ee714ef37612f2fb3fc3fb035337bf041a2fb32d7908b8,2024-11-21T06:59:49.750000
|
||||
CVE-2022-29855,0,0,1f14dce5a82f12ebc748922f14459037fdce04b11ceefb0a1569732099207df4,2024-11-21T06:59:49.933000
|
||||
CVE-2022-29856,0,0,e4a98814814382a2021f18b884859d1ae0b8c2b37f601c6a2964d9e7eb9b56e1,2024-11-21T06:59:50.130000
|
||||
@ -199112,7 +199112,7 @@ CVE-2022-30636,0,0,95efb77032b52080059c1760afad687bc9d1c26f1a660a9ffade99573af5f
|
||||
CVE-2022-30637,0,0,5b555402bf9d716a425b893810cf62861a5d09855d526f86ae57d7542d596f86,2024-11-21T07:03:04.777000
|
||||
CVE-2022-30638,0,0,1241211fd243747137b76dfe708991bf269232f3fffdb277cf8ca4a17d8b16e6,2024-11-21T07:03:04.893000
|
||||
CVE-2022-30639,0,0,223b95d901e69adec305badc96baa9121be35294b1cd4cfd33b9723e7177e775,2024-11-21T07:03:05.003000
|
||||
CVE-2022-3064,0,1,a6ef9c6bfae4d332a289b4bdddaf333b1cefb03ede311e41e4a06d7e52313461,2025-04-14T17:15:25.407000
|
||||
CVE-2022-3064,0,0,a6ef9c6bfae4d332a289b4bdddaf333b1cefb03ede311e41e4a06d7e52313461,2025-04-14T17:15:25.407000
|
||||
CVE-2022-30640,0,0,a1f3e1fd19fe31e598d605f468d0ce9abc0de1d1b874860179bcac51fde537a1,2024-11-21T07:03:05.110000
|
||||
CVE-2022-30641,0,0,4e8bb741283928e81733d6564bda1a2be287a3e7fb8999adf5bd944a605759ff,2024-11-21T07:03:05.220000
|
||||
CVE-2022-30642,0,0,29279bc26d749f9b6f745f9a9f6377140ab35b3aea99020edb7fceed94e4e24a,2024-11-21T07:03:05.333000
|
||||
@ -201459,8 +201459,8 @@ CVE-2022-3341,0,0,8b7f9d51a7c8e27555a9e1820dec79396da4e5045f1bd113de7eea34663a09
|
||||
CVE-2022-3342,0,0,6af9bb7fff5a44d311a195e4c8ab1ced801e074dcdba3c126856f176e1a38eb8,2024-11-21T07:19:20.087000
|
||||
CVE-2022-3343,0,0,f9c25da651270d2b842bda8cea394836f31a2df4b342adf77e2dbd0330830065,2025-04-09T20:15:21.827000
|
||||
CVE-2022-3344,0,0,fa8bc78ec543a940b711eaf64472386a0dae2fb0ddadc01f14718e0de068a088,2024-11-21T07:19:20.367000
|
||||
CVE-2022-3346,0,1,42af9b65f3c3417e174336bcd6791e49334ba7c638e5fb2e924e0e4fdf9df20b,2025-04-14T17:15:25.600000
|
||||
CVE-2022-3347,0,0,2d94bcba288fa449c48ee99ffc637fd68e9f8ee58aa14a53e9bca2f5e42901d3,2024-11-21T07:19:20.620000
|
||||
CVE-2022-3346,0,0,42af9b65f3c3417e174336bcd6791e49334ba7c638e5fb2e924e0e4fdf9df20b,2025-04-14T17:15:25.600000
|
||||
CVE-2022-3347,0,1,399fda8283fe596b5fb4ecb8116512c08fa17360e60ce42d7ab4f6f79a30b034,2025-04-14T18:15:19.670000
|
||||
CVE-2022-3348,0,0,11ef3f0a95e9fc1a39dcfc027c238014ca2616e695b81d0b0a14d89d9cd1aba7,2024-11-21T07:19:20.747000
|
||||
CVE-2022-3349,0,0,bdbb7bd46c6ae2bae7550a2f692287398edfd5d23bc40d996f96116ca84552b1,2024-11-21T07:19:20.877000
|
||||
CVE-2022-3350,0,0,4bbb11f8182844e22c4ca4bee32731e6dc6707821937f5618470a1d38e8296b0,2024-11-21T07:19:21.013000
|
||||
@ -204768,7 +204768,7 @@ CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6
|
||||
CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000
|
||||
CVE-2022-37704,0,0,689df3140e86238bf4f6ce643be66f5fc522da4b2ed6dc5314b9fabfddd2c427,2025-02-06T18:15:29.863000
|
||||
CVE-2022-37705,0,0,acd16612787f02d3f718d6d198087d88cd907ba03869599bcfc17e8b377ea3e0,2024-11-21T07:15:05.343000
|
||||
CVE-2022-37706,0,0,fc078f45bb273fd3707bb7ddee90095b1068d19a6102858911d8dd8ad25410dc,2024-11-21T07:15:05.530000
|
||||
CVE-2022-37706,0,1,d592a829ed1e324c4bc82bd430904c0885a4bcf8373ea142817018c0c8777487,2025-04-14T19:15:31.087000
|
||||
CVE-2022-37708,0,0,8666c4b20e83578726c025b6fad489dc2c7e927d0fa6b0e109a75e90ff1e9cb6,2023-11-07T03:49:53.170000
|
||||
CVE-2022-37709,0,0,bd07b7a106158b445c731138356787ec7395a0e7ef7964717ed393dfca25b498,2024-11-21T07:15:05.707000
|
||||
CVE-2022-3771,0,0,ba326bd1f36e073e67146dfec0d9eefd72c500cc85afe5bfa5817bc956b2a546,2024-11-21T07:20:12.953000
|
||||
@ -206447,7 +206447,7 @@ CVE-2022-40000,0,0,38b491c54c49cb20ebe6b1704d375396eadd8ca738e1481f9dfaf5ace00d9
|
||||
CVE-2022-40001,0,0,f3df2c33907bae2afff1110669b71a2744b5c637e24d0ad5226f23d78ee4fcc4,2024-11-21T07:20:42.790000
|
||||
CVE-2022-40002,0,0,4d468c201a73e83ff69c06ec796f889b0f9eb096678bfb74cd3b5f7ffa4df406,2024-11-21T07:20:42.933000
|
||||
CVE-2022-40004,0,0,d951c442a8c6b12bd2f7a25c23242917cece4b1486418ed4bac1b9ba70ac4dc5,2024-11-21T07:20:43.090000
|
||||
CVE-2022-40005,0,0,f024534d76c9227a8e4a080e826ce8c16d9f0b3dd0af3bdba08bbf4efc137a79,2024-11-21T07:20:43.237000
|
||||
CVE-2022-40005,0,1,e928ba9cc22f3465f0f12a42100843b16ac4fcc3bf0e12cd208ff95734ec24a0,2025-04-14T19:15:31.250000
|
||||
CVE-2022-40008,0,0,840b1eb1174364e3fbac1db8e4ab3ea73e710cde64889af409ac0b9babe28b2e,2024-11-21T07:20:43.390000
|
||||
CVE-2022-40009,0,0,26c0350798515d24962c84f26b250922fe5a90143ac50486e2d208571371ae83,2024-11-21T07:20:43.537000
|
||||
CVE-2022-4001,0,0,d7f6245e94dded50b0995e17b6b8e668e8e44274195283ce0fca6baeade2f570,2024-08-01T12:42:36.933000
|
||||
@ -207201,7 +207201,7 @@ CVE-2022-40966,0,0,001452988ba0cd148be9c0cba8d00bf74422be6c9ce151e53c840d899d6fa
|
||||
CVE-2022-40967,0,0,0f578d6237ac53b6a084ce651dc1bfe803ae7e50b602da3098d1d79a7deb4db5,2024-11-21T07:22:19.503000
|
||||
CVE-2022-40968,0,0,55235690bb4de34ee7e5069b01afa5d7090f3ec510269b3248e75fd467d162b6,2024-11-21T07:22:19.640000
|
||||
CVE-2022-40969,0,0,242cffd20c6a874698c337ec3d037769afe4a0561a1f97fc4a0a366ac29a1dcd,2024-11-21T07:22:19.770000
|
||||
CVE-2022-4097,0,0,2f481efa3555109f90a7168bc9b7fe324bfe32aab556ff7fbb62887ef574dbce,2024-11-21T07:34:34.627000
|
||||
CVE-2022-4097,0,1,2647c6e4a0e53f4008d7513f4f12600ef266e3f80f5bb9f5a6709df0d335c646,2025-04-14T19:15:33.620000
|
||||
CVE-2022-40971,0,0,b4a739c06370f9a28332256f5c3721829f7c1b7bdf43de1b48f050237bd0320c,2024-11-21T07:22:19.910000
|
||||
CVE-2022-40972,0,0,fdc5dd9eaefd430014de77f557808394ef9fbbea7434c7739c5fa90580f6f40d,2024-11-21T07:22:20.060000
|
||||
CVE-2022-40974,0,0,aa814a10680fcb9adfe6d57594dd41ed7b8b2742c015fd6b2288230ade8c1d6b,2024-11-21T07:22:20.190000
|
||||
@ -207276,7 +207276,7 @@ CVE-2022-41036,0,0,c64f07b9b85a8e2d1ebdc0796825f7afa1fba903722ade590e5eb177a9261
|
||||
CVE-2022-41037,0,0,a5207e410031b473199d76f446ea7aff35e792754946afac9d20e1b0f82936e2,2025-01-02T22:15:19.430000
|
||||
CVE-2022-41038,0,0,5139f0eceb1c1c9e3c7156a1f72ea48e3023a913c5b772fa68fa0237089dc6cc,2025-01-02T22:15:19.540000
|
||||
CVE-2022-41039,0,0,d301a8df2867f370f24c22b4f7dcb22e58d455c45934b727d390db5faf7449a6,2024-11-21T07:22:30.020000
|
||||
CVE-2022-4104,0,0,c3f870f41b7e05a558f4ff2f68c6ab2edadddcec1c1e03e5ab7274cded1720e9,2024-11-21T07:34:35.460000
|
||||
CVE-2022-4104,0,1,8d89fcbbb08ca00ae0ea1a564e957d602071c3e734f7a268f56440e439678795,2025-04-14T18:15:23.520000
|
||||
CVE-2022-41040,0,0,4b5b7b0b238c7e71fd1f3535fad15fd1f387a8ab733a684cc64981d5eafcc803,2025-02-24T15:48:30.437000
|
||||
CVE-2022-41042,0,0,8ed51dc60d4bf92596b08ebe51d7e2bf87951e8e15107f41266aba185b392fbb,2025-01-02T22:15:19.810000
|
||||
CVE-2022-41043,0,0,47dd01e700c1c2263498dc011e32ab62a1d287f7f2170cff13f42ba9c4f6612b,2025-01-02T22:15:19.913000
|
||||
@ -207295,21 +207295,21 @@ CVE-2022-41055,0,0,75db852e487eca25f535fc690c252ff188eb67b9629e73bfea7867ccf031e
|
||||
CVE-2022-41056,0,0,760c2b0e1e24e1c29e670e56d8f4db957062329b269a25c2b3571199c09c862d,2024-11-21T07:22:32.130000
|
||||
CVE-2022-41057,0,0,054a066a43f21eb7579caca9716f978bff58e872c2e7e8266dcb30731418e291,2024-11-21T07:22:32.283000
|
||||
CVE-2022-41058,0,0,73bd8928a378a002e757ca9a21edbcba22869395aac190290f089c70476e64d1,2024-11-21T07:22:32.440000
|
||||
CVE-2022-4106,0,0,dbe89ded2e546ade2fab7f13d467837b61db8343d9487b3106680714fdc7d41f,2024-11-21T07:34:35.663000
|
||||
CVE-2022-4106,0,1,8e4c47dffc61266b44b273cde1b1970a05d63183688c62b2ce7a5078d67385bd,2025-04-14T19:15:33.830000
|
||||
CVE-2022-41060,0,0,cdfe90ef6c059d82f36589ebe1bcd3fda18c5b72a6a4a8ec4c313385323ea20c,2024-11-21T07:22:32.610000
|
||||
CVE-2022-41061,0,0,d3ff4c2849254bbeb8056d1bf31e5a4c1e784a9fe077a5b69acc592e50ab2223,2025-02-28T21:15:18.520000
|
||||
CVE-2022-41062,0,0,9e11a0a3323dce9ed7289ce4b7e0867252529ed4d0e920b693872fcbfdc285e5,2024-11-21T07:22:32.880000
|
||||
CVE-2022-41063,0,0,9435a8e4ef0bd0f50fc908a2dbba3cf01fddc74e86e7c27bcbf629ae50f6c71e,2024-11-21T07:22:33.017000
|
||||
CVE-2022-41064,0,0,f04f6f08373dc8a60423f3ffa6286de803341a47388fd1b659533c8de9b8a34d,2025-01-02T22:15:22.180000
|
||||
CVE-2022-41066,0,0,ce1a2b1b5b482b1b2b3c54fda71cd53caf8a12b892d2129ed715010d9e9f4ebd,2024-11-21T07:22:33.333000
|
||||
CVE-2022-4107,0,0,c246852a852714826df52737e54f6a60efe1fcbe46137aab522cc8208332341d,2024-11-21T07:34:35.760000
|
||||
CVE-2022-4107,0,1,568f39c98e13a2a891183487d0865091291e898c9ab9dcb9a52ece889c4f0826,2025-04-14T19:15:33.983000
|
||||
CVE-2022-41073,0,0,86d544485dc20b678df660469cc86079a82e7647799329ecdb20666220df6661,2025-02-24T15:48:06.973000
|
||||
CVE-2022-41074,0,0,5acedadf8aae837bcd545bf7b350b491a313ea4094c95e5c67cf49e8835a3aa4,2024-11-21T07:22:33.643000
|
||||
CVE-2022-41076,0,0,78f083f1c56486769c87d0b1bd55077536e9e81ee66ff16a6d0643fe9a1b0c6b,2025-01-02T22:15:22.733000
|
||||
CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f6b5,2024-11-21T07:22:33.977000
|
||||
CVE-2022-41078,0,0,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000
|
||||
CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000
|
||||
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
|
||||
CVE-2022-4108,0,1,0392cb99d33c6aa2a6614ab3beb369d1016ff79b770dd0b74be352421e4f8a58,2025-04-14T19:15:34.140000
|
||||
CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
|
||||
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
|
||||
CVE-2022-41082,0,0,a9eaf313d3682898537fc7e45e9426115a571c7dc88c6cfcfe8f47b1be37cecc,2025-04-03T20:53:33.510000
|
||||
@ -207464,7 +207464,7 @@ CVE-2022-41236,0,0,38d9746bed7e93f950be8e5296275749e001dbbc03c643ac46856b89963d9
|
||||
CVE-2022-41237,0,0,d193c6ce051cf3dcddbdc4dbdafebf458b72ef3361c3424922473f89c6dab7d7,2024-11-21T07:22:53.510000
|
||||
CVE-2022-41238,0,0,5e4072cd48653a369392a933dac83ea4af88ccdc620ea50c471582aecf10543a,2024-11-21T07:22:53.633000
|
||||
CVE-2022-41239,0,0,084448d492e9f1691068aed2fe921472d75d7be09b268175164104a9d0d944af,2024-11-21T07:22:53.747000
|
||||
CVE-2022-4124,0,0,1b7d2884dedc6996a4f77c8d28705ae3763fc552191b70a405b40dedcdec34ff,2024-11-21T07:34:37.430000
|
||||
CVE-2022-4124,0,1,e7ab9bc24ab771e3630930db4fc09e7dea31b73bba00177ab5d08ba39dbc0de6,2025-04-14T19:15:34.280000
|
||||
CVE-2022-41240,0,0,1b3673ce0bbf5723ea13d36a3e9d3efb47c5405a583539e5382c2906030b35b4,2024-11-21T07:22:53.863000
|
||||
CVE-2022-41241,0,0,59795bec470f8bde571787bcc20bdd6e1f2b8901a17f088af2963d51c0da614b,2024-11-21T07:22:53.977000
|
||||
CVE-2022-41242,0,0,f8f02a44d76b55878d247ed8acf806ff02880b3b1c68c6b63e986e81a2d53a7d,2024-11-21T07:22:54.090000
|
||||
@ -207493,7 +207493,7 @@ CVE-2022-41264,0,0,891adf340323623f0abbe985ae9cee1af3c286a239cce6e5d6879977ecb12
|
||||
CVE-2022-41266,0,0,fbb6118ac0cadec6e8cfa2bf1a753628b56d86104cf336bbb467f9b2dec1b796,2024-11-21T07:22:56.740000
|
||||
CVE-2022-41267,0,0,6b0b43be4375c0101f53f6828530ea2410934145ce60641a22307de0a4e92b9f,2024-11-21T07:22:56.897000
|
||||
CVE-2022-41268,0,0,2866988d39f0ed9d1413f4d9c58ef831697d081c69beeac4aa2cc289041e429c,2024-11-21T07:22:57.050000
|
||||
CVE-2022-4127,0,0,ca366fece51ecb6884be01ecec8c35d304ae21d90503339c3cbcb4bb86aea359,2024-11-21T07:34:37.770000
|
||||
CVE-2022-4127,0,1,5e43929aa6497f3fa88b911eb78c89353f9388f061568ce18a0f77587d303c23,2025-04-14T18:15:24.170000
|
||||
CVE-2022-41271,0,0,e9c99016c2c540f31040e2265bc82b49e2ef289cdd0c0d0af05e684ecee4cb43,2024-11-21T07:22:57.213000
|
||||
CVE-2022-41272,0,0,82f39d2cd93b474348b59cc15e10e0b3666cd4025d8bd134f3968d6a4abc44b3,2024-11-21T07:22:57.363000
|
||||
CVE-2022-41273,0,0,71d4f43c4d8a7f57978231a59fa5adca6a6618734e60991f37cc183b265363ac,2024-11-21T07:22:57.510000
|
||||
@ -207501,7 +207501,7 @@ CVE-2022-41274,0,0,af436b20fca94f8b760fa9b7eee395c98917ed93d45bef5f9ab4a31bf81d8
|
||||
CVE-2022-41275,0,0,ff4fceb84e1887a91657f550077343488a1de582d9a97a8b2e12d56e6ee90375,2024-11-21T07:22:57.793000
|
||||
CVE-2022-41278,0,0,2b2c19e2ff7a3ed4052e392266101c0faa6d2056411fab379b449fde67e1f631,2024-11-21T07:22:57.933000
|
||||
CVE-2022-41279,0,0,9a24968e11881a2c66ce99a266d99a561d191394857f9e03fc73079c0147f49f,2024-11-21T07:22:58.073000
|
||||
CVE-2022-4128,0,0,6ec655653ef05f07ac806550760873411bd7fd30aa84845ea0ea67a53bdaa168,2024-11-21T07:34:37.880000
|
||||
CVE-2022-4128,0,1,9c2f5b99069a9e59d5bb118a8cfa7cc2f178a644bd868689b3196ca317c19d84,2025-04-14T18:15:24.343000
|
||||
CVE-2022-41280,0,0,3a059c83c1410f9d71d0d689d86c4889ddda928445e6f38c9fae89fe86d15063,2024-11-21T07:22:58.197000
|
||||
CVE-2022-41281,0,0,e84e6252a6c352d80b00ba9eefe4e798deb46ab8008003688196786dbe2ccaaf,2024-11-21T07:22:58.320000
|
||||
CVE-2022-41282,0,0,c563504849e025211b68f72f3701f4be97a1e3a2b4cbbdc059bdb9a910383e60,2024-11-21T07:22:58.443000
|
||||
@ -207511,14 +207511,14 @@ CVE-2022-41285,0,0,33da0a8c302590f4bb742de55c0698792c317706fda68aa8a138908760b10
|
||||
CVE-2022-41286,0,0,01c5c1292da1c21ab49c14ad5f59f3becfb39eaec16a1919960f7dcec90e206f,2024-11-21T07:22:58.970000
|
||||
CVE-2022-41287,0,0,f5ff36e466cee6502e0b542c5e82c8b2e0b5f95198d95de94913487f45e72084,2024-11-21T07:22:59.087000
|
||||
CVE-2022-41288,0,0,f675d3f9cc4126dc1f7fa4ed37595154499cf1a70d7d308476ef414f71697420,2024-11-21T07:22:59.223000
|
||||
CVE-2022-4129,0,0,08fc3505318cc958f5a7658a7d2da1be37c8ea2675ee73a671c32b24e3e15419,2024-11-21T07:34:37.987000
|
||||
CVE-2022-4129,0,1,1fb12e80137aaaee164de6e15eca03247bd6685ef3becbb5a5880d93eeba9908,2025-04-14T18:15:24.593000
|
||||
CVE-2022-41290,0,0,df48df2d62d5be8a2aeb9f306d35831bc3f344ec64b417582b5c958a17f0f4fa,2024-11-21T07:22:59.370000
|
||||
CVE-2022-41291,0,0,6f77676b8fc10f6a6a5469f6a40dca41b07c22ddf12e7fd938242bbf04d21383,2024-11-21T07:22:59.500000
|
||||
CVE-2022-41294,0,0,68ec83e32f33aadb23f57d4445acf510a076bc3a805c2dad39d55578505f6cfd,2024-11-21T07:22:59.620000
|
||||
CVE-2022-41296,0,0,9ef8e6b51a856e94bf3ca1d904ce2d97717061d41cca2dacf1d10232b3f345f6,2024-11-21T07:22:59.737000
|
||||
CVE-2022-41297,0,0,dbe5c3c91ccbcb0cf54bbcdb6f4ef65743a3cddb583c546cee4cda0a746113ff,2024-11-21T07:22:59.863000
|
||||
CVE-2022-41299,0,0,f2704f729d67be90840586877cb761b270c8976fee7bb58d0225ceaa8d859573,2024-11-21T07:22:59.987000
|
||||
CVE-2022-4130,0,0,af72edec867764b0f5b55fff1295343d9b140b27148af3256b4d888699ee8eb8,2024-11-21T07:34:38.103000
|
||||
CVE-2022-4130,0,1,d702997db35b8dad847e91e9076fff705bd314644e59f5db17f6977984f77cf9,2025-04-14T19:15:34.423000
|
||||
CVE-2022-41301,0,0,feae79258f03cbfb6a1ccbe309ae36cb1dc8415a3ad3ead4df09be67c140b5c7,2024-11-21T07:23:00.113000
|
||||
CVE-2022-41302,0,0,0fd5013f9788c5f12cd92c40815c1e93f52f1dd0098fcf792f96496cbddd854b,2024-11-21T07:23:00.227000
|
||||
CVE-2022-41303,0,0,8c0a7367d7a9e4590ecee3a2cdcc1e64e1dd3e75436d3760899437420178a465,2024-11-21T07:23:00.340000
|
||||
@ -207536,8 +207536,8 @@ CVE-2022-41313,0,0,2e9ada08e7e4888af934cc8ca0b3f2d42d44ea23de78b0cf6962c89b49985
|
||||
CVE-2022-41314,0,0,c3c5a5dd348767ab304f7f0a715e27c944bd177dd52ca8bdc7a33d3a225ce59b,2024-11-21T07:23:01.657000
|
||||
CVE-2022-41315,0,0,6ee5c04baca5a9018b34f1487eb4fef392adc2d1af6e7e31345947bd552e1a7e,2024-11-21T07:23:01.790000
|
||||
CVE-2022-41316,0,0,e1bfdeee8cf4f191a1372a4f0ca6dee1dcbb8311d45e92bdb0d22445aadda372,2024-11-21T07:23:01.917000
|
||||
CVE-2022-41317,0,0,af95afcfdfed4a054dc95ef67e4c9816b73a84c76a87ab24147d85b83b810938,2024-11-21T07:23:02.073000
|
||||
CVE-2022-41318,0,0,f2fd0504fb629f84378cf2f53a7ba834cf232a7bb6072da8aa60e4fe9ad50922,2024-11-21T07:23:02.240000
|
||||
CVE-2022-41317,0,1,bbbda49839543be05b502daebfb69e215adc360c4d33eb2043615cc145dcede6,2025-04-14T19:15:31.413000
|
||||
CVE-2022-41318,0,1,cbc37096676d11aadf4f3531cfbb0447396cfbfc04cbe48ad55be3c3dfd01b6e,2025-04-14T19:15:31.607000
|
||||
CVE-2022-41319,0,0,718afde32516feb95d03961a913941edea0a5c2557073af6c76be7fe2d07a11b,2024-11-21T07:23:02.423000
|
||||
CVE-2022-4132,0,0,6432e890975566b88f44c3b2c67f53eb061c68f238691ca2dd9427338e8bea39,2024-11-21T07:34:38.330000
|
||||
CVE-2022-41320,0,0,49c93050bf0212d1f7f33058fef7d3d11435ba12e66b0d7791b1f8dc093cd1dc,2024-11-21T07:23:02.583000
|
||||
@ -207632,7 +207632,7 @@ CVE-2022-41435,0,0,2e9d3745efae09ff8a19f34a5db6982483010a3d6156877ebd951fdbaa260
|
||||
CVE-2022-41436,0,0,67ae6f6430b4ce10d4150b3580b357aa507b8df48bc66ee37216cfdb1ef5eb80,2024-11-21T07:23:13.777000
|
||||
CVE-2022-41437,0,0,61cb62dc4e6bdcf1d9ad3a51fcdf3c0f4570219fc5c275ee9742690f0387b87d,2024-11-21T07:23:13.917000
|
||||
CVE-2022-41439,0,0,4837757799bdc6b0b965b33af5e10557219570b80eb847c87c8582af314adcc1,2024-11-21T07:23:14.070000
|
||||
CVE-2022-4144,0,0,50b143e47e51d9710e84c08d0915f55b544c5a5f6f16736e3c707a6f753118b1,2024-11-21T07:34:39.677000
|
||||
CVE-2022-4144,0,1,ac7067f14b33820a74b8e5d8cd9648ff57632ab43cc554347ea5e04632dda313,2025-04-14T18:15:24.910000
|
||||
CVE-2022-41440,0,0,cee72c176493d29518bf2de01c5954acd549e724b8eb84674f2c248429c04676,2024-11-21T07:23:14.213000
|
||||
CVE-2022-41441,0,0,3f13d2719e0968b3b58d7f18d786c2424a57c6cd0b6b17bf50218f85b4097cf5,2025-04-02T16:15:21.850000
|
||||
CVE-2022-41442,0,0,8192a87556ee552bb31733cd5f81a551cebaf8cc93663b074bb119bcc068ca2b,2024-11-21T07:23:14.497000
|
||||
@ -207642,7 +207642,7 @@ CVE-2022-41445,0,0,65462f8a5ca6d0f823c5684befd57d9083943669048bb5925f12c7d69adb6
|
||||
CVE-2022-41446,0,0,801306aea3e7352294517b8a18c77a2a2871d2e640588f6e91af2597b58b334b,2024-11-21T07:23:15.057000
|
||||
CVE-2022-4145,0,0,85487731495697b5df0d8bec285c12801c5647eeecec4bdc60b6ead7f9e57f04,2024-11-21T07:34:39.800000
|
||||
CVE-2022-4146,0,0,c964c4884d0b051e0403c43f91510cd3777662eb62bcf4ee8d32007ed9b8bc91,2024-11-21T07:34:39.937000
|
||||
CVE-2022-4147,0,0,6a90c873082bf75901d70afbff1b6cccb0148b92de030b78f23390153e371bce,2024-11-21T07:34:40.077000
|
||||
CVE-2022-4147,0,1,32303f9d6fbe276d931c5ae4001e5ae486747041c418ceaa6cdd65c8f4756485,2025-04-14T18:15:25.110000
|
||||
CVE-2022-41471,0,0,bccc169da31b239a5aa83ed1535b5490427db02bfef68832f15f7f96491bc4b2,2024-11-21T07:23:15.200000
|
||||
CVE-2022-41472,0,0,39bb222e9fa6bcc3344da357bdf507e061f2a9f9c6953cedaafe46d430bd2fff,2024-11-21T07:23:15.353000
|
||||
CVE-2022-41473,0,0,ea576a3fbae821bbddb72a6931b16df854293064040c692016e15a9b7886785d,2024-11-21T07:23:15.503000
|
||||
@ -207667,7 +207667,7 @@ CVE-2022-4150,0,0,4eef61567c3e1d11c980317b0d24ac0f18777612effe2bbca5eb7a08ae00fc
|
||||
CVE-2022-41500,0,0,c7c0a66df087569a12a1d3bf5b070eb7d392aa0303087eeed73329bf4cef8c99,2024-11-21T07:23:17.833000
|
||||
CVE-2022-41504,0,0,be1a7964766e092f900a6024f75f2bfebb1427114608906936ca26de5472f422,2024-11-21T07:23:17.983000
|
||||
CVE-2022-41505,0,0,c28393a8a93cde75b36efb4061081209b287246162995a989991f59ab44480ef,2025-04-03T15:15:42.463000
|
||||
CVE-2022-4151,0,0,8c0c8f2f79a015e2e2c7379a3566b843a1b25cb22c4bdc1b8b3d8f689ecfdf44,2024-11-21T07:34:40.593000
|
||||
CVE-2022-4151,0,1,314b1afa2c43c764df6e3b2cc93a4dac41a5bd52d1d3210b99de2a813cd26778,2025-04-14T19:15:34.577000
|
||||
CVE-2022-41512,0,0,b83994ad742f78a085524296b7a2c76fc3b658b39aec2acbda011573a8e5298d,2024-11-21T07:23:18.303000
|
||||
CVE-2022-41513,0,0,13c6facb1d1cd10daa424b52aa4b89f8f8167175b388cb04ecc9e8290751c31e,2024-11-21T07:23:18.443000
|
||||
CVE-2022-41514,0,0,3b0ef7067dc943ee4ad676295886d4b7fc63f333bc6524d0075d110fbd563032,2024-11-21T07:23:18.600000
|
||||
@ -207850,7 +207850,7 @@ CVE-2022-41696,0,0,a1a6d2ee4fbb97337cbb387c686fcacc34d58529af447390dd826bcac9d93
|
||||
CVE-2022-41697,0,0,f00b141234f72886b17f4c01f4b33545cf7804193e1c401581c723d7666b2f9f,2024-11-21T07:23:40.287000
|
||||
CVE-2022-41698,0,0,702b3b5691f0e4832af2d18d9487073faa8cda8765d70b6d1fabe5bbc59a6e66,2024-11-21T07:23:40.407000
|
||||
CVE-2022-41699,0,0,506f1b14eef7ebb06f69aacc950ebc30837a9c960b333b7d62da43f205c68a11,2024-11-21T07:23:40.563000
|
||||
CVE-2022-4170,0,0,816eec116891e66964dc94502f0f5e88afab37fd616612915a3f0f9bb574d7a7,2024-11-21T07:34:42.607000
|
||||
CVE-2022-4170,0,1,8ef4a561406cb9c55dd644a3b3b1c2387f030fbb80ab06539caaf1a8830815e6,2025-04-14T18:15:25.293000
|
||||
CVE-2022-41700,0,0,14fbb20baf56ab7e5d8bffc25ccba85f7cc3189c1d6db846f619923c059104aa,2024-11-21T07:23:40.703000
|
||||
CVE-2022-41701,0,0,96c8e7625e93b9653fa380f9e189568911dc3dab68f955c37e452fa0c2c20450,2024-11-21T07:23:40.857000
|
||||
CVE-2022-41702,0,0,803fc245761cdc24984dda48783f0aac5005c564fcfbbe63f051c26f5e294420,2024-11-21T07:23:40.983000
|
||||
@ -207872,7 +207872,7 @@ CVE-2022-41716,0,0,4aeff2ea5cd63163b210965f724186a2391adaf7003f82a6d81f56dbd66fc
|
||||
CVE-2022-41717,0,0,941572206b0f8b585911e69459de25cb79196c2156fbd8befd1bb331b9ede72f,2024-11-21T07:23:43.713000
|
||||
CVE-2022-41718,0,0,ede4edf1910fc09ee7773999b62e824282ceda5088eab3fd9bae27fdceb8b0f5,2024-07-02T17:15:04.360000
|
||||
CVE-2022-41719,0,0,cccf3bdb9fa07a25ad1c0144570bbfa54d917fc962c47342552336a993c12547,2024-11-21T07:23:43.917000
|
||||
CVE-2022-4172,0,0,2cb47956b89e299f1df10599ce8475055accea782cd8c798098a771ae9e979f7,2024-11-21T07:34:42.873000
|
||||
CVE-2022-4172,0,1,7fa5f26227af919ff1a673e4d38e989d9dc2005b395325349c999ad9509fa057,2025-04-14T18:15:25.480000
|
||||
CVE-2022-41720,0,0,5bcfcc00915c50717394d7d3984812777c51ef9f89baddec6b83df38b66b6095,2024-11-21T07:23:44.050000
|
||||
CVE-2022-41721,0,0,2e8bd4573f0dd62fcea2f7048390dbb028e010c1c9869b5f1ee617a97a53ecd3,2025-04-04T15:15:43.490000
|
||||
CVE-2022-41722,0,0,21edb3cda67287dfd0ffc979054d906f188d50029c0f926116230a80d10169b7,2024-11-21T07:23:44.303000
|
||||
@ -208280,7 +208280,7 @@ CVE-2022-42221,0,0,22cb1d5c362e6ce83cad250d332a9b8ebcaf3a72dd7627752e8a0f435d5aa
|
||||
CVE-2022-42225,0,0,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000
|
||||
CVE-2022-42227,0,0,d1eb18a0c4fc2be883366222adf7b8f679fb279c1d46312139a0a5942b91a003,2024-11-21T07:24:32.430000
|
||||
CVE-2022-42229,0,0,30d4ffa5106cde8593ccff0549029cf9a81b07534e7c788198cdb3cec710b8c4,2024-11-21T07:24:32.590000
|
||||
CVE-2022-4223,0,0,641d266896d2ac10f72435149dbeb6bee42028a6d1bb4f09427a1e9d5acc1bf9,2025-03-17T17:46:47.570000
|
||||
CVE-2022-4223,0,1,864251836a7343ff6231173b83a497047fa57a07c9069025c4b204be88a24456,2025-04-14T19:15:34.730000
|
||||
CVE-2022-42230,0,0,afbcde150b4cdbd27a0ba4e25988fd8d316b8be7da18113fe6a767ad806eee48,2024-11-21T07:24:32.743000
|
||||
CVE-2022-42232,0,0,dba64461f6c9de9d124bf451d23335b0503517454dbecb3c434df9d63dd83036,2024-11-21T07:24:32.897000
|
||||
CVE-2022-42233,0,0,2e08d4a881f7848b737a4a220f9738c9d42c5584447fe1c7bd4b35e3efe2ab5a,2024-11-21T07:24:33.050000
|
||||
@ -208606,7 +208606,7 @@ CVE-2022-4265,0,0,8b357a7011cd27505cd0ba7f0b4aec702727c845cd20fec392b57cdb669667
|
||||
CVE-2022-4266,0,0,71e21b7c1fbc27bd76a8a9dbf480e6f49f978fe838017e83bb2089d740ff53bb,2025-04-14T14:15:23.407000
|
||||
CVE-2022-4267,0,0,5b5b888ff4c23c35faaf93a4a1ba2acd0c900c62067218605d86adc0e723daae,2025-04-14T15:15:23.240000
|
||||
CVE-2022-4268,0,0,455523bd1e5f3baa79bf61756cbb9d448ba35f3faf4836b62d93ae7d22693dde,2025-04-14T15:15:23.423000
|
||||
CVE-2022-4269,0,0,9df952c8ef43f102c30a89ef66bb51d9dc7606e78f74e40303b2682a0f4d6cb8,2024-11-21T07:34:54.643000
|
||||
CVE-2022-4269,0,1,1e9b14e2aa23c7a2079debf23cf49881e3b5fc201768c68bf85ff674019f09ff,2025-04-14T18:15:25.830000
|
||||
CVE-2022-42698,0,0,041fe502147bbed62c1718cca402bce2022efa54087bc0796befc6b89c7fdbac,2024-11-21T07:25:10.733000
|
||||
CVE-2022-42699,0,0,eded6b867ee0fc28eb81d333cb675abc695633534b9159942ba29f1a4b77bc8c,2024-11-21T07:25:10.857000
|
||||
CVE-2022-4270,0,0,54f6a83009888ae56e2f7ca8929c8ede1adeaf84285a3612138e7542f8aa1879,2024-11-21T07:34:54.760000
|
||||
@ -208735,7 +208735,7 @@ CVE-2022-42826,0,0,a3db93b6acc795d6f94f901a4da2959143f2f1df1d41d8a4377b77c2f10dc
|
||||
CVE-2022-42827,0,0,daf86a2d6525485094edeefb5bf2966711f5feb63f4b9bc9bbe70c1122307fa9,2025-02-14T16:18:40.880000
|
||||
CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000
|
||||
CVE-2022-42829,0,0,60b7d93b772d03e8943ccdbb49b71d351a7499a5bf19d49948ac08d4b6c96b4c,2024-11-21T07:25:25.853000
|
||||
CVE-2022-4283,0,0,7fc62bdf0195a91399c279623762a438ac8ad3fb55bb1c5f4a208e8fbedf4810,2024-11-21T07:34:56.373000
|
||||
CVE-2022-4283,0,1,27a9ccef858f1b55dd303113243ca1b93474519017aa26fd4c4f0e5e0e04ab05,2025-04-14T19:15:34.943000
|
||||
CVE-2022-42830,0,0,72972a3ba5fc43556b715b18e4356769de4615c3248b9cf605d32df462fdaf81,2024-11-21T07:25:25.977000
|
||||
CVE-2022-42831,0,0,748ebe8f3ce1901c6029a3c2d364c27b812bbb13adb57bd6364b9db9684874e4,2024-11-21T07:25:26.100000
|
||||
CVE-2022-42832,0,0,6ff99dbdf9497540f7671f34fb31bdd8cffbb4c610857908e4604193d9513c1d,2024-11-21T07:25:26.230000
|
||||
@ -208776,7 +208776,7 @@ CVE-2022-42864,0,0,14cbd5a7749222311df8e273e33b983841feddec759d7d7e1892d1c925558
|
||||
CVE-2022-42865,0,0,f8df488c2c9571b5493a5e40a15514a79eefe957eafc2c254ce6b4083dd92e9b,2024-11-21T07:25:30.483000
|
||||
CVE-2022-42866,0,0,d5cfb0a165887673926407d7d67ce465d8ad56b5ee20670c669c032a124ba1a4,2024-11-21T07:25:30.630000
|
||||
CVE-2022-42867,0,0,ce27f7a22782f22ca05bfbf8f8eec40abeb9554f4a9da4c8f35b43d97334fdea,2024-11-21T07:25:30.783000
|
||||
CVE-2022-4287,0,0,9a0b4f68151e67547648ee3e06b70bf70f6d854eea51913fcf1ac6ff8a9b2a22,2024-11-21T07:34:56.767000
|
||||
CVE-2022-4287,0,1,c4bc8784884822d9b9114fa588e781ac3fc7f47824cd8b83b453b40ac7e71f84,2025-04-14T19:15:35.137000
|
||||
CVE-2022-42878,0,0,fae722a302e10e9c4237dcc2e34c85849b43826be9477631cd03f33ec1851f19,2024-11-21T07:25:30.940000
|
||||
CVE-2022-42879,0,0,3ff7f17d4077541cce93c63215ad398195b006d45a3e5b1e71628a07ac9c8770,2024-11-21T07:25:31.097000
|
||||
CVE-2022-42880,0,0,665c9a886d83d1e37a04ae4020252c54ebdfda77890f2153174ce2a5cb5c2423,2024-11-21T07:25:31.270000
|
||||
@ -208795,7 +208795,7 @@ CVE-2022-42894,0,0,6870a969ffbd3168a346db2fb3f880ab199dcdeff8e0a3c7bb6f53d8a7926
|
||||
CVE-2022-42895,0,0,9bbffea0d6c84fc0fce63664946a754ce3cfa9225b9dd4f7d84de6898dfc53a2,2024-11-21T07:25:32.957000
|
||||
CVE-2022-42896,0,0,6d2828ebf7107e04fe3a7c91651620fd220727514028f2eac268472ed6e97717,2024-11-21T07:25:33.110000
|
||||
CVE-2022-42897,0,0,076ab498b1351dcda80fbe9ffdd078bd615d9b16cdf32cef9eb7d60c9b3326c5,2024-11-21T07:25:33.257000
|
||||
CVE-2022-42898,0,0,f2ba6c7c82dcc8fd109c7c04d68269ecedb810a25c4ef872fcae925052064ae0,2024-11-21T07:25:33.423000
|
||||
CVE-2022-42898,0,1,3d4016b1e31771eb82ed24a7d111222ddec0b2c2f1b410aded7b743fe48a8b0a,2025-04-14T19:15:31.810000
|
||||
CVE-2022-42899,0,0,0f360f397b6a83e8ec42ba769b4c6b1a3cba87ca900a153f628868c8a840214b,2024-11-21T07:25:33.607000
|
||||
CVE-2022-4290,0,0,802b2748fd428daf8579b1f2d82e0d79f4203a235db9a1df062a593160358310,2024-11-21T07:34:57.010000
|
||||
CVE-2022-42900,0,0,53f2980452c464cc64d37b8483a94825be07cc236e396c928b209cc67a55872e,2024-11-21T07:25:33.797000
|
||||
@ -209116,7 +209116,7 @@ CVE-2022-43355,0,0,08162f3d5532def670705561e6c5cc0ee11cf17403be83c4e12f081547775
|
||||
CVE-2022-43357,0,0,49710cd3fa169042a9e0bbe187a6945bb110faff0d8151512ac67e439036ab51,2024-11-21T07:26:19.753000
|
||||
CVE-2022-43358,0,0,11dc4794f1b8bc43d2f46726b4033a61fe6070f59544c7f6fadcd79df5e58abe,2024-11-21T07:26:19.950000
|
||||
CVE-2022-43359,0,0,550e63e1e793babc8f84d42dcbda311605626dfb413f2af1eb096c494f8a2384,2024-11-21T07:26:20.133000
|
||||
CVE-2022-4336,0,0,ed14ae409e9124cc4035df576b4676cd6c334569a89d0f706273f1261a4cc3c2,2024-11-21T07:35:04.800000
|
||||
CVE-2022-4336,0,1,c6213846d84c8eeb84cd5c6d2d9113a1416277a04a1060249af2edb42816093d,2025-04-14T18:15:26.510000
|
||||
CVE-2022-43361,0,0,e4d475ce0c7fe418249f627bbe5265cb4bd3a24d0f8881a430dc22d1391edf48,2024-11-21T07:26:20.290000
|
||||
CVE-2022-43362,0,0,a12c9dc795c60959cfd1ce2383f2c16b3121a4a48bde75306dd154ec2f7dff52,2024-11-21T07:26:20.447000
|
||||
CVE-2022-43363,0,0,73bffbea2ac9b78e9cf1fc50b165cf8bd609ec9f4e517ddb2c9ed32b95f5e024,2024-11-21T07:26:20.600000
|
||||
@ -209601,7 +209601,7 @@ CVE-2022-43890,0,0,ab5e42b36937653844c4dffdf91a2cb70810fb699dfdfd5288014e48a40ca
|
||||
CVE-2022-43891,0,0,c096bda89a166a7ca23bb85014db7aa2e897e489a55da2f3807a0f01ed785249,2024-11-21T07:27:19.867000
|
||||
CVE-2022-43892,0,0,68452e42ce158ef03059e1eb3c4f818c0567438ea23ad0908912c0696981b19e,2024-11-21T07:27:19.993000
|
||||
CVE-2022-43893,0,0,b210f4c6a602b4ae4d32addf4b0b563b1d4598e5006a4ffdf3418424b6856995,2024-11-21T07:27:20.117000
|
||||
CVE-2022-4390,0,0,790613666e27485d8cb7e3f9f43451036e93ca559dc9c7983d62b8cdadc275cd,2024-11-21T07:35:10.843000
|
||||
CVE-2022-4390,0,1,e798b86f4c6d1eed84d6e2360c4213bf2bf8ba968bc6d818b4df1b1017108a63,2025-04-14T18:15:26.737000
|
||||
CVE-2022-43900,0,0,9b3561ccb1c3655974a5feecadfc9fd57c2369e5e64bd9811eaa890b41c56d0a,2024-11-21T07:27:20.237000
|
||||
CVE-2022-43901,0,0,a5cc2a57b9f3bb5f59c7ccfeca8b9cdda97ba2ee2080ec0a94daa7347ecf60d2,2024-11-21T07:27:20.350000
|
||||
CVE-2022-43902,0,0,0402bd41a4ba494f04188ef30e55109697d9acbc1905c6f3a5476c041be97e44,2024-11-21T07:27:20.457000
|
||||
@ -210396,7 +210396,7 @@ CVE-2022-45146,0,0,19fae6f4c3ef8e3f97429e8fdf36d67c418a165bce27bc97d1063e136a636
|
||||
CVE-2022-45147,0,0,94e3204ad3011258480201218b7a2324c4763320a4bd93e13cd8605210783cd5,2024-11-21T07:28:51.060000
|
||||
CVE-2022-45148,0,0,b151ae20a9737fec61be325f45f384d51c2064c68f98ef00e13de8ebc5bb6737,2023-11-07T03:54:37.337000
|
||||
CVE-2022-45149,0,0,840ccf1e9f5fc9dea36176d11059059890bc8c8473fcbed87737676d7d1e60e1,2024-11-21T07:28:51.220000
|
||||
CVE-2022-4515,0,0,77fff445de0f4a8b25e761bb9c1b2d589324ac5720dadfbd2c40423574bafd80,2024-11-21T07:35:25.033000
|
||||
CVE-2022-4515,0,1,ebd018611bd167ec2eb67dc97f12f2613e9727a3ad783baab2de2a40f307e63a,2025-04-14T19:15:35.290000
|
||||
CVE-2022-45150,0,0,166cea65c307421248ad4e68f5f9c6749cddb68c2f79e2a6e9e3bf4c5999a807,2024-11-21T07:28:51.337000
|
||||
CVE-2022-45151,0,0,139d67b405b6c866c9f2d44fbd015719647d6195c3783b0dadf1d67a3afd3a96,2024-11-21T07:28:51.463000
|
||||
CVE-2022-45152,0,0,a79e710fcc5ac941384e0b5f62966074cc64aff1974fa2e1c30025633bab1ec2,2024-11-21T07:28:51.583000
|
||||
@ -210437,7 +210437,7 @@ CVE-2022-45193,0,0,cad42417cd181db140955c886b94314a70a92012fc7ef797757b1aba922be
|
||||
CVE-2022-45194,0,0,44e4243f45615b5d37d42628305634dfaf63550aedd1e8ef202c6305755f9ebf,2024-11-21T07:28:56.390000
|
||||
CVE-2022-45195,0,0,05d80e6ba8827b61f3d00d83cc5b68304b7f6b875374ce88aca81288b1dcf0ea,2024-11-21T07:28:56.543000
|
||||
CVE-2022-45196,0,0,6d315f47811d57a2419966281cb2c7d66fff9eb4145e1e074fa912f20a3acc0d,2024-11-21T07:28:56.687000
|
||||
CVE-2022-45197,0,0,2be301690b3ce926f2b77a8fa85f4559bb89b8722a6c0903fa608358a1914322,2024-11-21T07:28:56.833000
|
||||
CVE-2022-45197,0,1,e2797594facab33eb8a64e894f3d80227e2c3fb6b001db583f81a9c4f527747e,2025-04-14T19:15:32.297000
|
||||
CVE-2022-45198,0,0,2f83eca86b413074047ae0108c6feb23d1202b02e6f4005aad94fb4653e9740e,2024-11-21T07:28:56.987000
|
||||
CVE-2022-45199,0,0,d1c1175a0ef080fdf9a7cc241c1ae7cb7fccb388690911059d96e4fbe19a95c0,2024-11-21T07:28:57.157000
|
||||
CVE-2022-4520,0,0,59776d2d88f47898fb2ed20a9d8341b4b24af397bef01454feef5b302af26bef,2024-11-21T07:35:25.283000
|
||||
@ -210930,15 +210930,15 @@ CVE-2022-45885,0,0,d6bbd62125c3e3d1c05a42cacf9102c0b922b757836c58a216e5313ea05ae
|
||||
CVE-2022-45886,0,0,f140edf991ca9246fdbc30c7a32f51c739098b568245826309558a5bdfa30049,2024-11-21T07:29:53.640000
|
||||
CVE-2022-45887,0,0,b1bf14e611be3c6e9e1074eed1074d1d55ad11e99eb7c0f06e591b89e6e50ec2,2024-11-21T07:29:53.817000
|
||||
CVE-2022-45888,0,0,5ab9063ce4d1fa63df86703ee9e5cec88216a7278b036c89eb9ce80382682fda,2024-11-21T07:29:53.970000
|
||||
CVE-2022-45889,0,0,ef471c80a6b938953bc36fc868ee25417116edc923d3756b5f3ba04c44eb1d58,2024-11-21T07:29:54.123000
|
||||
CVE-2022-45889,0,1,2ab2e380f1b9eb8fd4bcfe12ad4097911bbd9fdde4b34596e3f2a07f2d7a681b,2025-04-14T18:15:20.110000
|
||||
CVE-2022-4589,0,0,169c3200de47118b50c9e0ccf78c3fe21858216bc9482084befcdc82f68d77b6,2024-11-21T07:35:33.073000
|
||||
CVE-2022-45890,0,0,743fe6a0a2f8d89ba5b8b33b7b3dff56f88a1b90ec5496c37dd7e42969182069,2024-11-21T07:29:54.283000
|
||||
CVE-2022-45890,0,1,bca2bfee0cd0f1f6dc4bb66a4c6077bfa2a03828d5dcde3b1556e9f1bd6c2c8a,2025-04-14T18:15:20.267000
|
||||
CVE-2022-45891,0,0,9b201cef71cb74eccc1e3d4184cae59fc541382410081dc7f4313eaf17b8d96c,2024-11-21T07:29:54.430000
|
||||
CVE-2022-45892,0,0,878fb8b27245175571bc80a6378dedb87b52edf5ad51a6d1ef01c67a3c91c250,2024-11-21T07:29:54.573000
|
||||
CVE-2022-45893,0,0,cc28543c74c21692ae65e94f4eea922c710ffc2b8fc5f1cbd168cd4f78d52d1c,2024-11-21T07:29:54.717000
|
||||
CVE-2022-45894,0,0,7e79c70ca57ac35fb5f5c2136ed71fa4207d68e94574986bd856b7bbaf922cb0,2024-11-21T07:29:54.857000
|
||||
CVE-2022-45895,0,0,3bc1f058bd6ec4aa0f4a1dd18ff39b3427bd78a51062410d77a3230858be5757,2024-11-21T07:29:54.993000
|
||||
CVE-2022-45896,0,0,9fd827559105c4a7f955449cb8e47f3ca887d56261af8ddf374327bd081d5e59,2024-11-21T07:29:55.137000
|
||||
CVE-2022-45892,0,1,448e259663ac2aadfb21238101d4137086a717532398ec2af1466e4af9bab659,2025-04-14T18:15:20.410000
|
||||
CVE-2022-45893,0,1,e72baf571994af9507f4976a757526e3ed982f80990e89b86327b896f95ba160,2025-04-14T18:15:20.570000
|
||||
CVE-2022-45894,0,1,6cfa1fdba7d4ccdfb5e6cc23f08e7d89239d7edaa7c6c8d3484877a6f331bd6d,2025-04-14T18:15:22.513000
|
||||
CVE-2022-45895,0,1,5fb190638427fd772ce0984092c1c467d16576e3ca6197549132f12619570102,2025-04-14T18:15:22.983000
|
||||
CVE-2022-45896,0,1,38750eec5443440299e252df770287029083b0599b148176b7cf98f6a8c318d8,2025-04-14T19:15:32.473000
|
||||
CVE-2022-45897,0,0,b2b882ad2f3896bcc19112e03b04415f9e60136eda918633612298a12443690b,2025-03-28T16:15:21.550000
|
||||
CVE-2022-4590,0,0,5cd48cb7edb0e9432330b5fa366b9c77cd5bd8c0b506539909ebf45436502e07,2024-11-21T07:35:33.203000
|
||||
CVE-2022-45907,0,0,6e9d516b5e43b2e1627e6ec56aa6c854a29ec1ba3d18358c344f60495559e266,2024-11-21T07:29:55.427000
|
||||
@ -211420,7 +211420,7 @@ CVE-2022-46596,0,0,e29042f98db2e887c64c056b6b403bcb1bee39834d00de27a1c32b95d9b33
|
||||
CVE-2022-46597,0,0,9657dba8ccea4e4c3eac9137a156bc461b8039a9d9571b3a1d9e604d6d1ee9a5,2025-04-11T17:15:37.867000
|
||||
CVE-2022-46598,0,0,f093445f74dc8c2f050b6bfd7fa44f7373e06dac69fadee820936dc63844ca17,2025-04-11T17:15:38.053000
|
||||
CVE-2022-46599,0,0,7ada15e4095bdf3c05ab56d0f472e2dffced2d6ccb747abe5be5d6b39e17111a,2025-04-11T17:15:38.243000
|
||||
CVE-2022-46600,0,0,c19535ab37f0d89f200d3f51da2d49a1c7db446dfb7c907df619c7f4a6581a87,2024-11-21T07:30:48.330000
|
||||
CVE-2022-46600,0,1,d239ffacff0a026786692d5e4a0d86044061564edf1a00b2499ae675cc098b85,2025-04-14T19:15:32.623000
|
||||
CVE-2022-46601,0,0,a2baa156e1ba53fcf9ce3c6d268d48991a46384ea1413f56572a22952cb435f6,2025-04-11T15:15:41.937000
|
||||
CVE-2022-46603,0,0,9594bb8d8c3dec9fac628c4501904cdeaf37752a22a5b0cbe9965b603248d36c,2025-04-09T15:15:52.667000
|
||||
CVE-2022-46604,0,0,de612da47cdcd1f7d9e43a25f458186e5ab8b3ce1e464294fa3bf23711bc0f0c,2025-03-27T14:15:19.900000
|
||||
@ -212305,15 +212305,15 @@ CVE-2022-47935,0,0,c8b0698da0049d18ba7d2deccd3ee040138436ae160d777975115108d82f4
|
||||
CVE-2022-47936,0,0,6e97adbc077ec3b9402c2a5aaf3ed3a5320385cb500437f3dc354b28ce60a293,2024-11-21T07:32:34.637000
|
||||
CVE-2022-47937,0,0,538aa7918ded3b5ee10f14520b5b529dde7873a05464016f6d2d3dffbd31a4b6,2024-11-21T07:32:34.847000
|
||||
CVE-2022-47938,0,0,6389c1b5c121b383d5f7cbe230e889f82fddd1762b25f480f7da52613b44b6ca,2024-11-21T07:32:35.223000
|
||||
CVE-2022-47939,0,0,57858ffa209fc211ebcee12fc6be5d4d31d662c16e9e4df23ce6732a609d2ad5,2024-11-21T07:32:35.527000
|
||||
CVE-2022-47939,0,1,3980d0d0197e4d9f7738c5b2cbee4c499f668bb0fbe3f1aa55f5110d5fa93a35,2025-04-14T19:15:32.793000
|
||||
CVE-2022-4794,0,0,6e3a44d5ceb655df805126aaab55edbc5a82cab5062efc191610ecb48b22afea,2025-03-28T15:15:43.120000
|
||||
CVE-2022-47940,0,0,0415c1caf3a79389a5d562c21410d35a138d04792f85abdd3cffe1b9a49da496,2024-11-21T07:32:35.773000
|
||||
CVE-2022-47940,0,1,edd75ab741e457a08df6ee741aa3f28eaa609ae647bc9790a3c729a903907dee,2025-04-14T19:15:33.080000
|
||||
CVE-2022-47941,0,0,84fafe0c88abaef64f8fcec45aff68710d547f9377bd525c134dba046b225c2e,2024-11-21T07:32:36.077000
|
||||
CVE-2022-47942,0,0,ccdfa5939f84209ad8ae0807591190e976a5ec2ede1c58d505ff099556519549,2024-11-21T07:32:36.300000
|
||||
CVE-2022-47943,0,0,6fed2aad337ab091392ac44913487de3665a0a14f1640eac5a709d8bd7b00c84,2024-11-21T07:32:36.497000
|
||||
CVE-2022-47945,0,0,57405884bdcd1ba6eb1c80919085ce13225e24da51371e79eb0b976df43e466f,2024-11-21T07:32:36.703000
|
||||
CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca672,2024-11-21T07:32:36.927000
|
||||
CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000
|
||||
CVE-2022-47949,0,1,851d3c272a499511d2d5b08e60633b9b3436bb3dfb4dab0db01045ae0c524e41,2025-04-14T19:15:33.247000
|
||||
CVE-2022-4795,0,0,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000
|
||||
CVE-2022-47950,0,0,d86eb39f92fb5bda3bf1a962b161785879bb3fbd0fc5f465bbe17df343f3e500,2025-04-04T16:15:16.630000
|
||||
CVE-2022-47951,0,0,e2d996ac11f4531610b951008a6011dd374a562e27e6c5266b3be479b0d71509,2025-03-31T17:15:39.117000
|
||||
@ -213487,11 +213487,11 @@ CVE-2022-4927,0,0,38cabefc86faa21ef7a71fd3b17ce17fef5bf62f0a9bf16de2aec372df1e94
|
||||
CVE-2022-49270,0,0,a79ceaafa94facf74ac9d810625f0ab321a34474550bb47a969662c072a7274e,2025-03-25T15:23:34.137000
|
||||
CVE-2022-49271,0,0,1f8e1b0fe3f01130f736aca9a2a9f2ed2865517403bdc4b7f9ff9c036d9cd42a,2025-02-26T07:01:04
|
||||
CVE-2022-49272,0,0,151e203229ab139eb318b81978b09105f741454ff0dd3d97aec672d68b695245,2025-02-26T07:01:04.097000
|
||||
CVE-2022-49273,0,1,859e7357df25712378b8bcc9fd53eddaffc575590550824981761dab1acd9027,2025-04-14T16:53:14.150000
|
||||
CVE-2022-49273,0,0,859e7357df25712378b8bcc9fd53eddaffc575590550824981761dab1acd9027,2025-04-14T16:53:14.150000
|
||||
CVE-2022-49274,0,0,9ec33cc59e99a91b61b867d2cefe88ce024f8725163a88ad07bf9e9c94e7c4e2,2025-02-26T07:01:04.280000
|
||||
CVE-2022-49275,0,0,27c88cad8b3b5be67c5d8a720087fa66c850c53d61adbc06c12fe23ceb88cf37,2025-03-25T15:24:08.757000
|
||||
CVE-2022-49276,0,1,7fc8abcad8bdea4512dbbfdcfc7510bb538734a86d41ef7975554f3ef522bd7c,2025-04-14T17:08:00.310000
|
||||
CVE-2022-49277,0,1,15427c4d45bb01d89d68f41e54664768fe03dfdd95336a550d2679c75485461b,2025-04-14T17:09:03.497000
|
||||
CVE-2022-49276,0,0,7fc8abcad8bdea4512dbbfdcfc7510bb538734a86d41ef7975554f3ef522bd7c,2025-04-14T17:08:00.310000
|
||||
CVE-2022-49277,0,0,15427c4d45bb01d89d68f41e54664768fe03dfdd95336a550d2679c75485461b,2025-04-14T17:09:03.497000
|
||||
CVE-2022-49278,0,0,af52dc7d43fb9781db25d217d1748af441e05a6dfb58604baaf82adf7ba57075,2025-02-26T07:01:04.660000
|
||||
CVE-2022-49279,0,0,4a64a2f4ef64d467cdd657f388bf4fc3d7ddc4cd4cd56aaa2cf28b5cf22ba846,2025-02-26T07:01:04.750000
|
||||
CVE-2022-4928,0,0,55113902c03503fa1ab1a487ca9bd5c82e2b7a386b6bdc538a9776f2c4eb50bb,2024-11-21T07:36:16.280000
|
||||
@ -213515,7 +213515,7 @@ CVE-2022-49295,0,0,380456ec8ed75bee76e717e7750599dc72462df32c61aadc774662fc21c67
|
||||
CVE-2022-49296,0,0,ec572c25a8e7ef5ebb5a08b08bcb48938c3fb818f04b625dd1bd4645d4359b6a,2025-02-26T07:01:06.433000
|
||||
CVE-2022-49297,0,0,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000
|
||||
CVE-2022-49298,0,0,851b5aa1fd0fddfb5eb61f96e9f8096e384a4e7d34b0dfaaa58625947d029025,2025-02-26T07:01:06.630000
|
||||
CVE-2022-49299,0,0,1ab2245d227943f7f512538fa06856d48795a396e6479aba24a11b1f8c0c83d8,2025-02-26T07:01:06.727000
|
||||
CVE-2022-49299,0,1,f197f91d925185ae89eedd3f194e3948bdc958a01200036420aad81b79f27842,2025-04-14T19:49:30.960000
|
||||
CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000
|
||||
CVE-2022-49300,0,0,5ff24caeb4f9047b46fc35c02eec5c6a447128e511949c6b1a98f67635fac7dd,2025-02-26T07:01:06.830000
|
||||
CVE-2022-49301,0,0,3d112d4f467242fcc0497c0d534e493e065f8bf531bb48159d1e114a75e8a5b1,2025-02-26T07:01:06.923000
|
||||
@ -213531,17 +213531,17 @@ CVE-2022-4931,0,0,a532fe15470676bd43e3e554e3755fa6ea4f32eaed39a0989b1e4aa5acb9c6
|
||||
CVE-2022-49310,0,0,f5ccfabd8a21a4fda7ce249c99d06b77ccc944ef2a2fab12205e31e0415f3b36,2025-03-17T19:54:24.320000
|
||||
CVE-2022-49311,0,0,bf0f4d5a06e85872f575d112d967dee3f9b929e556964dfd7f7401a05bcea8b2,2025-03-17T19:54:09.927000
|
||||
CVE-2022-49312,0,0,e14ad96223c8b5c3f47f87137073a53a6153f42858d5dcad1126bf281ae976fb,2025-03-17T19:54:00.450000
|
||||
CVE-2022-49313,0,0,96a9ff9b40d6cfb30dce33649b2b0f9c9e28289af09918f91fab964529332b86,2025-02-26T07:01:08.143000
|
||||
CVE-2022-49314,0,0,1acbfc59cdbc5e0d07406ec534e6af329435b1dd173965856c8bf82c4fee90ac,2025-02-26T07:01:08.270000
|
||||
CVE-2022-49313,0,1,3c95de85c0a3c97ace419fe51bf3649d4884763d07a92b3805db74b1a1f3478e,2025-04-14T19:59:26.907000
|
||||
CVE-2022-49314,0,1,b0df46065fefa8e3a4ff1f8ead89b3a480f665b96c11de8591aa240e50fe7316,2025-04-14T19:59:14.600000
|
||||
CVE-2022-49315,0,0,f9e8447de661b43da4673f80d2135b5e6e1389f110c99ab5de9e5c7644ee228f,2025-03-13T22:00:36.813000
|
||||
CVE-2022-49316,0,0,14d1040effacc0ffe764b7483fe056750cd2255b06ed8454a76d2c700737a24c,2025-03-13T22:01:00.937000
|
||||
CVE-2022-49317,0,0,312a9a4237bb5883a46a0bdf1cc4c312f4d7d2f0f3de1b8a8dc6d8933139bbdf,2025-03-13T22:01:27.807000
|
||||
CVE-2022-49318,0,0,e7d272a7a59caef367bc5392116e97ae19eaf71c574393ab020909c03333cc4c,2025-02-26T07:01:08.660000
|
||||
CVE-2022-49318,0,1,64e4d7a9ea1bcd40d72d2d0580e28b185ecda9a1fbd690a60a995077cc13702a,2025-04-14T19:59:06.820000
|
||||
CVE-2022-49319,0,0,9c96b4ac3e48eb4890606a4dd5c20c1414dc540d72e53131cb81d84765b49600,2025-03-13T22:02:01.703000
|
||||
CVE-2022-4932,0,0,38277e45881755a1bc9fb65d6b419499ee923a7cdcbdaea771e44bb51f547438,2024-11-21T07:36:16.787000
|
||||
CVE-2022-49320,0,0,33bde134630cfc099524044c4cd60e1dea70026c5fb8a4d348c31af2c73e3dc8,2025-02-26T07:01:08.840000
|
||||
CVE-2022-49321,0,0,8597a9541161cc39fec211088995f0c7345ed243c523f91e9833b9a40196ffc9,2025-03-13T22:02:34.573000
|
||||
CVE-2022-49322,0,0,8472ed46f20f119b0ee22963b4bc90256d8275b6ea69bc4720c88388123a50b9,2025-02-26T07:01:09.030000
|
||||
CVE-2022-49322,0,1,fdad033161b53cc547a8371a8e0d61abdc15cae228325e37d6a48e404c6f3c6c,2025-04-14T19:45:44.123000
|
||||
CVE-2022-49323,0,0,1395ba4fa5104fd9795d86be2da4180d789f36bd07997bbc19b8eb09463de822,2025-03-13T22:02:57.720000
|
||||
CVE-2022-49324,0,0,312f44f8af814f73cb3c8922a516163c8f62302b7efb6be6896e78769f3b6076,2025-03-13T22:03:30.573000
|
||||
CVE-2022-49325,0,0,8e4448ade57ef3d4e97c2054783a8008b327325c8e5dda9360ef1442a07ec18b,2025-02-26T07:01:09.323000
|
||||
@ -213567,20 +213567,20 @@ CVE-2022-49342,0,0,7442a931acab02b39e9705869bb759665617213b3751f900dc0cc7a5820fa
|
||||
CVE-2022-49343,0,0,5c70fbee4a7bf8c0c50f24633a1fba9535b73a0a4d51f84461a387cb2825f514,2025-02-26T07:01:11.040000
|
||||
CVE-2022-49344,0,0,0f30967a7412e311e5ec30234d04c59807a6abb14e522b9b7bd3b651e08c65cd,2025-03-13T22:07:39.830000
|
||||
CVE-2022-49345,0,0,d6a577d50be897ab4cc326d2cedced55a6d0fc9e52a8bad6d8abdd58aacf287d,2025-02-26T07:01:11.237000
|
||||
CVE-2022-49346,0,0,88f198e253ee0cb63c00727cc1eca4fbf50a0981e7033514e1dc6f27a78d4d0a,2025-02-26T07:01:11.340000
|
||||
CVE-2022-49346,0,1,538d2f96638944678866f614fc5d540f6caeb937fbafbfe4132e2ea002218608,2025-04-14T19:45:55.220000
|
||||
CVE-2022-49347,0,0,875f447f25fe0b22da262ad577f87160659c778e431e53313746017d81dc0ba5,2025-02-26T07:01:11.433000
|
||||
CVE-2022-49348,0,0,6c2cb9b9c185d7e6582ef01658d9e891cd3a6d7fa7a7ce81fa9f0fda7b37d7dc,2025-02-26T07:01:11.533000
|
||||
CVE-2022-49349,0,0,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11cea9e,2025-03-25T14:51:05.100000
|
||||
CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000
|
||||
CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000
|
||||
CVE-2022-49351,0,0,4eeeeeae654c20056896eb2e71d7e4730ecc4073202cdfbf3de859230d859c83,2025-02-26T07:01:11.823000
|
||||
CVE-2022-49351,0,1,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000
|
||||
CVE-2022-49352,0,0,9a85d620d7b8dd9928721b30c4d4e2b4685cf494c863d70f759767330dbda81d,2025-02-26T07:01:11.920000
|
||||
CVE-2022-49353,0,0,dd6d4b6d2e77d8d6214c171f01672e490a0e42393b3e6dc3bbd63145fbda7265,2025-02-26T07:01:12.013000
|
||||
CVE-2022-49354,0,0,6d45ff60d2e7ebdd6c366f3c160891a2d7ee445f8201f2f83ed84a4e29463bd1,2025-02-26T07:01:12.103000
|
||||
CVE-2022-49353,0,1,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000
|
||||
CVE-2022-49354,0,1,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000
|
||||
CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000
|
||||
CVE-2022-49356,0,0,69a79f3405e3fcc6bbe03cb0dc1ec5148dce71753a0254d1854098f2f95da1aa,2025-02-26T07:01:12.300000
|
||||
CVE-2022-49357,0,0,4c05a89d1fb039be9907925130b399696bea0bfb8e04a1ad5943d062299034dc,2025-02-26T07:01:12.390000
|
||||
CVE-2022-49358,0,0,eb2bedc766be807bfe5e1d6137513f8a69c144d5c49d62f43ffcff34ddbd61a8,2025-02-26T07:01:12.487000
|
||||
CVE-2022-49358,0,1,4cd1f52b7fed81133cfdb57afa95b4b21a285e4165bdd18a5853760ee2b57673,2025-04-14T19:44:01.833000
|
||||
CVE-2022-49359,0,0,04430deef42b56e25489bf53e5d3b3ee6d132eb035d8bb0c1c1ef4039fdfd9b6,2025-03-25T14:51:30.127000
|
||||
CVE-2022-4936,0,0,65f80b05cad36259fef0938d250fce71f92bdab50ccfcffc0c93e77961d09f04,2024-11-21T07:36:17.243000
|
||||
CVE-2022-49360,0,0,58f3ba0214b9f1a09e065f063c4fa146ef93da07e466a19b24783e6e58458bc1,2025-02-26T07:01:12.677000
|
||||
@ -214348,7 +214348,7 @@ CVE-2023-0335,0,0,81a486779e4f7822f594ba6a10f491ec26797c357292ad9c92e7938c3e6233
|
||||
CVE-2023-0336,0,0,a60a90bffcffedbaa055f52665a26980864469f014fcc57b5c3b697efa132078,2025-02-19T20:15:33.370000
|
||||
CVE-2023-0337,0,0,112be93cad8209381e7b3eb1eece74b6aa7661c3bca890d8d8e3f3f821327549,2024-11-21T07:36:59.880000
|
||||
CVE-2023-0338,0,0,dcf1443715223d9c570dc1cbebbb51d82c6c6293d63b8c2b3342ac6c16ac4f83,2024-11-21T07:37:00.010000
|
||||
CVE-2023-0339,0,1,69f56b17080fad5ccc26de704738d772366f7f193144e5db3546bad00057bfad,2025-04-14T17:15:26.010000
|
||||
CVE-2023-0339,0,0,69f56b17080fad5ccc26de704738d772366f7f193144e5db3546bad00057bfad,2025-04-14T17:15:26.010000
|
||||
CVE-2023-0340,0,0,a22fc018484144f7753705a0343443d479126171f7bfdfece372d34dc63ee030,2025-02-26T19:15:15.160000
|
||||
CVE-2023-0341,0,0,137a3e966fa4a96645290bb54315579e48a146ee7ed68a109fe3fa55e879c03f,2024-11-21T07:37:00.380000
|
||||
CVE-2023-0342,0,0,addf920b519974029b4f829e699d5b0ebc702b5f5310ee900f66499714fd9f67,2024-11-21T07:37:00.523000
|
||||
@ -214451,7 +214451,7 @@ CVE-2023-0444,0,0,d6e9e5152ab9e46b679eb37b2ece9dca7c6019af9451896e403dd1b3f990c8
|
||||
CVE-2023-0446,0,0,1fa4114c26c134a7a697eb61c8ce123d64be3be166d86832c094380d216c90ae,2024-11-21T07:37:11.677000
|
||||
CVE-2023-0447,0,0,a9c96dafb03c5563392a95e076ff2c29628bdb769e439fb5b6b4a0e94ed33494,2024-11-21T07:37:11.793000
|
||||
CVE-2023-0448,0,0,bc9ed6e815bf49d0776d51a131b3b0bf70bbfc4c42d427b8136e162e35376d59,2025-04-02T14:15:36.820000
|
||||
CVE-2023-0449,0,1,02ca57aaeb983cc12ebf98e321b7fa6e57017f27c94ddff76094d5ded40f19de,2025-04-14T17:15:26.173000
|
||||
CVE-2023-0449,0,0,02ca57aaeb983cc12ebf98e321b7fa6e57017f27c94ddff76094d5ded40f19de,2025-04-14T17:15:26.173000
|
||||
CVE-2023-0450,0,0,a01065ae3e1d7a90964a243c78a0ac82ea295399d3f1289b9c99a4bf9155d660,2024-11-21T07:37:12.020000
|
||||
CVE-2023-0451,0,0,6f87ec9786ca032dc765701ae3ebd73cd50f64fa1c9116e7b33f6468ae39ee83,2024-11-21T07:37:12.137000
|
||||
CVE-2023-0452,0,0,eac01c20318f5f5c980df2c0f62ed0c7311074b93ead38f20c744deacaaec2b6,2024-11-21T07:37:12.257000
|
||||
@ -214511,7 +214511,7 @@ CVE-2023-0506,0,0,87b88a38de8a656da96d2baaafb826c88720aba59d839140e544d0231abe46
|
||||
CVE-2023-0507,0,0,97ff4c85baef33d682c27593c5daa97fbe7c3f9a50ec6de04ac500064ba81a57,2025-02-13T17:15:55.760000
|
||||
CVE-2023-0508,0,0,3633feae8b122f41d68594b44da27848f4f97caa8fd0978e248c5755fdd1b9a0,2025-01-07T17:15:11.700000
|
||||
CVE-2023-0509,0,0,13c7cf1b9e7c848dafa6de2985329c806b5364b54521b16ff548b5f19a1d82b8,2024-11-21T07:37:18.937000
|
||||
CVE-2023-0511,0,1,33a5fb8c836a211de18a59b22715d9e3a87677e3ae4062d66d2cef1dcfd69862,2025-04-14T17:15:26.240000
|
||||
CVE-2023-0511,0,0,33a5fb8c836a211de18a59b22715d9e3a87677e3ae4062d66d2cef1dcfd69862,2025-04-14T17:15:26.240000
|
||||
CVE-2023-0512,0,0,ef0dea17e984a58cd9ac76ceb00b4b97241e3976fed7f0cf7813f28df25cc1ec,2024-11-21T07:37:19.170000
|
||||
CVE-2023-0513,0,0,53eb28bf9f942f890492e659c3abf77f7e462de38e9a2782ec413280dba9c75e,2025-04-04T15:16:10.910000
|
||||
CVE-2023-0514,0,0,8be048e41c71e892a1450001c4b06935a74d01b42c6b6ecd09bd66f9618a3793,2025-02-04T21:15:22.337000
|
||||
@ -214579,7 +214579,7 @@ CVE-2023-0578,0,0,1b664a5f9087e1616dad80854d7095835d0ab88854a8196a7fe50c003be364
|
||||
CVE-2023-0579,0,0,a9030806eb2c6a88cf9d4657f7bd32aa28a98c879cbc09d7f601d1f1c378ba9b,2024-11-21T07:37:26.030000
|
||||
CVE-2023-0580,0,0,fb2903613cebd2dc46456b158d0e03dde7bc6f83ca3387673eba11cce6f53333,2024-11-21T07:37:26.137000
|
||||
CVE-2023-0581,0,0,235330329aa9cb2413ff17de2e1747757523f4328b3fd3439758453dd9792730,2024-11-21T07:37:26.240000
|
||||
CVE-2023-0582,0,1,aa4bd08a70786b78f85407bc74995b972a07200e89127ea36cfaf83c8882d884,2025-04-14T17:15:26.367000
|
||||
CVE-2023-0582,0,0,aa4bd08a70786b78f85407bc74995b972a07200e89127ea36cfaf83c8882d884,2025-04-14T17:15:26.367000
|
||||
CVE-2023-0583,0,0,aecdf5bf075fe00bf28cdbb70dc4e17c1d3edbe8508537d39ebcdc1d79c2adc0,2024-11-21T07:37:26.457000
|
||||
CVE-2023-0584,0,0,86d98ae13897aba2e27973d5ba25ca898414447a0e558495482aae224a1f3bda,2024-11-21T07:37:26.560000
|
||||
CVE-2023-0585,0,0,49ac0e7f939629954485d621143f248a92ef053fa7893146e4d823a2591822c5,2024-11-21T07:37:26.653000
|
||||
@ -215604,7 +215604,7 @@ CVE-2023-1651,0,0,a996c073605204695631addb3d31e929868d3786d69d3f4e9899b7faa070f4
|
||||
CVE-2023-1652,0,0,9e835a6fe400097ca11396bc26599108fe3b0acc284327a37e06a0f4867630ac,2025-02-18T17:15:15.777000
|
||||
CVE-2023-1654,0,0,f66ce85144c753ce38a79afb2e23a08e27849201bc1668ccb06ae1849b22b606,2024-11-21T07:39:38.010000
|
||||
CVE-2023-1655,0,0,893dd63aaa59598fb245bffb6fff6c7970c9825949e937eee21ced0be221238e,2024-11-21T07:39:38.133000
|
||||
CVE-2023-1656,0,1,b28ea5951ea32b677c8fbfd3d3ac5ef597a29047c44767b188c3df3f9b214d77,2025-04-14T17:15:26.507000
|
||||
CVE-2023-1656,0,0,b28ea5951ea32b677c8fbfd3d3ac5ef597a29047c44767b188c3df3f9b214d77,2025-04-14T17:15:26.507000
|
||||
CVE-2023-1659,0,0,250cf06d3106193ba878ae985dd709d7fe5d2e42c1a1427e8f122c00b1b21c00,2023-11-07T04:04:31.303000
|
||||
CVE-2023-1660,0,0,51e5220e485bc31b336e8eb583bdbdc932c5c2df6bf6fc5ce8e665ce3dfddba8,2024-11-21T07:39:38.397000
|
||||
CVE-2023-1661,0,0,c449f2a3ac22ac4fec5792f01ad50cfc7557231b9431c87d798c24a3393fa984,2024-11-21T07:39:38.527000
|
||||
@ -234393,7 +234393,7 @@ CVE-2023-42957,0,0,ad86017e7ecd2215e0d18147017c01ca5f18ef4c2d1a0a6a2affb3a570458
|
||||
CVE-2023-42958,0,0,e2cabd6d75272766e223aa048939175893009bd5724fd529afe4959c76c23f4d,2024-12-09T21:34:41.793000
|
||||
CVE-2023-42959,0,0,e0711eaa631fd202edf70b35af742cf22eb3e7c7935db69f51becbb0419eaf7c,2024-12-09T21:29:53.040000
|
||||
CVE-2023-4296,0,0,ac9fecc66a305a7d71018af4bf3cefbce9c0a7930324dae06110c9f4351e3760,2025-02-13T17:17:17.657000
|
||||
CVE-2023-42961,0,0,6832fc46301a028e5366608cc44c5d378aea2b2eab7fd3fb649df0795f43919a,2025-04-11T15:39:52.920000
|
||||
CVE-2023-42961,0,1,54984929fed0dbdf8ba82a6f30c9eba2ea79b3e702e75e0f926cb1198ae53794,2025-04-14T19:15:35.480000
|
||||
CVE-2023-42962,0,0,a72dbc7a51289317b16a14450695e4cfea7099b88aa9e3e01c0fc23746d8cf38,2025-03-19T20:15:18.083000
|
||||
CVE-2023-42969,0,0,55c43a58054122668b9a6f339748c5f8e7a933d8a9c7802ee4448caa74cdf359,2025-04-11T16:15:18.510000
|
||||
CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000
|
||||
@ -234403,8 +234403,8 @@ CVE-2023-42974,0,0,d29cf4c12f6bfc30add86b56c7cddf36ff797f915e589c9ccb7d83e046515
|
||||
CVE-2023-42977,0,0,3867d3a0133ce78ad57f1a69db4ea41853af8a9ca8a12a6c5dc7f21ed3fc46db,2025-04-11T18:15:38.293000
|
||||
CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000
|
||||
CVE-2023-42981,0,0,5632568fc7ce776d92367ab7b0fd3c015fc2f697dbf872ecbb01bb0793b26467,2025-04-11T16:15:18.770000
|
||||
CVE-2023-42982,0,0,8ca26c2c5f466a6a389cc550395a0b87eaf5f9d0507d76e29de2ce7a846c8379,2025-04-11T15:39:52.920000
|
||||
CVE-2023-42983,0,0,48d58c2a2c4bc5b69ef12e2887ce2512c48d92652692326a9e0c7bab130711c8,2025-04-11T15:39:52.920000
|
||||
CVE-2023-42982,0,1,9ad2a3728fa5738c55df3bc5923c4740076bc86f41d75fcfbf362c163d23bfd2,2025-04-14T19:15:35.610000
|
||||
CVE-2023-42983,0,1,a9dff55468e68523afdb08764d411d430df6498654e66e136dda41b4220899a6,2025-04-14T19:15:35.743000
|
||||
CVE-2023-4299,0,0,1c48228975fccf08566f979039e0b4c5caf7b3d7e926d0f3612f67918d5d52d6,2024-11-21T08:34:48.760000
|
||||
CVE-2023-4300,0,0,723cb43892ca9bbdbe65bce2483f7097fa889e436033f6391408d357e0bbb2e1,2024-11-21T08:34:48.940000
|
||||
CVE-2023-4301,0,0,e6bdd572ae1f727c410438f7fcb0058d8995e283d638e87bc3d5745e8f0dd079,2024-11-21T08:34:49.050000
|
||||
@ -242651,7 +242651,7 @@ CVE-2023-6266,0,0,a56f8b494bda94a0aea5fc951b820c3c14cb27f985c2c86369168d4567d8fd
|
||||
CVE-2023-6267,0,0,dee65e356e3e4276e2c163d1c8301624af12daba4da3110a5be52bd415de11eb,2024-12-04T08:15:05.740000
|
||||
CVE-2023-6268,0,0,211e77c9038368c185afb02eac588148c8912da350a3688df0a8570fb54e308d,2024-11-21T08:43:29.870000
|
||||
CVE-2023-6269,0,0,67ef793edb72877a7d3f1597c65d7c44418af3bd0b7297fa5b905dfee1679e58,2024-11-21T08:43:30.003000
|
||||
CVE-2023-6270,0,0,bfa2c5bb5ca49d110cf1c3cbd179c0891b73fd622409b7e41a64036792370f17,2025-02-07T03:15:11.343000
|
||||
CVE-2023-6270,0,1,b7bc70b74775d4820a0d6d012aaa6a20ca47ed449c305f55b63f1edf3e237b9e,2025-04-14T19:15:35.987000
|
||||
CVE-2023-6271,0,0,8057d9ccc6615e620875739d3904e834eb75d213db28db688ffee4f2d4790ffb,2024-11-21T08:43:30.287000
|
||||
CVE-2023-6272,0,0,3fc4906dc85e0b8f98c1a259145ab5ec81e3d0f9a535435ba0d783a104185b22,2024-11-21T08:43:30.430000
|
||||
CVE-2023-6273,0,0,e98e41e43b3e02fb3d0c68ded91da1038332fe84dc6c5332314484fb8e0dc295,2024-11-21T08:43:30.567000
|
||||
@ -245639,7 +245639,7 @@ CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1b
|
||||
CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba9086e,2024-11-19T16:57:05.407000
|
||||
CVE-2024-11153,0,0,2321d1793b69525de6f4a4d3f88085fe7c8f1bb3b37043628cd90ec3588a5ec0,2025-03-05T12:15:33.287000
|
||||
CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000
|
||||
CVE-2024-11155,0,1,052c61e99e95a82c920bf0a28ba4d9ace2739edc7c5666c6f1cd9b278dea1f3a,2025-04-14T17:17:56.877000
|
||||
CVE-2024-11155,0,0,052c61e99e95a82c920bf0a28ba4d9ace2739edc7c5666c6f1cd9b278dea1f3a,2025-04-14T17:17:56.877000
|
||||
CVE-2024-11156,0,0,ea1fe2a973d15fdece4824e57dc16a1bcfe810ffcf2d9b4d711f82a25c787244,2024-12-17T15:52:01.670000
|
||||
CVE-2024-11157,0,0,df33e9a0f4a9b390ecb9240cbdbdf1c3e5a1def95dca302c1c42721e22c790c9,2025-03-13T16:15:15.230000
|
||||
CVE-2024-11158,0,0,0ec2e032c800eeccdddd66a360ae2c93b294138f148b8ff83949f00ed1c4087a,2024-12-06T17:15:07.970000
|
||||
@ -245932,7 +245932,7 @@ CVE-2024-11443,0,0,b1e1426998d283f5f97b1a941caf6cbb78096874880f807e7ae5caada1ad2
|
||||
CVE-2024-11444,0,0,18f08a8b9d89a6b1657bb8fc8be414487944593dc8b5fd0eb0cfac993932f20a,2024-12-06T09:15:06.977000
|
||||
CVE-2024-11445,0,0,a347cf67205be52aae36bfe92cb5dd9743dcadfa446beae76cc8e5f6e3835ca7,2025-01-07T05:15:13.077000
|
||||
CVE-2024-11446,0,0,9324a77eacac49b9db503ff17f0de8de50ddb46f09871e23b3695c4980427c7d,2024-11-23T07:15:04.820000
|
||||
CVE-2024-11447,0,0,bd53c50380b55196efb74cff3fad5c24687f184135cfde8b6a52ffe6934cf7cf,2024-11-21T13:57:24.187000
|
||||
CVE-2024-11447,0,1,d14583243680571c01ce0f6d0f78069f068b99e3fc4c09adf89bffd6d642f2ba,2025-04-14T19:15:36.150000
|
||||
CVE-2024-11449,0,0,b8ce17b8d2a020799b0e494955e78268038cd3884d778a9679377986da3420c5,2025-03-20T10:15:25.223000
|
||||
CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e4176804,2024-11-21T08:49:54.097000
|
||||
CVE-2024-11450,0,0,d9225aed2ac8475bb91c6ace69e4cc88aaeb28d7907e757183e21dfd957a870f,2024-12-06T09:15:07.137000
|
||||
@ -246828,7 +246828,7 @@ CVE-2024-12331,0,0,6c6e9b90da53ab4f2635b2c568c68cfa4d017be1088f155d7e21d426ea9a2
|
||||
CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4dbf02,2025-01-07T05:15:18.687000
|
||||
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
|
||||
CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000
|
||||
CVE-2024-12335,0,0,eeca78c8317a814f826d56ee540d8dc839b681e179f3600a01323f3602cd3147,2024-12-25T07:15:11.980000
|
||||
CVE-2024-12335,0,1,c295e9d71a165ac343237ed6990a48512631c0c750c4a7727444a7e0f7ed6513,2025-04-14T18:38:36.037000
|
||||
CVE-2024-12336,0,0,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000
|
||||
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
|
||||
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
||||
@ -246972,7 +246972,7 @@ CVE-2024-12473,0,0,206297f672a09c7681b3d1cbb4c368e1c0a3b16d868ed8e1c0293957039b0
|
||||
CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000
|
||||
CVE-2024-12475,0,0,2f8326227abf89a4a2831662ce583580a9308faf5c2c5bd3ecb436043a083ae0,2025-02-25T22:46:02.480000
|
||||
CVE-2024-12476,0,0,06d3aa7d2355b9fb548ba30903d1f2d17b1d51111a3fbced38c72a71808528bd,2025-01-17T10:15:07.013000
|
||||
CVE-2024-12477,0,0,1aba73bab80b5f82fe24b2f1ca82daeb2d76802917998c39031ac4b5551fbb0d,2025-01-22T22:15:08.683000
|
||||
CVE-2024-12477,0,1,2c2e1027bae7279c4e2fede3e9fc01b70a9d9ea2cf47ea4dbd21146fca5b9df4,2025-04-14T18:38:40.160000
|
||||
CVE-2024-12478,0,0,bb1ef88a917aed790962755c18f5940408d868b49157724e8a00ba6d33e99a63,2024-12-16T11:15:04.890000
|
||||
CVE-2024-12479,0,0,59070be7fca9f3511d05b51e20d8f96c462832f58b753a650e6e12660dc52a08,2024-12-13T17:10:45.860000
|
||||
CVE-2024-12480,0,0,a5279943aa44c6186255f31a29a36934ac4bcd60912bfb832e65da71fe2d3761,2024-12-13T17:11:08.800000
|
||||
@ -247814,7 +247814,7 @@ CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca6713
|
||||
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
|
||||
CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000
|
||||
CVE-2024-13343,0,0,640200c7757a0fe07b53b1ed98de77b765153c818110e07c8a501ce037c2ed28,2025-02-24T16:21:30.933000
|
||||
CVE-2024-13345,0,0,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000
|
||||
CVE-2024-13345,0,1,a640fd9876793e95b29434a24ad70ebda6dcba0b988265d19a541017946a886d,2025-04-14T19:07:59.540000
|
||||
CVE-2024-13346,0,0,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000
|
||||
CVE-2024-13347,0,0,8197496b84b4f63e5f628ac44a938501b5b9645038227a34fbe39dbe2ebdef45,2025-02-03T16:15:32.580000
|
||||
CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000
|
||||
@ -263903,7 +263903,7 @@ CVE-2024-38984,0,0,2b479628f29ebd45adcd8a5caf6913dde07fd154c7e2005f9252d659b08e0
|
||||
CVE-2024-38985,0,0,a1e214ee0bc813a289acf917e491e5dbfbfdc8b23fa3a5b3063c6f65fae5a8d4,2025-04-01T20:26:30.593000
|
||||
CVE-2024-38986,0,0,e3d8b5578e820ed169b54b5d3d475ce0d98dc94831a9245b278493a3468d803d,2024-11-21T09:27:02.613000
|
||||
CVE-2024-38987,0,0,f9d8e9a22d9ef04171295b20085a760b39c7d10e768785f425e47a881c5c599a,2024-11-21T09:27:02.847000
|
||||
CVE-2024-38988,0,1,1f88b02498d88baad1d1bfaca5eace6dceca9097feaf1c96a829fb8735ef1dbc,2025-04-14T16:58:20.987000
|
||||
CVE-2024-38988,0,0,1f88b02498d88baad1d1bfaca5eace6dceca9097feaf1c96a829fb8735ef1dbc,2025-04-14T16:58:20.987000
|
||||
CVE-2024-38989,0,0,1d2ecdafa56240b5a583bb368c389c5a8fdf57bdc1b9172c4284561b4636d6c4,2024-08-13T14:35:23.670000
|
||||
CVE-2024-3899,0,0,340116e2af643c79a77ce4bb339669e37ac57aee73d7bdf4365cb70a15a720e2,2024-09-25T19:37:28.347000
|
||||
CVE-2024-38990,0,0,560b97a0b199ba787c98e58b54f17a37af596ef0b2f066d9b4a16d2e354a81da,2024-11-21T09:27:03.307000
|
||||
@ -266195,7 +266195,7 @@ CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce1
|
||||
CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000
|
||||
CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000
|
||||
CVE-2024-42195,0,0,c65de58c728753f86038d98c371fbbe3457add02821d0b6bcc2d79ecc064624f,2024-12-05T05:15:06.923000
|
||||
CVE-2024-42196,0,1,86572e299010ed9c933dd6e15fc8f817087307b7b1acb778fb2306342762ea6d,2025-04-14T17:16:43.817000
|
||||
CVE-2024-42196,0,0,86572e299010ed9c933dd6e15fc8f817087307b7b1acb778fb2306342762ea6d,2025-04-14T17:16:43.817000
|
||||
CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000
|
||||
CVE-2024-42207,0,0,7999bd374d3d2e00ca96b064d6050023c869b6b304031749819fd6f354ea6a70,2025-02-05T16:15:40.447000
|
||||
CVE-2024-42208,0,0,7279db8edf90469f45fbe58ad50ae0f2729b6abb33262abb49e045282c050905,2025-04-07T14:18:15.560000
|
||||
@ -268122,7 +268122,7 @@ CVE-2024-4466,0,0,e3cd45fefb4caa578c3a777906a4e9abf96ac1bf88640e5b948697edef383b
|
||||
CVE-2024-44667,0,0,c45d991e3e5755dd4bd6b2799c96326bd2bc462b166e82b876732032251f93de,2024-10-29T16:35:13.953000
|
||||
CVE-2024-4467,0,0,7435e1edc5d4ab53fd884338611646eb141c365df221a6cdc5952ed1cc1b40c2,2024-11-21T09:42:52.947000
|
||||
CVE-2024-44674,0,0,8f3b6a67fdb91e214bdd072812af3c2ef73dbb26bddf629694102a0acec11013,2024-10-10T12:57:21.987000
|
||||
CVE-2024-44676,0,1,55ab6e98b8fb2e8335512299f61d6769af2afb3969ae52f7abdf08cf622b282d,2025-04-14T16:15:21.090000
|
||||
CVE-2024-44676,0,0,55ab6e98b8fb2e8335512299f61d6769af2afb3969ae52f7abdf08cf622b282d,2025-04-14T16:15:21.090000
|
||||
CVE-2024-44677,0,0,24a9b30edcad0e8b0934ed12413b84eb3d707e3ac15d231423ec510aa6108a27,2025-03-31T16:15:22.023000
|
||||
CVE-2024-44678,0,0,7c6040aac76a55faa1753224a581817a4c40d04b0f0585acd275b3cb0ea8d66e,2024-09-26T14:35:14.687000
|
||||
CVE-2024-4468,0,0,1383fb38e9227b7082c0937002dbe6ccafb8a608544c11ad11010665c5c95871,2024-11-21T09:42:53.103000
|
||||
@ -271694,7 +271694,7 @@ CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87df
|
||||
CVE-2024-49694,0,0,0d6f13ba9d257598e8b2ef9ba3d33dc447bfa87d7e595941924aca91bd604a70,2024-12-31T14:15:23.567000
|
||||
CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000
|
||||
CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000
|
||||
CVE-2024-49697,0,1,8edf125b6dcc0c56a0ecf5edbad7a23597585a93ad1aa99485ab96cc9b5c7975,2025-04-14T17:15:40.523000
|
||||
CVE-2024-49697,0,0,8edf125b6dcc0c56a0ecf5edbad7a23597585a93ad1aa99485ab96cc9b5c7975,2025-04-14T17:15:40.523000
|
||||
CVE-2024-49698,0,0,0da674ff14e9a1aa3e4bc23d228b70f80e183926d4686276e19237b19658e09f,2024-12-31T14:15:23.697000
|
||||
CVE-2024-49699,0,0,4ee8c413bed1ffd4b90762f39700b8d457afb872cbe86f74864072dd78b97b85,2025-01-21T14:15:08.780000
|
||||
CVE-2024-4970,0,0,79daa602151eaacf2520b960e10e3437c5c7370ad2718a07f80b855f1b69edf7,2025-03-18T15:15:56.680000
|
||||
@ -273888,7 +273888,7 @@ CVE-2024-52528,0,0,ff7c16712b6df183b147377b5849c584a768523b1a438e5a1199bfd0ec3a4
|
||||
CVE-2024-52529,0,0,f2152dc699404c65c6350f1136db6560eb4c1af2e85d3b560a72e983b9325dad,2024-11-25T19:15:11.373000
|
||||
CVE-2024-5253,0,0,1657e31acfec571fc82edab6f57778f4c0555b9d202f3de084a32febca005660,2024-11-21T09:47:16.950000
|
||||
CVE-2024-52530,0,0,78f036a07a80d7c50933eab4b5ec3e54640dd9a8e9ce77e883bfb2118e573bf2,2024-11-12T19:35:14.927000
|
||||
CVE-2024-52531,0,1,52f7fee15ac5b4d92182adca222fd7d370f8c0a649856ad592d22aa5cc68783f,2025-04-14T16:15:21.263000
|
||||
CVE-2024-52531,0,0,52f7fee15ac5b4d92182adca222fd7d370f8c0a649856ad592d22aa5cc68783f,2025-04-14T16:15:21.263000
|
||||
CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000
|
||||
CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000
|
||||
CVE-2024-52534,0,0,5d1ce3a10ece7acac704b059e3e790cd8501a0b08318bc1cc5ddf348b08718b9,2025-01-21T21:30:49.030000
|
||||
@ -275237,7 +275237,7 @@ CVE-2024-54353,0,0,dd34844cbe46ba216dd652066cf81c78e597247fdfc1687bd349b0754db2c
|
||||
CVE-2024-54354,0,0,91a14d67b05a45986abf745187ade61d55bbfe0ef319eacda8f93e7ab1d79ada,2024-12-16T15:15:08.023000
|
||||
CVE-2024-54355,0,0,1dd4f617f04a945911b443ce200b1bf8ecff1a5e5836731bb31fd179f9dbd431,2025-02-07T21:15:55.463000
|
||||
CVE-2024-54356,0,0,93290ea2762a14aa5a937e3188f8faa9f26e220a25a3d68bf34b89e3aade9072,2024-12-16T15:15:08.327000
|
||||
CVE-2024-54357,0,1,c0bdc47f82005a53a6c6322da4a0bfbf11188cb6228c0a923f6ae0c07173e0fe,2025-04-14T17:47:41.763000
|
||||
CVE-2024-54357,0,0,c0bdc47f82005a53a6c6322da4a0bfbf11188cb6228c0a923f6ae0c07173e0fe,2025-04-14T17:47:41.763000
|
||||
CVE-2024-54358,0,0,a842eb8c4d982c3f6b6ba6fafcc1cc007bf9181467d6f3e1dd7670ce09fa5b97,2024-12-16T15:15:08.477000
|
||||
CVE-2024-54359,0,0,fa0a9f20451ac7e0c36ba20018c12a0ec4833a93fa93fc8eddd26232eff57623,2024-12-16T15:15:08.630000
|
||||
CVE-2024-5436,0,0,16a2d2f1a9a3d9d246e525c05e5f6ef4140f57c182ceaa616ff131de2cb2ad61,2024-11-21T09:47:40.917000
|
||||
@ -276249,7 +276249,7 @@ CVE-2024-56366,0,0,d5f4b2ea22f0419692e9270808dd32d846291e682aebecd1ad0cf8fe87179
|
||||
CVE-2024-56368,0,0,3fcf15405e5d098a7d36ecb9520617c7fca5345251aca6249179f3e1c86517d0,2025-01-11T13:15:28.530000
|
||||
CVE-2024-56369,0,0,3c8472717567d8bf18ec0d8e83a626d55afe4bbcb99b2a53e44807eb7ad97aa3,2025-01-16T15:18:59.237000
|
||||
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
|
||||
CVE-2024-56370,0,0,ce14819494aa936a1773c7b95a14450195e5c6e22320bf54416e42fb43326c09,2025-04-07T14:17:50.220000
|
||||
CVE-2024-56370,0,1,64814417007881b32dae98a1a224beb7cfa2766c91befe86144583f2dc1808a5,2025-04-14T18:15:28.220000
|
||||
CVE-2024-56372,0,0,90a1aabf121e4966bb6f781ef40b9ea4a8ff306749512dfc68df7e160a9b150b,2025-01-11T13:15:28.873000
|
||||
CVE-2024-56374,0,0,91d6bf2640ab08f01eee0fcea596536908a920126e7285157c89b5a637fa554c,2025-01-23T18:15:32.820000
|
||||
CVE-2024-56375,0,0,1aeae50409e14309fb31af7dcf320eae7189e473177b68d63698866c2c62cd0b,2024-12-26T06:15:06.203000
|
||||
@ -276702,7 +276702,7 @@ CVE-2024-5697,0,0,3f6f305190b00f418c296d7a71b9e9a68afa7dc5c4f3062a64a5e9b3e1dc9b
|
||||
CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000
|
||||
CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000
|
||||
CVE-2024-56973,0,0,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a4718db,2025-02-28T17:15:15.730000
|
||||
CVE-2024-56975,0,1,cdbce549c797deaab9f5beceb2f5fa6de34a30503d76092e0b12c94d830db472,2025-04-14T16:50:35.247000
|
||||
CVE-2024-56975,0,0,cdbce549c797deaab9f5beceb2f5fa6de34a30503d76092e0b12c94d830db472,2025-04-14T16:50:35.247000
|
||||
CVE-2024-5698,0,0,44127f605325468d176f78917e01b48d4267668ec2c2568286216f422611e552,2025-03-14T02:15:15.520000
|
||||
CVE-2024-5699,0,0,1730c9027af76599da8d9065a8791c28c158ddf15d1c6df442aeda60bd4e144e,2025-04-04T16:30:29.173000
|
||||
CVE-2024-56990,0,0,90cecded0a71bf0c80923b223f7ed0199d6838bdd7d486a962bdef62d3b96ecf,2025-04-09T18:33:54.980000
|
||||
@ -276770,7 +276770,7 @@ CVE-2024-5708,0,0,25e2c30193dfb4957684cadce32071c580f38d44486d23009495a71d10efa7
|
||||
CVE-2024-57080,0,0,ed4464ba7930048d62a3426c26c5515301e6750f4a9c17de192f847c86cb0b80,2025-02-06T17:15:19.933000
|
||||
CVE-2024-57081,0,0,c5739c97e1b2c277d19e10adea0e9ee3108f879aff403a774fc0612111bd1d0f,2025-03-19T19:15:43.663000
|
||||
CVE-2024-57082,0,0,e4f71ce57a79c34c72f0ce234fbf504f73bfa623a35d6784e5d6f316dc7db45f,2025-02-18T20:15:22.483000
|
||||
CVE-2024-57083,0,1,ba7569de8e4a1c789769eec196233d14a6c97c94eee5252207f259fef2be2df8,2025-04-14T17:02:15.813000
|
||||
CVE-2024-57083,0,0,ba7569de8e4a1c789769eec196233d14a6c97c94eee5252207f259fef2be2df8,2025-04-14T17:02:15.813000
|
||||
CVE-2024-57084,0,0,184ce2bdca2221f2a823d18b34616bf9939630c2fe93ea49ee84bec6316efcf3,2025-02-07T16:15:37.847000
|
||||
CVE-2024-57085,0,0,634cffae63828436ad94c08214f44949e421dc94322a29aafeb5b2dc9ced2d4d,2025-03-13T20:15:24.300000
|
||||
CVE-2024-57086,0,0,135d1edb19b1262b9b20dbcd6b814388e529b0c3b7b36d652139ce6df6ff31a0,2025-02-06T17:15:20.073000
|
||||
@ -282364,7 +282364,7 @@ CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb7
|
||||
CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000
|
||||
CVE-2025-1663,0,0,462dc23e32e49984463774da56be0340fc6f3e61c911b7836bbaa495aeeb2963,2025-04-10T14:02:22.313000
|
||||
CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000
|
||||
CVE-2025-1665,0,0,63cabb6f41837b33f13983b20583641fb3181b6051f70dc82808e60815954528,2025-04-10T14:28:40.157000
|
||||
CVE-2025-1665,0,1,79554c82071a0c578757ae358fcb4186eecb3930b030e97be9199a317074f4f7,2025-04-14T19:07:49.010000
|
||||
CVE-2025-1666,0,0,578bd41069680734171dab8b0d965c7a5d9feef84ecb4800477ec06c1e88653d,2025-03-06T12:15:36.117000
|
||||
CVE-2025-1667,0,0,0a7578ad0c7de4d6aeb33733f4906f5ca6d53d4d71b45718607596d6bed0ce27,2025-03-28T12:46:27.840000
|
||||
CVE-2025-1668,0,0,51872b214b29dcfd1d58c5e83dbd465e59464d6e1f327131cfd988223f71874e,2025-03-28T20:00:14.300000
|
||||
@ -282432,6 +282432,7 @@ CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae5
|
||||
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
||||
CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000
|
||||
CVE-2025-1781,0,0,822d9dd7d94e5b498257a849d2a77ab936366d257a4d3fe0593c5d9951a3a28b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-1782,1,1,9e4b6e5afda3df9e20ead7d1e23f261058ffd7ba010d8bba7225e405e1896333,2025-04-14T19:15:36.277000
|
||||
CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000
|
||||
CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000
|
||||
CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000
|
||||
@ -282782,8 +282783,8 @@ CVE-2025-20658,0,0,48cc61399a1137f56a7e13c5419a4820632c258391c4f1a0be279a15efa0a
|
||||
CVE-2025-20659,0,0,cd918ab99aaf5ef9627fc17f3740592b1c5df51d9de08fa8c020c6cc06a0e2c4,2025-04-11T13:06:13.850000
|
||||
CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000
|
||||
CVE-2025-20660,0,0,9420ec05452fe26a997974ddd4112cf9ab6222cae6a669e6290ce0de00f9b5d4,2025-04-09T19:15:47.560000
|
||||
CVE-2025-20661,0,1,f62962e9996c25907c5dd2d9f228505030ba0c85cf3fb77b1ba46ec8dc3f4556,2025-04-14T16:36:48.130000
|
||||
CVE-2025-20662,0,1,12aa5c5a0a2a4254a5cd5d0284932b03688b985d4a6e164fb473eeea68ae8941,2025-04-14T16:31:19.480000
|
||||
CVE-2025-20661,0,0,f62962e9996c25907c5dd2d9f228505030ba0c85cf3fb77b1ba46ec8dc3f4556,2025-04-14T16:36:48.130000
|
||||
CVE-2025-20662,0,0,12aa5c5a0a2a4254a5cd5d0284932b03688b985d4a6e164fb473eeea68ae8941,2025-04-14T16:31:19.480000
|
||||
CVE-2025-20663,0,0,596335f6a6120390f38a326693e2ad25807954564d3cf32daf45c2adaccfa901,2025-04-11T15:57:27.597000
|
||||
CVE-2025-20664,0,0,4219106895903f3d40c45e3fe22a99bb379c7467ce7ddab134c6f372463f3577,2025-04-11T15:52:40.517000
|
||||
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
||||
@ -283943,9 +283944,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
|
||||
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
|
||||
CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000
|
||||
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
|
||||
CVE-2025-22371,1,1,c82830eff61f786f4a41d520ced8b7d97f0fc968b9dca6d64ac8c8f5a8062949,2025-04-14T16:15:21.450000
|
||||
CVE-2025-22372,1,1,62059b0e6f5e800c7b741753fa399f925400e0a9d52baf43c329020697384563,2025-04-14T16:15:21.630000
|
||||
CVE-2025-22373,1,1,f58fa4b3cb6c5107efeaee8c66737066f251b2bcb6143590f5a88cee310c3f63,2025-04-14T16:15:21.767000
|
||||
CVE-2025-22371,0,0,c82830eff61f786f4a41d520ced8b7d97f0fc968b9dca6d64ac8c8f5a8062949,2025-04-14T16:15:21.450000
|
||||
CVE-2025-22372,0,0,62059b0e6f5e800c7b741753fa399f925400e0a9d52baf43c329020697384563,2025-04-14T16:15:21.630000
|
||||
CVE-2025-22373,0,0,f58fa4b3cb6c5107efeaee8c66737066f251b2bcb6143590f5a88cee310c3f63,2025-04-14T16:15:21.767000
|
||||
CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
||||
@ -284387,7 +284388,7 @@ CVE-2025-22946,0,0,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0
|
||||
CVE-2025-22949,0,0,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000
|
||||
CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000
|
||||
CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000
|
||||
CVE-2025-22953,0,1,896202a92bc4e81573a181abe43e13a256b4f76cd537c33ed770f6710b437772,2025-04-14T17:04:43.747000
|
||||
CVE-2025-22953,0,0,896202a92bc4e81573a181abe43e13a256b4f76cd537c33ed770f6710b437772,2025-04-14T17:04:43.747000
|
||||
CVE-2025-22954,0,0,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000
|
||||
CVE-2025-22957,0,0,78c986249320701d31e3769659f247864a435f5c1d673688267deb95bbf3701f,2025-03-20T16:15:16.223000
|
||||
CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000
|
||||
@ -286297,7 +286298,7 @@ CVE-2025-25685,0,0,204deb7c4ce53f6e492fa281d6e8bf3f8c2d8728cd8c95a39540e1d64c356
|
||||
CVE-2025-25686,0,0,4572059816c223b003dcfdffbac57f4eb8534757a2fb6cbc63605046c3c8e752,2025-04-11T17:34:10.580000
|
||||
CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000
|
||||
CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000
|
||||
CVE-2025-2572,1,1,fb1a492d5086b044977a3e6e27c34bc8559119305596b638b1783809a335267a,2025-04-14T16:15:21.903000
|
||||
CVE-2025-2572,0,0,fb1a492d5086b044977a3e6e27c34bc8559119305596b638b1783809a335267a,2025-04-14T16:15:21.903000
|
||||
CVE-2025-25723,0,0,e8c9c3b7ce8a94391f1e2d0696694643f2079bf2d5039cbd8233d30f1078ac40,2025-04-03T19:15:39.403000
|
||||
CVE-2025-25724,0,0,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000
|
||||
CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000
|
||||
@ -286446,8 +286447,8 @@ CVE-2025-2604,0,0,e75cd0b194a020065e4073d6e30a4bfdc2dcd331c1b113d864b29601f6499c
|
||||
CVE-2025-26042,0,0,85a28b259be921f0181d0669d9f2dc35f0096c1bd80ef77e40d4ac92a2f60a88,2025-03-19T19:15:46.587000
|
||||
CVE-2025-26047,0,0,e5f969b85e25d20e576d529c079698dda076726cc7fa9835a0c501d496a29bb3,2025-03-06T21:15:15.623000
|
||||
CVE-2025-26054,0,0,7af97027ebd841f2944a0f16c23d07f8150f5fc7449aca0f5ece9086fab14196,2025-04-02T15:15:58.170000
|
||||
CVE-2025-26055,0,0,6ba3a5ff1603a03a721f91e76d70ff6cb191be28dd3d26a30f1f49a87df4a3b9,2025-04-01T20:26:01.990000
|
||||
CVE-2025-26056,0,0,879e3f7b4ce5e0934b97900be46e4bfeac459c8ad0fa09ac5afb4cfdc507fe37,2025-04-01T20:26:01.990000
|
||||
CVE-2025-26055,0,1,7517d1d36429deae562bd8473305c366d152cbf30a37d4cc36a8d0384717f03b,2025-04-14T18:15:28.427000
|
||||
CVE-2025-26056,0,1,22307cccd8e7831aaf1eca3f1fecf0a9d85074aa34ef8668ee4f3a447050e8cd,2025-04-14T18:15:28.560000
|
||||
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
|
||||
CVE-2025-2606,0,0,443cc3352092d2b10fc06d9cda463fed58074d11c52e405e87198504ec291bc0,2025-04-01T20:23:34.950000
|
||||
CVE-2025-2607,0,0,1597ffd2cb1ffa35e1e76acba708a8bd026607d0f9e02bb3e06ecbbccfee78bd,2025-04-01T20:15:25.810000
|
||||
@ -287471,7 +287472,7 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f
|
||||
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
|
||||
CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000
|
||||
CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000
|
||||
CVE-2025-27829,0,0,4fc397294f885b2e6e1939041abb83ec325fb463d987bff0e1de9d8968700828,2025-04-01T20:26:01.990000
|
||||
CVE-2025-27829,0,1,9ae86cabd1b5a8793e47645f5ed6e4bec7bf508d33296df63c4497b12aa63bd8,2025-04-14T18:15:28.697000
|
||||
CVE-2025-2783,0,0,cac125e06bdfcf5101179da397d83671a8e22970d5207dd362f2ac73d6465a33,2025-03-28T01:00:02.260000
|
||||
CVE-2025-27830,0,0,da10ce085c8af9893377a339d8c2cf0db7181ab295e76a10e0b8a5e6254179ce,2025-04-01T16:44:47.883000
|
||||
CVE-2025-27831,0,0,20a09452fdf20ea8bab418fed7140a2da100bb81bab554c4fa024a15bb4ab558,2025-04-01T16:44:41.537000
|
||||
@ -287527,7 +287528,7 @@ CVE-2025-28131,0,0,0e6d437e3a9f63309173cfffb683667f8de949bf1baa410130154ac273821
|
||||
CVE-2025-28132,0,0,97b47f11d67eb8801e01a6ba8c51fcb6171d404dc753f2ff5e62dc9c1e96c78b,2025-04-01T20:26:01.990000
|
||||
CVE-2025-28135,0,0,7449f9051b2ad40e6745f4f6c08227d8fea8f82a860e15e195996f87478458da,2025-04-09T15:02:47.443000
|
||||
CVE-2025-28138,0,0,8ed5c668c7f04199b0e31f157584391bfd9c3eaae3c411512244bce07afe9a64,2025-04-01T15:41:38.770000
|
||||
CVE-2025-2814,0,0,24dd3f850b5037e2f6fb21610bc7e19212e7d5ccf0ce47c53e7fcf5a64e082a6,2025-04-13T00:15:14.997000
|
||||
CVE-2025-2814,0,1,fe35312828b90412de0bd1968a4c25c459e77fa2c9b3af1c8111a581e1015421,2025-04-14T19:15:36.543000
|
||||
CVE-2025-28146,0,0,d143105b99c160ecdaa5df146d2180f0b9f633071a182bc6664e17a9d59ee46e,2025-04-07T15:15:43.200000
|
||||
CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
|
||||
@ -287538,7 +287539,7 @@ CVE-2025-28221,0,0,1cdeba30d62084850cf0d8eff272f185c9ba4c18571670ea23e9f95692731
|
||||
CVE-2025-2825,0,0,e4db2ec87b94dcda703a7cb29d9641a787a1d84d05d6f964d3ea9c8b54dfc722,2025-04-04T20:15:17.507000
|
||||
CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000
|
||||
CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18
|
||||
CVE-2025-28256,0,1,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
|
||||
CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000
|
||||
CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000
|
||||
CVE-2025-2832,0,0,4793b0e61870dc2623c9525ce0b6e978786dc9b055c079ba680182ca85609996,2025-04-11T16:25:55.093000
|
||||
@ -287548,8 +287549,8 @@ CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f12761
|
||||
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
|
||||
CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28395,0,0,0b40a416a218e6c01b7cb1ba46e4dc6848bfe477454cb6615391e01d92782937,2025-04-01T20:26:11.547000
|
||||
CVE-2025-28398,0,0,c95f80956b5084d07fb2747a442752f0efe561eb31efab8ad7383780b7c9c8aa,2025-04-01T20:26:11.547000
|
||||
CVE-2025-28395,0,1,787acf6514abb8a3a80c4bce46febca1493172cc64b611845553a9003726f018,2025-04-14T18:15:28.833000
|
||||
CVE-2025-28398,0,1,a2165cc7a8a87e902702dee4b645778bcee1de648071e795add12a5949a33fef,2025-04-14T18:15:28.970000
|
||||
CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000
|
||||
CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000
|
||||
CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000
|
||||
@ -287731,7 +287732,7 @@ CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9
|
||||
CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000
|
||||
CVE-2025-2919,0,0,b96ce7ce0f34936fb136f2b1ffc6459c07bdc587830fdf6a756fc40e2dfb516f,2025-04-01T20:26:39.627000
|
||||
CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000
|
||||
CVE-2025-29208,0,0,e7940f17c2424fa5073e8fed86fd8b2314b33d9aaf3f0f884fc7a6e3d0e7a338,2025-04-01T20:26:01.990000
|
||||
CVE-2025-29208,0,1,67e2605039ee3d1f3c5ea9f6fc4b9f6bb3ff72ecfc77443b4593d17db1d38ecf,2025-04-14T18:15:29.100000
|
||||
CVE-2025-2921,0,0,d4bcd9d1bb65075ea7939e905e49c36e22f8a771b8d05601490e3dfa0958d0cf,2025-04-01T20:26:39.627000
|
||||
CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000
|
||||
CVE-2025-29215,0,0,96e2f565718ae35623a5dad2291d2bb27d05c2c10bebe7c06ba56599d76124a9,2025-03-25T17:38:20.710000
|
||||
@ -287747,7 +287748,7 @@ CVE-2025-2924,0,0,15ec772a247e663d3b410bf382b3b4282d830baaa171ae147c6377e4ede349
|
||||
CVE-2025-2925,0,0,57c779cb80b04dea98d1306bb52a4ba039c948f0dfa18686d63a5c924ae12060,2025-04-01T20:26:39.627000
|
||||
CVE-2025-2926,0,0,3e72a087e763323bf5856d294592139ea832180777dddbb463811921e15208e3,2025-04-01T20:26:39.627000
|
||||
CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2927,0,1,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
|
||||
CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
|
||||
CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000
|
||||
CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000
|
||||
CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000
|
||||
@ -287839,7 +287840,7 @@ CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254
|
||||
CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000
|
||||
CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000
|
||||
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
|
||||
CVE-2025-29720,1,1,02abef02eeb22d98169bd4eb4e20b4fe165e198f2798dedc634de352a637bcc0,2025-04-14T17:15:26.880000
|
||||
CVE-2025-29720,0,1,dec2fea37388ec256b86edf330b85cb2a065c1d575063f1641a82d140ae2d4ef,2025-04-14T19:15:36.413000
|
||||
CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000
|
||||
CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000
|
||||
@ -288080,16 +288081,16 @@ CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff
|
||||
CVE-2025-30282,0,0,a17dd9832b027f03ba6a75d738edfc9d501eb453a9d5c6408c6b0cc08654cbf6,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30284,0,0,8e53e1c7c93960fd053bcc2c17b6442972477767d5d61a97f5c87a3737a9b037,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30285,0,0,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30286,0,1,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000
|
||||
CVE-2025-30287,0,1,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000
|
||||
CVE-2025-30288,0,1,2b95720ab33f0ae9e65c099b6f773af38954863679de5e5b091d1ba280f6467f,2025-04-14T17:48:04.153000
|
||||
CVE-2025-30289,0,1,9fc7026028e87daa0c60e09cd296082ef1d8e393acbb07e39b5917b3f5121227,2025-04-14T17:50:37.680000
|
||||
CVE-2025-30286,0,0,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000
|
||||
CVE-2025-30287,0,0,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000
|
||||
CVE-2025-30288,0,0,2b95720ab33f0ae9e65c099b6f773af38954863679de5e5b091d1ba280f6467f,2025-04-14T17:48:04.153000
|
||||
CVE-2025-30289,0,0,9fc7026028e87daa0c60e09cd296082ef1d8e393acbb07e39b5917b3f5121227,2025-04-14T17:50:37.680000
|
||||
CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000
|
||||
CVE-2025-30290,0,0,6f893833437291deb8fbb2322de2982f9eef638dfc164661994353e52e717a27,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30291,0,0,0473260a55bcbc254e4050f9189e3db07faeb587413b0e155bd3d64489f7efa3,2025-04-14T15:26:47.470000
|
||||
CVE-2025-30292,0,0,3e4f7c22f08308c313ba2352bafd20592d5f6ffab99962cdfee668ba5f921588,2025-04-14T15:57:32.107000
|
||||
CVE-2025-30293,0,1,5cee6de0f2729915a4b48fb8017b82d7635a11dd876e7789f985387d8822ed2d,2025-04-14T16:01:39.640000
|
||||
CVE-2025-30294,0,1,603fe387e2c7de1939ff5cbe24c6e8e03492f6ee8c747b93804aa12928c97bb9,2025-04-14T16:05:16.407000
|
||||
CVE-2025-30293,0,0,5cee6de0f2729915a4b48fb8017b82d7635a11dd876e7789f985387d8822ed2d,2025-04-14T16:01:39.640000
|
||||
CVE-2025-30294,0,0,603fe387e2c7de1939ff5cbe24c6e8e03492f6ee8c747b93804aa12928c97bb9,2025-04-14T16:05:16.407000
|
||||
CVE-2025-30295,0,0,dc143ca0187d672e7c6ff588d91b302f09c8ef01a93f1300ec72037012254c74,2025-04-11T12:49:05.523000
|
||||
CVE-2025-30296,0,0,d7e73be7425b9e4e00a6b9dff79676441c0907a978176fbd95fd7d3793c06947,2025-04-11T12:48:57.520000
|
||||
CVE-2025-30297,0,0,956e4e25be750755bccfd8faa4814a05be03e3044492c2467838e4b6ff2f0ef2,2025-04-11T12:48:50.323000
|
||||
@ -289607,7 +289608,7 @@ CVE-2025-32765,0,0,dcbcde62fdff401d6533083c6f6475fe8bd86ab5cb293984e4392a0da2ab5
|
||||
CVE-2025-32767,0,0,3f90274095229f98e0603e497c72fd5bfc736bd7fb12ec110e8b26192048e083,2025-04-11T03:15:14.843000
|
||||
CVE-2025-32768,0,0,1483cae31959254bcbeeb62a75a0342f9f3ab05a573151c7b742065596351ca3,2025-04-11T03:15:14.893000
|
||||
CVE-2025-32769,0,0,d87af69c16786e74cfa8fd841dc8a47858c4cb266f0b38fc887bc94a573abbed,2025-04-11T03:15:14.943000
|
||||
CVE-2025-3277,1,1,697bebc20ca69fae2ecf33ec55b9ca260b081176fd8d8a13757f0e5bcd825530,2025-04-14T17:15:27.297000
|
||||
CVE-2025-3277,0,0,697bebc20ca69fae2ecf33ec55b9ca260b081176fd8d8a13757f0e5bcd825530,2025-04-14T17:15:27.297000
|
||||
CVE-2025-32770,0,0,e879cb856385008a5a030da1f2f52e9188c55a4c92cd2936d47c4399aede7a06,2025-04-11T03:15:14.993000
|
||||
CVE-2025-32771,0,0,c6e52811cb5d920942a21d471ca81350909d1cde0ef114a099f62648d927e2dd,2025-04-11T03:15:15.047000
|
||||
CVE-2025-32772,0,0,a192b72f7407e2dddb9288a08a9fc67f6dbc97c24f0e1f2b7e06b7601af05155,2025-04-11T03:15:15.100000
|
||||
@ -289634,7 +289635,7 @@ CVE-2025-32913,0,0,d57ad36165f59819d303ec9ab2813ff5e3bf6501be5718c19b238e301d126
|
||||
CVE-2025-32914,0,0,de999727d5bce94a114462e2bc1bde19e09dd5cdd0f1e24a89bd7f2b18826694,2025-04-14T15:15:25.633000
|
||||
CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000
|
||||
CVE-2025-32930,0,0,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000
|
||||
CVE-2025-32931,1,1,94cc5fcddf25096d3020225e203ae16bfb1f4efa469cabee66ae53d695e6e9a8,2025-04-14T16:15:22.157000
|
||||
CVE-2025-32931,0,0,94cc5fcddf25096d3020225e203ae16bfb1f4efa469cabee66ae53d695e6e9a8,2025-04-14T16:15:22.157000
|
||||
CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000
|
||||
CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000
|
||||
CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000
|
||||
@ -289800,5 +289801,6 @@ CVE-2025-3567,0,0,68195c2973f4b9308c466a01f36590051dbb6f6f31aac024df9f7bc433a952
|
||||
CVE-2025-3568,0,0,a64b7e44716ed68a0ddbfba74311c2092133b41c3642a3b2ba527807193a37b4,2025-04-14T14:15:25.630000
|
||||
CVE-2025-3569,0,0,94334ea1a3fe530ff2ae4efa820c42155fe775a22ec3ecf489f5f07a7824990e,2025-04-14T14:15:25.813000
|
||||
CVE-2025-3570,0,0,cf9fb78e19d7bef088f008e110fad665be6507ce3e02644cb83c14c976813f4a,2025-04-14T15:15:26.333000
|
||||
CVE-2025-3571,0,1,7d08bea3ed82387da792d57f13b758e450a18d2640f2f9feafe1f3cbbdc5d106,2025-04-14T16:15:22.713000
|
||||
CVE-2025-3571,0,0,7d08bea3ed82387da792d57f13b758e450a18d2640f2f9feafe1f3cbbdc5d106,2025-04-14T16:15:22.713000
|
||||
CVE-2025-3572,0,0,ce93ec390a9611703e154796a1c8b29e4cb3ba90d0f017a2ea9b391560345b34,2025-04-14T03:15:17
|
||||
CVE-2025-3585,1,1,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user