mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-25T16:00:20.371169+00:00
This commit is contained in:
parent
b6c7adad22
commit
5772164555
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-21219",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-15T19:15:15.510",
|
||||
"lastModified": "2024-11-21T05:12:29.127",
|
||||
"lastModified": "2025-04-25T15:15:29.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-25059",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:10.663",
|
||||
"lastModified": "2024-11-21T05:54:16.363",
|
||||
"lastModified": "2025-04-25T15:15:29.763",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-31740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-30T15:15:10.290",
|
||||
"lastModified": "2024-11-21T06:06:10.357",
|
||||
"lastModified": "2025-04-25T15:15:29.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-22984",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2022-11-30T13:15:10.517",
|
||||
"lastModified": "2024-11-21T06:47:44.417",
|
||||
"lastModified": "2025-04-25T15:15:30.193",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23746",
|
||||
"sourceIdentifier": "cve@checkpoint.com",
|
||||
"published": "2022-11-30T19:15:10.310",
|
||||
"lastModified": "2024-11-21T06:49:13.710",
|
||||
"lastModified": "2025-04-25T15:15:30.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36136",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:10.503",
|
||||
"lastModified": "2024-11-21T07:12:28.140",
|
||||
"lastModified": "2025-04-25T15:15:30.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36137",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:10.567",
|
||||
"lastModified": "2024-11-21T07:12:28.283",
|
||||
"lastModified": "2025-04-25T15:15:30.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36433",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T13:15:10.420",
|
||||
"lastModified": "2024-11-21T07:12:59.967",
|
||||
"lastModified": "2025-04-25T15:15:30.917",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3689",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:13.530",
|
||||
"lastModified": "2024-11-21T07:20:02.247",
|
||||
"lastModified": "2025-04-25T15:15:31.303",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3751",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2022-11-29T21:15:11.217",
|
||||
"lastModified": "2024-11-21T07:20:10.583",
|
||||
"lastModified": "2025-04-25T15:15:31.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -133,6 +133,10 @@
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3769",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:14.103",
|
||||
"lastModified": "2024-11-21T07:20:12.690",
|
||||
"lastModified": "2025-04-25T15:15:31.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3823",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:14.677",
|
||||
"lastModified": "2024-11-21T07:20:18.497",
|
||||
"lastModified": "2025-04-25T15:15:31.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -71,6 +91,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3831",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:15.573",
|
||||
"lastModified": "2024-11-21T07:20:19.523",
|
||||
"lastModified": "2025-04-25T15:15:31.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3850",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:18.280",
|
||||
"lastModified": "2024-11-21T07:20:21.940",
|
||||
"lastModified": "2025-04-25T15:15:32.100",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3865",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-11-28T14:15:18.593",
|
||||
"lastModified": "2024-11-21T07:20:23.707",
|
||||
"lastModified": "2025-04-25T15:15:32.253",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40799",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T05:15:11.310",
|
||||
"lastModified": "2024-11-21T07:22:03.697",
|
||||
"lastModified": "2025-04-25T15:15:32.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42445",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2022-12-12T13:15:14.737",
|
||||
"lastModified": "2024-11-21T07:24:58.893",
|
||||
"lastModified": "2025-04-25T15:15:32.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44096",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-30T05:15:11.187",
|
||||
"lastModified": "2024-11-21T07:27:38.020",
|
||||
"lastModified": "2025-04-25T15:15:32.820",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44355",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T17:15:11.257",
|
||||
"lastModified": "2024-11-21T07:27:54.787",
|
||||
"lastModified": "2025-04-25T15:15:32.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44356",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T17:15:11.313",
|
||||
"lastModified": "2024-11-21T07:27:54.923",
|
||||
"lastModified": "2025-04-25T15:15:33.157",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44635",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-11-29T15:15:10.897",
|
||||
"lastModified": "2024-11-21T07:28:14.380",
|
||||
"lastModified": "2025-04-25T15:15:33.310",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45202",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:11.207",
|
||||
"lastModified": "2024-11-21T07:28:57.310",
|
||||
"lastModified": "2025-04-25T15:15:33.627",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45204",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:11.253",
|
||||
"lastModified": "2024-11-21T07:28:57.453",
|
||||
"lastModified": "2025-04-25T15:15:33.810",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45301",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T02:15:08.893",
|
||||
"lastModified": "2024-11-21T07:29:01.920",
|
||||
"lastModified": "2025-04-25T15:15:33.970",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45304",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T02:15:09.000",
|
||||
"lastModified": "2024-11-21T07:29:02.067",
|
||||
"lastModified": "2025-04-25T15:15:34.133",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45305",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T02:15:09.067",
|
||||
"lastModified": "2024-11-21T07:29:02.210",
|
||||
"lastModified": "2025-04-25T15:15:34.287",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T02:15:09.117",
|
||||
"lastModified": "2024-11-21T07:29:02.360",
|
||||
"lastModified": "2025-04-25T15:15:34.437",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T02:15:09.167",
|
||||
"lastModified": "2024-11-21T07:29:02.500",
|
||||
"lastModified": "2025-04-25T15:15:34.593",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0406",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-06T17:15:07.127",
|
||||
"lastModified": "2025-03-11T04:15:22.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T15:02:44.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,26 +71,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mholt:archiver:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "4.0.0",
|
||||
"matchCriteriaId": "A9611164-4F5F-4D75-8E6B-40C77B622481"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.18",
|
||||
"versionEndExcluding": "4.18.4",
|
||||
"matchCriteriaId": "9865460D-A462-4F64-BD67-434E59AF36AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2449",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0406",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-0406",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3203",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-02T22:15:10.320",
|
||||
"lastModified": "2024-11-21T09:29:08.600",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T14:45:29.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,46 +96,100 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.13.2",
|
||||
"matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259050",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259050",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304556",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259050",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259050",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304556",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3204",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-02T22:15:11.040",
|
||||
"lastModified": "2024-11-21T09:29:08.737",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T14:45:32.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,46 +96,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.13.2",
|
||||
"matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259051",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259051",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304557",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259051",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259051",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304557",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3207",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-02T23:15:54.853",
|
||||
"lastModified": "2024-11-21T09:29:08.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T14:38:36.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,86 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ermig1979:simd:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.0.134",
|
||||
"matchCriteriaId": "572340A7-7144-4B19-9E20-26A458BE41A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259054",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259054",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304572",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304572",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3209",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-02T23:15:55.083",
|
||||
"lastModified": "2024-11-21T09:29:09.260",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T14:33:54.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,62 +96,161 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.2.2",
|
||||
"matchCriteriaId": "FA0C3D96-C5B7-4783-B8F5-895E304ECA7C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304575",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304575",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-3227",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-03T03:15:11.457",
|
||||
"lastModified": "2025-04-25T13:52:04.237",
|
||||
"lastModified": "2025-04-25T14:23:04.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,9 +115,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:weaver:e-office_oa:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "9.5",
|
||||
"matchCriteriaId": "5BC57384-9952-4FD7-9E44-66307841C357"
|
||||
"matchCriteriaId": "76FD9B2D-EEEE-4C55-9C33-237C662202F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49672",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-29T11:15:04.223",
|
||||
"lastModified": "2024-11-08T15:16:00.327",
|
||||
"lastModified": "2025-04-25T14:02:39.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google_docs_rsvp_project:google_docs_rsvp:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:gief:google_docs_rsvp:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "E98DC42A-2BE2-4029-A27A-1ECE5C82A1E3"
|
||||
"matchCriteriaId": "B96653A9-2F50-4203-8058-EDFD5F141C43"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50086",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-29T01:15:05.487",
|
||||
"lastModified": "2024-11-08T16:15:46.247",
|
||||
"lastModified": "2025-04-25T15:15:34.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
55
CVE-2024/CVE-2024-573xx/CVE-2024-57375.json
Normal file
55
CVE-2024/CVE-2024-573xx/CVE-2024-57375.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-57375",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-25T14:15:20.567",
|
||||
"lastModified": "2025-04-25T14:15:20.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Andamiro Pump It Up 20th Anniversary (aka Double X or XX/2019) 1.00.0-2.08.3 allows a physically proximate attacker to cause a denial of service (application crash) via certain deselect actions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=DXrnQpTlQs0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://xx.piugame.com/bbs/board.php?bo_table=global_notice&wr_id=368",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-22097",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:04.080",
|
||||
"lastModified": "2025-04-17T20:22:16.240",
|
||||
"lastModified": "2025-04-25T15:15:35.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix use after free and double free on init error\n\nIf the driver initialization fails, the vkms_exit() function might\naccess an uninitialized or freed default_config pointer and it might\ndouble free it.\n\nFix both possible errors by initializing default_config only when the\ndriver initialization succeeded."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vkms: Se corrige el error \"use after free\" y \"double free on init\". Si falla la inicializaci\u00f3n del controlador, la funci\u00f3n \"vkms_exit()\" podr\u00eda acceder a un puntero \"default_config\" no inicializado o liberado y liberarlo dos veces. Se corrigen ambos posibles errores inicializando \"default_config\" solo cuando la inicializaci\u00f3n del controlador se haya realizado correctamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.650",
|
||||
"lastModified": "2025-03-07T17:15:22.083",
|
||||
"lastModified": "2025-04-25T15:15:35.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eprint.iacr.org/2025/629",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OWASP/ASVS/issues/2678",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.850",
|
||||
"lastModified": "2025-03-07T17:15:22.190",
|
||||
"lastModified": "2025-04-25T15:15:35.937",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eprint.iacr.org/2025/629",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OWASP/ASVS/issues/2678",
|
||||
"source": "cve@mitre.org"
|
||||
|
25
CVE-2025/CVE-2025-280xx/CVE-2025-28076.json
Normal file
25
CVE-2025/CVE-2025-280xx/CVE-2025-28076.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-28076",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-25T15:15:36.057",
|
||||
"lastModified": "2025-04-25T15:15:36.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple SQL injection vulnerabilities in EasyVirt DCScope <= 8.6.4 and CO2Scope <= 1.3.4 allows remote authenticated attackers to execute arbitrary SQL commands via the (1) timeago, (2) user, (3) filter, (4) target, (5) p1, (6) p2, (7) p3, (8) p4, (9) p5, (10) p6, (11) p7, (12) p8, (13) p9, (14) p10, (15) p11, (16) p12, (17) p13, (18) p14, (19) p15, (20) p16, (21) p17, (22) p18, (23) p19, or (24) p20 parameter to /api/management/updateihmsettings; the (25) ID, (26) NAME, (27) CPUTHREADNB, (28) RAMCAP, or (29) DISKCAP parameter to /api/capaplan/savetemplates."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2025-28076.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.easyvirt.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-283xx/CVE-2025-28354.json
Normal file
25
CVE-2025/CVE-2025-283xx/CVE-2025-28354.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-28354",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-25T14:15:21.560",
|
||||
"lastModified": "2025-04-25T14:15:21.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/VAMorales/ef13d4edc14750f689e16c9e4922becb",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.entrust.com/sites/default/files/documentation/productsupport/entrust-security-bulletin-e25-002.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-320xx/CVE-2025-32044.json
Normal file
60
CVE-2025/CVE-2025-320xx/CVE-2025-32044.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32044",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:36.170",
|
||||
"lastModified": "2025-04-25T15:15:36.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data\u2014including names, contact information, and hashed passwords\u2014via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-32044",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356829",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-320xx/CVE-2025-32045.json
Normal file
60
CVE-2025/CVE-2025-320xx/CVE-2025-32045.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32045",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:36.307",
|
||||
"lastModified": "2025-04-25T15:15:36.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-32045",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356835",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-324xx/CVE-2025-32432.json
Normal file
72
CVE-2025/CVE-2025-324xx/CVE-2025-32432.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-32432",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-25T15:15:36.440",
|
||||
"lastModified": "2025-04-25T15:15:36.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/blob/3.x/CHANGELOG.md#3915---2025-04-10-critical",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/blob/4.x/CHANGELOG.md#41415---2025-04-10-critical",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/blob/5.x/CHANGELOG.md#5617---2025-04-10-critical",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/commit/e1c85441fa47eeb7c688c2053f25419bc0547b47",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-3551",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-14T05:15:15.330",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"lastModified": "2025-04-25T14:15:22.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -111,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-3552",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-14T06:15:16.440",
|
||||
"lastModified": "2025-04-15T18:39:27.967",
|
||||
"lastModified": "2025-04-25T14:15:22.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -63,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -111,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
60
CVE-2025/CVE-2025-36xx/CVE-2025-3625.json
Normal file
60
CVE-2025/CVE-2025-36xx/CVE-2025-3625.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3625",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:36.753",
|
||||
"lastModified": "2025-04-25T15:15:36.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3625",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359690",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-36xx/CVE-2025-3627.json
Normal file
60
CVE-2025/CVE-2025-36xx/CVE-2025-3627.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3627",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:36.927",
|
||||
"lastModified": "2025-04-25T15:15:36.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3627",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359692",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-36xx/CVE-2025-3628.json
Normal file
60
CVE-2025/CVE-2025-36xx/CVE-2025-3628.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3628",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.057",
|
||||
"lastModified": "2025-04-25T15:15:37.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3628",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359706",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-36xx/CVE-2025-3634.json
Normal file
60
CVE-2025/CVE-2025-36xx/CVE-2025-3634.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3634",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T14:15:22.917",
|
||||
"lastModified": "2025-04-25T14:15:22.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3634",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359707",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-36xx/CVE-2025-3635.json
Normal file
60
CVE-2025/CVE-2025-36xx/CVE-2025-3635.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3635",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.230",
|
||||
"lastModified": "2025-04-25T15:15:37.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3635",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359709",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3636.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3636.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3636",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.363",
|
||||
"lastModified": "2025-04-25T15:15:37.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84499",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3636",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359726",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3637.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3637.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3637",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.510",
|
||||
"lastModified": "2025-04-25T15:15:37.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-598"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-65356",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3637",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359727",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2025/CVE-2025-36xx/CVE-2025-3638.json
Normal file
41
CVE-2025/CVE-2025-36xx/CVE-2025-3638.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2025-3638",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.640",
|
||||
"lastModified": "2025-04-25T15:15:37.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3638",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359732",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467600",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3640.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3640.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3640",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.757",
|
||||
"lastModified": "2025-04-25T15:15:37.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3640",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359734",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467601",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3641.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3641.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3641",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:37.887",
|
||||
"lastModified": "2025-04-25T15:15:37.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3641",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359735",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467602",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3642.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3642.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3642",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:38.013",
|
||||
"lastModified": "2025-04-25T15:15:38.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3642",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359738",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467603",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3643.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3643.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3643",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:38.147",
|
||||
"lastModified": "2025-04-25T15:15:38.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3643",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359742",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467604",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3644.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3644.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3644",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:38.280",
|
||||
"lastModified": "2025-04-25T15:15:38.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3644",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359745",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467605",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3645.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3645.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3645",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:38.410",
|
||||
"lastModified": "2025-04-25T15:15:38.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3645",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359761",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467606",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-36xx/CVE-2025-3647.json
Normal file
64
CVE-2025/CVE-2025-36xx/CVE-2025-3647.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-3647",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-04-25T15:15:38.550",
|
||||
"lastModified": "2025-04-25T15:15:38.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3647",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359762",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=467607",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-37088",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-04-22T22:15:17.450",
|
||||
"lastModified": "2025-04-23T14:15:29.307",
|
||||
"lastModified": "2025-04-25T15:15:36.593",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2025/CVE-2025-430xx/CVE-2025-43016.json
Normal file
56
CVE-2025/CVE-2025-430xx/CVE-2025-43016.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-43016",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-04-25T15:15:39.260",
|
||||
"lastModified": "2025-04-25T15:15:39.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-438xx/CVE-2025-43862.json
Normal file
64
CVE-2025/CVE-2025-438xx/CVE-2025-43862.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-43862",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-25T15:15:39.920",
|
||||
"lastModified": "2025-04-25T15:15:39.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/pull/5266",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-43946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:16:01.047",
|
||||
"lastModified": "2025-04-23T14:15:29.630",
|
||||
"lastModified": "2025-04-25T15:15:40.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2025/CVE-2025-464xx/CVE-2025-46432.json
Normal file
56
CVE-2025/CVE-2025-464xx/CVE-2025-46432.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-46432",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-04-25T15:15:40.347",
|
||||
"lastModified": "2025-04-25T15:15:40.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-464xx/CVE-2025-46433.json
Normal file
56
CVE-2025/CVE-2025-464xx/CVE-2025-46433.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-46433",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-04-25T15:15:40.480",
|
||||
"lastModified": "2025-04-25T15:15:40.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-466xx/CVE-2025-46618.json
Normal file
56
CVE-2025/CVE-2025-466xx/CVE-2025-46618.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-46618",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-04-25T15:15:40.957",
|
||||
"lastModified": "2025-04-25T15:15:40.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
67
README.md
67
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-25T14:00:19.709220+00:00
|
||||
2025-04-25T16:00:20.371169+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-25T13:52:04.237000+00:00
|
||||
2025-04-25T15:15:40.957000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,26 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291421
|
||||
291447
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `26`
|
||||
|
||||
- [CVE-2024-11917](CVE-2024/CVE-2024-119xx/CVE-2024-11917.json) (`2025-04-25T12:15:16.013`)
|
||||
- [CVE-2024-6198](CVE-2024/CVE-2024-61xx/CVE-2024-6198.json) (`2025-04-25T13:15:42.370`)
|
||||
- [CVE-2024-6199](CVE-2024/CVE-2024-61xx/CVE-2024-6199.json) (`2025-04-25T13:15:43.510`)
|
||||
- [CVE-2025-2470](CVE-2025/CVE-2025-24xx/CVE-2025-2470.json) (`2025-04-25T12:15:16.903`)
|
||||
- [CVE-2025-2986](CVE-2025/CVE-2025-29xx/CVE-2025-2986.json) (`2025-04-25T12:15:17.083`)
|
||||
- [CVE-2025-3912](CVE-2025/CVE-2025-39xx/CVE-2025-3912.json) (`2025-04-25T12:15:17.243`)
|
||||
- [CVE-2025-28076](CVE-2025/CVE-2025-280xx/CVE-2025-28076.json) (`2025-04-25T15:15:36.057`)
|
||||
- [CVE-2025-28354](CVE-2025/CVE-2025-283xx/CVE-2025-28354.json) (`2025-04-25T14:15:21.560`)
|
||||
- [CVE-2025-32044](CVE-2025/CVE-2025-320xx/CVE-2025-32044.json) (`2025-04-25T15:15:36.170`)
|
||||
- [CVE-2025-32045](CVE-2025/CVE-2025-320xx/CVE-2025-32045.json) (`2025-04-25T15:15:36.307`)
|
||||
- [CVE-2025-32432](CVE-2025/CVE-2025-324xx/CVE-2025-32432.json) (`2025-04-25T15:15:36.440`)
|
||||
- [CVE-2025-3625](CVE-2025/CVE-2025-36xx/CVE-2025-3625.json) (`2025-04-25T15:15:36.753`)
|
||||
- [CVE-2025-3627](CVE-2025/CVE-2025-36xx/CVE-2025-3627.json) (`2025-04-25T15:15:36.927`)
|
||||
- [CVE-2025-3628](CVE-2025/CVE-2025-36xx/CVE-2025-3628.json) (`2025-04-25T15:15:37.057`)
|
||||
- [CVE-2025-3634](CVE-2025/CVE-2025-36xx/CVE-2025-3634.json) (`2025-04-25T14:15:22.917`)
|
||||
- [CVE-2025-3635](CVE-2025/CVE-2025-36xx/CVE-2025-3635.json) (`2025-04-25T15:15:37.230`)
|
||||
- [CVE-2025-3636](CVE-2025/CVE-2025-36xx/CVE-2025-3636.json) (`2025-04-25T15:15:37.363`)
|
||||
- [CVE-2025-3637](CVE-2025/CVE-2025-36xx/CVE-2025-3637.json) (`2025-04-25T15:15:37.510`)
|
||||
- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-04-25T15:15:37.640`)
|
||||
- [CVE-2025-3640](CVE-2025/CVE-2025-36xx/CVE-2025-3640.json) (`2025-04-25T15:15:37.757`)
|
||||
- [CVE-2025-3641](CVE-2025/CVE-2025-36xx/CVE-2025-3641.json) (`2025-04-25T15:15:37.887`)
|
||||
- [CVE-2025-3642](CVE-2025/CVE-2025-36xx/CVE-2025-3642.json) (`2025-04-25T15:15:38.013`)
|
||||
- [CVE-2025-3643](CVE-2025/CVE-2025-36xx/CVE-2025-3643.json) (`2025-04-25T15:15:38.147`)
|
||||
- [CVE-2025-3644](CVE-2025/CVE-2025-36xx/CVE-2025-3644.json) (`2025-04-25T15:15:38.280`)
|
||||
- [CVE-2025-3645](CVE-2025/CVE-2025-36xx/CVE-2025-3645.json) (`2025-04-25T15:15:38.410`)
|
||||
- [CVE-2025-3647](CVE-2025/CVE-2025-36xx/CVE-2025-3647.json) (`2025-04-25T15:15:38.550`)
|
||||
- [CVE-2025-43016](CVE-2025/CVE-2025-430xx/CVE-2025-43016.json) (`2025-04-25T15:15:39.260`)
|
||||
- [CVE-2025-43862](CVE-2025/CVE-2025-438xx/CVE-2025-43862.json) (`2025-04-25T15:15:39.920`)
|
||||
- [CVE-2025-46432](CVE-2025/CVE-2025-464xx/CVE-2025-46432.json) (`2025-04-25T15:15:40.347`)
|
||||
- [CVE-2025-46433](CVE-2025/CVE-2025-464xx/CVE-2025-46433.json) (`2025-04-25T15:15:40.480`)
|
||||
- [CVE-2025-46618](CVE-2025/CVE-2025-466xx/CVE-2025-46618.json) (`2025-04-25T15:15:40.957`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `43`
|
||||
|
||||
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T13:52:04.237`)
|
||||
- [CVE-2022-44355](CVE-2022/CVE-2022-443xx/CVE-2022-44355.json) (`2025-04-25T15:15:32.987`)
|
||||
- [CVE-2022-44356](CVE-2022/CVE-2022-443xx/CVE-2022-44356.json) (`2025-04-25T15:15:33.157`)
|
||||
- [CVE-2022-44635](CVE-2022/CVE-2022-446xx/CVE-2022-44635.json) (`2025-04-25T15:15:33.310`)
|
||||
- [CVE-2022-45202](CVE-2022/CVE-2022-452xx/CVE-2022-45202.json) (`2025-04-25T15:15:33.627`)
|
||||
- [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2025-04-25T15:15:33.810`)
|
||||
- [CVE-2022-45301](CVE-2022/CVE-2022-453xx/CVE-2022-45301.json) (`2025-04-25T15:15:33.970`)
|
||||
- [CVE-2022-45304](CVE-2022/CVE-2022-453xx/CVE-2022-45304.json) (`2025-04-25T15:15:34.133`)
|
||||
- [CVE-2022-45305](CVE-2022/CVE-2022-453xx/CVE-2022-45305.json) (`2025-04-25T15:15:34.287`)
|
||||
- [CVE-2022-45306](CVE-2022/CVE-2022-453xx/CVE-2022-45306.json) (`2025-04-25T15:15:34.437`)
|
||||
- [CVE-2022-45307](CVE-2022/CVE-2022-453xx/CVE-2022-45307.json) (`2025-04-25T15:15:34.593`)
|
||||
- [CVE-2024-0406](CVE-2024/CVE-2024-04xx/CVE-2024-0406.json) (`2025-04-25T15:02:44.233`)
|
||||
- [CVE-2024-3203](CVE-2024/CVE-2024-32xx/CVE-2024-3203.json) (`2025-04-25T14:45:29.780`)
|
||||
- [CVE-2024-3204](CVE-2024/CVE-2024-32xx/CVE-2024-3204.json) (`2025-04-25T14:45:32.610`)
|
||||
- [CVE-2024-3207](CVE-2024/CVE-2024-32xx/CVE-2024-3207.json) (`2025-04-25T14:38:36.010`)
|
||||
- [CVE-2024-3209](CVE-2024/CVE-2024-32xx/CVE-2024-3209.json) (`2025-04-25T14:33:54.060`)
|
||||
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T14:23:04.283`)
|
||||
- [CVE-2024-49672](CVE-2024/CVE-2024-496xx/CVE-2024-49672.json) (`2025-04-25T14:02:39.477`)
|
||||
- [CVE-2024-50086](CVE-2024/CVE-2024-500xx/CVE-2024-50086.json) (`2025-04-25T15:15:34.760`)
|
||||
- [CVE-2025-22097](CVE-2025/CVE-2025-220xx/CVE-2025-22097.json) (`2025-04-25T15:15:35.647`)
|
||||
- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-04-25T15:15:35.820`)
|
||||
- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-04-25T15:15:35.937`)
|
||||
- [CVE-2025-3551](CVE-2025/CVE-2025-35xx/CVE-2025-3551.json) (`2025-04-25T14:15:22.650`)
|
||||
- [CVE-2025-3552](CVE-2025/CVE-2025-35xx/CVE-2025-3552.json) (`2025-04-25T14:15:22.790`)
|
||||
- [CVE-2025-37088](CVE-2025/CVE-2025-370xx/CVE-2025-37088.json) (`2025-04-25T15:15:36.593`)
|
||||
- [CVE-2025-43946](CVE-2025/CVE-2025-439xx/CVE-2025-43946.json) (`2025-04-25T15:15:40.050`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
124
_state.csv
124
_state.csv
@ -153082,7 +153082,7 @@ CVE-2020-21180,0,0,303ba4cbecfd577c8675128e37d8369c2ef084f2e95b4f38c917bf9577050
|
||||
CVE-2020-2119,0,0,ab060a15a5ea329e5da59d88d50505d7abca6bf7da2c7711a7b026b4ca2cf16a,2024-11-21T05:24:42.170000
|
||||
CVE-2020-2120,0,0,0ed3332ba34424a03d6bf0bd23243d91d417fe01d3e7aa0e73b8fc1f6fec9721,2024-11-21T05:24:42.327000
|
||||
CVE-2020-2121,0,0,5b52e309153039b54df2681a5d68ace094c0ecb4930523dc6c2c5375c4bfd739,2024-11-21T05:24:42.507000
|
||||
CVE-2020-21219,0,0,b1db0c5c350ba9e0b88f93000750d5787fafa84c443ce763436ac6e8eafd17e6,2024-11-21T05:12:29.127000
|
||||
CVE-2020-21219,0,1,c26edcbc610785b5c7d2f7827e3af5d01ec065e2c0dea271ba950cc2a12f9494,2025-04-25T15:15:29.040000
|
||||
CVE-2020-2122,0,0,20fd5a5dd80fc14c6a66e78b31887aa53c5353426d77663c697f5ac93e0e7305,2024-11-21T05:24:42.673000
|
||||
CVE-2020-21224,0,0,b89d14e5bc81a9de9b42af1aa7ba12da43c5794dd5026ccdf20368f17b6b3b9f,2024-11-21T05:12:29.270000
|
||||
CVE-2020-21228,0,0,8f37cb9765b2a69b500100a069a506a05cb5e33a7271b47955f712502f1c7a42,2024-11-21T05:12:29.417000
|
||||
@ -171260,7 +171260,7 @@ CVE-2021-25055,0,0,7236064c94889148c41f806496f068d537c251ade137c74cd47e25f2e0f59
|
||||
CVE-2021-25056,0,0,8ad03739eec0a143e533f36240327d2cf23d6c15360a725dded330c41efe38d9,2024-11-21T05:54:16.047000
|
||||
CVE-2021-25057,0,0,2f295c3d84349c3531c30c01f3294ee6299f127457871f1d2f4ac91888a0d97d,2024-11-21T05:54:16.153000
|
||||
CVE-2021-25058,0,0,a66b2e60f36a18044d483775c5e6e4538c5824d490ab11bcb6b35853656294c7,2024-11-21T05:54:16.260000
|
||||
CVE-2021-25059,0,0,bd4349a3c42f8814e760f2ca208a3169b2a07a3813c738bb9f001d2413ad6604,2024-11-21T05:54:16.363000
|
||||
CVE-2021-25059,0,1,b7f20c28d7a99aab7de9377815c4827d27691bec552bb4df740537b835ffd0c8,2025-04-25T15:15:29.763000
|
||||
CVE-2021-25060,0,0,1139c273a9f2053f20d9f39643e00a266f5fafb7e0d9c382d9a15a74cbe20cdd,2024-11-21T05:54:16.490000
|
||||
CVE-2021-25061,0,0,ea167eb147c4ab2edf7a9cf81474e723d481bf2edadbf7d639057aaa127b2325,2024-11-21T05:54:16.603000
|
||||
CVE-2021-25062,0,0,c2de70bf7522f29e404269e2e3e7ef40a96ab54e22b01a873b08c11fcb52ff2e,2024-11-21T05:54:16.717000
|
||||
@ -176028,7 +176028,7 @@ CVE-2021-31731,0,0,2f09d3b0d20e294ef90277d66e935d0af27787f253ac13262c3ed4c0069c6
|
||||
CVE-2021-31737,0,0,9d6a00a25dcfc223ba92bc36cc2e636c5f5ff5f625e5e56a5563622b736c4f08,2024-11-21T06:06:09.910000
|
||||
CVE-2021-31738,0,0,cd05c4eef13cc84abd8ec7d9e3f7add5c58901b74366c55cf683354f951a37b4,2024-11-21T06:06:10.057000
|
||||
CVE-2021-31739,0,0,fd5957d55dee3e4c4277a1fbd302efdfe6452802cd60ce5d19dde82d7ba3e619,2024-11-21T06:06:10.203000
|
||||
CVE-2021-31740,0,0,748309ac83594d96604284429d30e1da0c13096e8f09b18e3897344882a2edd6,2024-11-21T06:06:10.357000
|
||||
CVE-2021-31740,0,1,9fdf572984911e8ea7863ec8e2243a58805bf91fcdce3ed8758fff7b2fe46e21,2025-04-25T15:15:29.940000
|
||||
CVE-2021-31745,0,0,ccd6bf0b8dc2c7292fa396fdab7855ad739ad2accf80a627909d4b5fc7efdd3e,2024-11-21T06:06:10.513000
|
||||
CVE-2021-31746,0,0,13539c2f305ff92a6fbe864dae208d7192ec64f2a701b4b440f10140e2dc8536,2024-11-21T06:06:10.660000
|
||||
CVE-2021-31747,0,0,8d589c7b437eea27faf0f53fedca0207bf4f7e05e6676735177b93d37debf9c1,2024-11-21T06:06:10.800000
|
||||
@ -192720,7 +192720,7 @@ CVE-2022-2298,0,0,a95805a0a13658fd0a16985348f5c1a2403dbffca9a2a7d0263cf2cb18be2d
|
||||
CVE-2022-22980,0,0,a994ec342d04ccad8dc633e7800d805763ac26bc27074e2f7248cc3ebd2e9509,2024-11-21T06:47:44.063000
|
||||
CVE-2022-22982,0,0,7eb2b4877890c6c001a50bc755814c842ccf4384bed6f4821a32240102fd7eb7,2024-11-21T06:47:44.170000
|
||||
CVE-2022-22983,0,0,8f4ede69b42a51b80c795d220aebdc7113cd7125c2950869e3be07023cdc09f4,2024-11-21T06:47:44.300000
|
||||
CVE-2022-22984,0,0,f799ce061ca9e74509ab3a0e212c5d194added7b3a3f7fae2182ddad3b17deb4,2024-11-21T06:47:44.417000
|
||||
CVE-2022-22984,0,1,12b0c25f41a810867b000d1817b01a50255dbab1b0d6b1e35f53986799a4e331,2025-04-25T15:15:30.193000
|
||||
CVE-2022-22985,0,0,79b2a9552a1b10ada46de8bd02db3a2ac5448a48e907872622945aa108e887ad,2024-11-21T06:47:44.610000
|
||||
CVE-2022-22986,0,0,e199ccc7a922f6597ce6bef579b86e7a6df5673dab1b56f0b18124cb0347cd97,2024-11-21T06:47:44.747000
|
||||
CVE-2022-22987,0,0,a3b22d0acd975ce36f8cae233a28b115c9a2a48ed94fd9b6fa4f660c0865ea5a,2024-11-21T06:47:44.890000
|
||||
@ -193432,7 +193432,7 @@ CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c04
|
||||
CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000
|
||||
CVE-2022-23744,0,0,a2ebd65c39528abca9283ad46d8bfd6d49ae5c18a6bf025a4f562f424489dc77,2024-11-21T06:49:13.467000
|
||||
CVE-2022-23745,0,0,453ea33812425fe4b8f24565e26d1911a52b7d4f61e5e4da7cd895e3d55225e1,2024-11-21T06:49:13.593000
|
||||
CVE-2022-23746,0,0,9eeee461b71877b53dcf609958a8cd6693503b71bf2647c3cd27aeced1d79c82,2024-11-21T06:49:13.710000
|
||||
CVE-2022-23746,0,1,abeae22cedfc59943315fd8d98f40ee6da86840f7109994f9a1d789f1d393586,2025-04-25T15:15:30.380000
|
||||
CVE-2022-23747,0,0,a0881c90aac8272e7d82e497d0d70466fe33c6cea5dcab3d5fb6d0f61cf3e774,2024-11-21T06:49:13.857000
|
||||
CVE-2022-23748,0,0,136335102b55350a23691b297d0f9f026269bdc861292d10215f8958c85f2cf7,2025-04-02T20:30:42.237000
|
||||
CVE-2022-2375,0,0,b665472ccd967b72e1975f37ea8ece177bf82a1796072289556fd815fa9e1b0d,2024-11-21T07:00:51.963000
|
||||
@ -203636,8 +203636,8 @@ CVE-2022-3613,0,0,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019f
|
||||
CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000
|
||||
CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000
|
||||
CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000
|
||||
CVE-2022-36136,0,0,bea1d08b00f9d495d289bbc32ddd3ec67aec1abc43898f282ef0f88692e4b1ba,2024-11-21T07:12:28.140000
|
||||
CVE-2022-36137,0,0,51d55d42d2055f8c8e091ff8a3c5a2f7a1efbed7a6334df55e7213db0f514b1d,2024-11-21T07:12:28.283000
|
||||
CVE-2022-36136,0,1,f2da00eeb95619dc82935888d31d7dc5e37800676e71e79bf569e55982f884b8,2025-04-25T15:15:30.587000
|
||||
CVE-2022-36137,0,1,3e19c276bc61d87eb33c9bac15601459f55477ff8a0f6ead4ac974fe498a88e6,2025-04-25T15:15:30.760000
|
||||
CVE-2022-36139,0,0,22bdb15852dd30b8f2f5ab5bf1ec8c83d48d99445394ee7e973fc0c1815e8ebe,2024-11-21T07:12:28.437000
|
||||
CVE-2022-3614,0,0,2d4003694539ee1d96ff0bd346ad4bd73a386dbd4c8a7acf8f95bc49397d72c3,2025-04-10T15:15:50.037000
|
||||
CVE-2022-36140,0,0,9edc335f53d8382d70a6c1d040e3e4f6a52e1f4cd9fa0bf1552cf48609873c37,2024-11-21T07:12:28.590000
|
||||
@ -203870,7 +203870,7 @@ CVE-2022-36429,0,0,20fb49e56c6f1adf794f2232cd360d3fc8e2dada5eda76f7ff2b356dd55c2
|
||||
CVE-2022-3643,0,0,7aaaf9084bb84ab92fa70840701773c2dfe43e0ea77f112347b533a9f79656a6,2024-11-21T07:19:56.600000
|
||||
CVE-2022-36431,0,0,ee12d34e458b3a3de33896b6afaca59da233821f7619d0c729cbab04e054dfd4,2025-04-24T18:15:17.247000
|
||||
CVE-2022-36432,0,0,40f0f1ce1fba46db4fc49c3ddcc8785372b185cbc0738759f144e2ddbd897174,2024-11-21T07:12:59.810000
|
||||
CVE-2022-36433,0,0,ebed4a98af717246592113c07ecf5f2a10c8e7de56660e43fc24aa17f62df3d7,2024-11-21T07:12:59.967000
|
||||
CVE-2022-36433,0,1,72b9b679a2a29f3c1783e5801f15c3bcbd338983499be1ab0f4ef57ccf612fb3,2025-04-25T15:15:30.917000
|
||||
CVE-2022-36436,0,0,9434892c0b256e55b1874516de3b5aa1348074c0cf8597a6066c5a94f012bba9,2024-11-21T07:13:00.140000
|
||||
CVE-2022-36437,0,0,3153b59c88a0f5f7aa8f3a5a6e4669887b4635cb5dfc156c694a9b92b4f26c6a,2025-04-11T23:15:26.833000
|
||||
CVE-2022-36438,0,0,17e2723b39644a785f394ac4f44f0529f418f4f06444889e2f0173c1f8e43f98,2024-11-21T07:13:00.573000
|
||||
@ -204260,7 +204260,7 @@ CVE-2022-36886,0,0,1f3c0b8ade645de1e53e62d0e685396150118cb50ddd97877baaa84eebbd9
|
||||
CVE-2022-36887,0,0,1f8d37d9592aa8f752a6dfad7f0ce43cee71c57c5a7f9bca38989e58989cc896,2024-11-21T07:13:59.637000
|
||||
CVE-2022-36888,0,0,4921fcf5afdb4f912155db3cc8a53583b6d70e9ad5dc7e9b72daba4003d9e202,2024-11-21T07:13:59.797000
|
||||
CVE-2022-36889,0,0,e7119c14a6b4b2c9eae6a07158559f2d49d2efaa06f0159c8de8f68cd7303f9e,2024-11-21T07:13:59.973000
|
||||
CVE-2022-3689,0,0,f6a4246d825497f545ab8bc7f4b7c91830b45d6f0b12c1a4cda832ec25a4be33,2024-11-21T07:20:02.247000
|
||||
CVE-2022-3689,0,1,12892bde85d5c55fa294bf9aeaaaf8a9c87ae2f0a0d06b86dc60a19f05430394,2025-04-25T15:15:31.303000
|
||||
CVE-2022-36890,0,0,0e9eee4f1955f88ffd0bac660ce61321cdfaa39e35c779981ce210b557e77f54,2024-11-21T07:14:00.163000
|
||||
CVE-2022-36891,0,0,4a375726c9a8eb97602c989e40327ca8ec8b6e38a5041fd403d3855f98ebeb79,2024-11-21T07:14:00.370000
|
||||
CVE-2022-36892,0,0,5cec0a9fe25eb7348db333bf5e44ba8fa525e6e8058963b1577f5c512f2554cf,2024-11-21T07:14:00.550000
|
||||
@ -204740,7 +204740,7 @@ CVE-2022-37462,0,0,f7e6351a908b88ab930dfb1c7c8a57aca70bc1cb2cde8b81941b2fb3342ee
|
||||
CVE-2022-3747,0,0,d33f321a72534df6c0f7d538ee493355ff4335736b80981cb6ab4e9e464bee7d,2024-11-21T07:20:10.190000
|
||||
CVE-2022-3748,0,0,4c6a3ebc0d4e325cde97e2f8775aa85a033e1c82aa843579db77939eede30f50,2024-11-21T07:20:10.317000
|
||||
CVE-2022-3750,0,0,a609e7c347b21edbf6d2fbc09521b9cdf9fb2b630cd9faec5d3705e6ee360cd1,2024-11-21T07:20:10.460000
|
||||
CVE-2022-3751,0,0,fff8c897554b0f53372618a3b0d50007127ee1748bd06c89d77850ab21b874f9,2024-11-21T07:20:10.583000
|
||||
CVE-2022-3751,0,1,5902e1d7d59b388c4665e28899787faf568a47db85afc7f0eabe9fde36273f50,2025-04-25T15:15:31.460000
|
||||
CVE-2022-3752,0,0,3149b8e2599081f392146ab58580b459802c848a160578a945146e01e0055e9b,2024-11-21T07:20:10.707000
|
||||
CVE-2022-3753,0,0,1348f0543d70a87d80ecd231c0b9c1275f07bb41a33410a33f3de4178cde9a44,2024-11-21T07:20:10.870000
|
||||
CVE-2022-3754,0,0,b78f2c6a6570a5ccf68675c30f4630d6746362394da9b62db4f4ed358e5b7306,2024-11-21T07:20:10.990000
|
||||
@ -204776,7 +204776,7 @@ CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa6
|
||||
CVE-2022-3768,0,0,857736c58330b0e35ff7a3d6b161358f07f0524bacac925a9a494e5203d72703,2024-11-21T07:20:12.563000
|
||||
CVE-2022-37680,0,0,0f45f78801f17e1f85d2fa1a73ca26a0150735d21b0b3cb11777a8712f135f61,2024-11-21T07:15:04.530000
|
||||
CVE-2022-37681,0,0,2f948e8907ff83dd1c5c3e251826bb44fd66955ca1bfca3c33a0e188cac5cc5b,2024-11-21T07:15:04.670000
|
||||
CVE-2022-3769,0,0,c4bf34e87f9ae2f42ed28397fd098e05c35c9f6843e9690bca79f799658840f6,2024-11-21T07:20:12.690000
|
||||
CVE-2022-3769,0,1,9c39e37e60db84f67819b6edf308680304c897cf262f2b53a87c71447f65e161,2025-04-25T15:15:31.620000
|
||||
CVE-2022-3770,0,0,056267d0dbc6d7110f2e71c1310d09e5ea740c482729425241ad1b06c3d3f156,2024-11-21T07:20:12.817000
|
||||
CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6819,2024-11-21T07:15:04.807000
|
||||
CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000
|
||||
@ -205224,7 +205224,7 @@ CVE-2022-38223,0,0,3f4fdfd7d100044b3e1d89b5c5e1369323d373ddf13b6ac76b34892021546
|
||||
CVE-2022-38227,0,0,3d7c4cc08173e8054ebad46518e9009e437f57325ea046e61d56e17b23a82926,2024-11-21T07:16:05.410000
|
||||
CVE-2022-38228,0,0,816dcccbed7337a6bc402c0b007938a378861f7a4c8bd2395f7fd9fc5e2192b3,2024-11-21T07:16:05.570000
|
||||
CVE-2022-38229,0,0,efca8cc82294683fd7989d5ec5ca81f04a19e3cc06b9dc425201b9fb2fc4ca6f,2024-11-21T07:16:05.720000
|
||||
CVE-2022-3823,0,0,416d416a5d223d4b4148000b870380c243934fa56106cc17a904a983e359a8a5,2024-11-21T07:20:18.497000
|
||||
CVE-2022-3823,0,1,e4994fb00f4255d2d57d6299bf759b738f57be40c640d7f78e08222afdcd1424,2025-04-25T15:15:31.783000
|
||||
CVE-2022-38230,0,0,40dbf13e9bc7dcf1737de4449055ecef320d52169e1f01fe6164196329150047,2024-11-21T07:16:05.870000
|
||||
CVE-2022-38231,0,0,bbf269a5bcf23cb22529664df424f85a1beb36774d508ded664c20d1752aec6e,2024-11-21T07:16:06.020000
|
||||
CVE-2022-38233,0,0,2194e76e0e0c73afb69bb1db25d94538133968d692172c945ea97a952ac195ff,2024-11-21T07:16:06.173000
|
||||
@ -205288,7 +205288,7 @@ CVE-2022-38306,0,0,e8f5dcacba0e6c57d5692e006a164302af90d57b35821879006d2771aeaa7
|
||||
CVE-2022-38307,0,0,d59af72afb91538c9ba5dacd9d51feeec853f4a1aa943dc9263bbf2d3184c39f,2024-11-21T07:16:14.057000
|
||||
CVE-2022-38308,0,0,de3db09742419c58c819e857898b3db9e083868d11e666551cc708fb4d23367c,2024-11-21T07:16:14.273000
|
||||
CVE-2022-38309,0,0,b087dae21818f7ec2b648f3a011ca6feb2e8308912689a0646bb11dad5bcb10b,2024-11-21T07:16:14.500000
|
||||
CVE-2022-3831,0,0,1be0ab256767eb54a63e2b092ec2de5d32e4e9e9175cc6f453b686a595a555dc,2024-11-21T07:20:19.523000
|
||||
CVE-2022-3831,0,1,ec982fa2758fc6aeb988af44ec9a6ac5bcc54ce8127db7f6604e5b9ac8631efa,2025-04-25T15:15:31.947000
|
||||
CVE-2022-38310,0,0,fa5b818aaf804e23f62859a12d0186a0b9342b29971f718afa3564aaca390001,2024-11-21T07:16:14.727000
|
||||
CVE-2022-38311,0,0,edf4c524f4b3b4766fab2dfe3272c54df888ee510433242ad7f7363ef49b030c,2024-11-21T07:16:14.950000
|
||||
CVE-2022-38312,0,0,9180aedab589aba05e0f781706ff46b1357d18f29131316cac546e53c50d9d83,2024-11-21T07:16:15.160000
|
||||
@ -205455,7 +205455,7 @@ CVE-2022-38493,0,0,7d3c8d07800e0868ab922c04f43dd51b3e3dfd753d464df9f9589698120f7
|
||||
CVE-2022-38495,0,0,3e1a8f8c7c51ce189934578edb1fc3f7dd0c26a69fce6983a4a1960e697e49cf,2024-11-21T07:16:35.640000
|
||||
CVE-2022-38496,0,0,7d9e593e4af025081f36a9df085d3bee0fa4f84231618397d1d2b795f464956d,2024-11-21T07:16:35.783000
|
||||
CVE-2022-38497,0,0,dfbbbf1c39e278335512d6218a9cd7619081c2b5b6b8d6861ef6274e963e506d,2024-11-21T07:16:35.923000
|
||||
CVE-2022-3850,0,0,014e0ec67729dcc395e4b36cc6d4ac0ff44bc10411b9a768650029a06fa289ca,2024-11-21T07:20:21.940000
|
||||
CVE-2022-3850,0,1,962431257cffa4a4ce5c31a6a0ef1215c8c5c1231cf7badb8a316a768693786f,2025-04-25T15:15:32.100000
|
||||
CVE-2022-38509,0,0,2515391f4274cbaba327f1239393d87b27324e2e58230c39be800f6b96a3439c,2024-11-21T07:16:36.063000
|
||||
CVE-2022-38510,0,0,550a2d9c5447748e6ff45d4a073a7702db3ac0c93727f34f4c70abc8b1cc4e1f,2024-11-21T07:16:36.203000
|
||||
CVE-2022-38511,0,0,64815cf128522467bbbaf91709d503ebd921fbd5d0fa281360677358f094f243,2024-11-21T07:16:36.347000
|
||||
@ -205539,7 +205539,7 @@ CVE-2022-38639,0,0,ef089ad0f4192a0b91a834c710a9e1249290b33bdea64a670a5be676a5df0
|
||||
CVE-2022-3864,0,0,ba3f96f4fa174b2b0d3e24e5d89f4099f8b9a0efca79a024de32073ae52f8091,2024-11-21T07:20:23.540000
|
||||
CVE-2022-38648,0,0,c2b1a29675da0a06063ce7783922e07647a6f9eda636aacd2cfe7f8e1285a431,2024-11-21T07:16:51.377000
|
||||
CVE-2022-38649,0,0,a3802596c0711adcc83dec072ae19e2654143e26907bdcd6efadc138cdbfce22,2024-11-21T07:16:51.500000
|
||||
CVE-2022-3865,0,0,fc5ab6cd758d465b91ccd42c2d606b0f28bc38f5e9cff538c36a35eb7bbdef4b,2024-11-21T07:20:23.707000
|
||||
CVE-2022-3865,0,1,eafea4860b94094a04f93818db78ca2471cd5d51a5635518322434b3c5dbb455,2025-04-25T15:15:32.253000
|
||||
CVE-2022-38650,0,0,35198c28f8bd005d0cf171fdd338c61f386fc95b192885d90ba28985791abb94,2024-11-21T07:16:51.633000
|
||||
CVE-2022-38651,0,0,186d3608a285044d41c3697db2bd941bdcd2a0b5c1e7a4ec401f9bdee9564b5c,2024-11-21T07:16:51.790000
|
||||
CVE-2022-38652,0,0,e88070e710abc56b7eb3502232d6b83b110e9bdef918cc83c89511310da790fe,2024-11-21T07:16:51.947000
|
||||
@ -207093,7 +207093,7 @@ CVE-2022-40785,0,0,0d06251319951eeee7bdaa71a82f05bc32e5db2e85812a7b72ff8b1fd2f15
|
||||
CVE-2022-4079,0,0,2e195e8ce7a96c52db6e6cd391e2c7b115c697f82f9f0e227cf3888e325014f3,2023-11-07T03:56:52.547000
|
||||
CVE-2022-40797,0,0,06ab9253b92b162b27ca724cded416d99846b7cad236227b0526d64762bf89a7,2024-11-21T07:22:03.370000
|
||||
CVE-2022-40798,0,0,fecd6a87495b3d94a1ee8a4f130e75d739496a7d84e215b87e3e46923fabbb0c,2024-11-21T07:22:03.537000
|
||||
CVE-2022-40799,0,0,ff4dffc477176d9f3a228c3b8c6a0931048d674d30aca151eb12c57d210194d4,2024-11-21T07:22:03.697000
|
||||
CVE-2022-40799,0,1,4f1d0eb456c4ec35b634a0682ae51351f47548eed2262a6a39b29e3ce70c906e,2025-04-25T15:15:32.410000
|
||||
CVE-2022-4080,0,0,2451c9d571d733037b09750056090b671d4a0e95bf3e35212e4bb5caad0e79e2,2023-11-07T03:56:52.670000
|
||||
CVE-2022-40805,0,0,4f20b037a16c5670b8159350ab27545846f70f42558e52fea1d755619dafdd45,2024-11-21T07:22:03.853000
|
||||
CVE-2022-40806,0,0,ac30ad36d7e7544ea0df57eac1ad635687001be1171a09eae0ad7de26adc7a9c,2024-11-21T07:22:04.007000
|
||||
@ -208509,7 +208509,7 @@ CVE-2022-4244,0,0,16ae99c985e7b36dcab810e8ccfc14c9fa257b27663d0c72059c2a5842fdc1
|
||||
CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000
|
||||
CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000
|
||||
CVE-2022-42444,0,0,5329124ad7f1068195d555d1d0ed53c482283f2a11b45a18466b4858bf7aa527,2025-03-25T16:15:15.877000
|
||||
CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000
|
||||
CVE-2022-42445,0,1,dd54132cc2f25eab96c69020699c91a5ef1b4c28818402ec2478af2c03e2dd29,2025-04-25T15:15:32.680000
|
||||
CVE-2022-42446,0,0,1738bdecf80dcb6a90c5b09b1f71384b9db6ee08c4f2ff62b40ca5fca1c34840,2025-04-24T15:15:49.730000
|
||||
CVE-2022-42447,0,0,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33983,2025-02-19T16:15:35.533000
|
||||
CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000
|
||||
@ -209766,7 +209766,7 @@ CVE-2022-44087,0,0,282f1059bd270ea7016e45a4ee9d36ca0f82d50f15358bbc9f785309e63a7
|
||||
CVE-2022-44088,0,0,f8bdae4051b8ba0544a5a6d5b9d3f3508b358614a633782f5bbd383d6f8ed0b9,2024-11-21T07:27:37.703000
|
||||
CVE-2022-44089,0,0,387d01deaabf402eacb8c950b9248183b79f74b6de65418acb62c814dbfdab8a,2024-11-21T07:27:37.867000
|
||||
CVE-2022-4409,0,0,d0bc837111287072a7c07728723929cf9c354b7b41a96199e43fbb9c53250d82,2024-11-21T07:35:12.927000
|
||||
CVE-2022-44096,0,0,4dcd9982dd6ab15a1ac4c3a92611415280558b01bb4c3738c24970129b86c490,2024-11-21T07:27:38.020000
|
||||
CVE-2022-44096,0,1,5d8ac3ead81d2e9c7fb42bc4a45638e4d6c92558bf3fdc1a787d9c2dbbb35657,2025-04-25T15:15:32.820000
|
||||
CVE-2022-44097,0,0,7e314715626013de2719f26fb004226ae821e79dba7252b9d2792b6c9536fc69,2025-04-24T21:15:19.677000
|
||||
CVE-2022-4410,0,0,ac37b87ecb818b8ad9950dbba076719aaaa7e0dca0e40a43f3b4ad06e732d8fc,2024-11-21T07:35:13.063000
|
||||
CVE-2022-44108,0,0,facd5ad5f95c1b33da6f692999d7562212d2983fa0084da573d9aa142d066d2e,2025-04-17T15:15:49.053000
|
||||
@ -209897,8 +209897,8 @@ CVE-2022-44349,0,0,77e0ac1ea0d2dc430605d8413f12a35713a9f95944443f1b60acb50d80e1a
|
||||
CVE-2022-4435,0,0,09fcbc545d95dda0e23a80b812d81848513369bf47210635c1dfeb4dfb7f0751,2024-11-21T07:35:15.420000
|
||||
CVE-2022-44351,0,0,c10897244d37a1ea917124caf93e5b932f852accad76e4264bb7d568b60b590d,2025-04-23T16:15:26.583000
|
||||
CVE-2022-44354,0,0,a640ccf93174beb06eeb361e348e70ec7afe52c1df49c4aee6c99d1af743a995,2024-11-21T07:27:54.647000
|
||||
CVE-2022-44355,0,0,941aa03f1e5fca7681650ba950b69ef8af2a6aa076740015342da670daa7a53c,2024-11-21T07:27:54.787000
|
||||
CVE-2022-44356,0,0,314bf8cbae666cba63ae9d02ceb0420682d7eb1cf35b03e4d11bba6780c14c62,2024-11-21T07:27:54.923000
|
||||
CVE-2022-44355,0,1,46f52b6e90b4ac9041764e7a3e48635cd10698155a1fe005a7d739567fc5f74e,2025-04-25T15:15:32.987000
|
||||
CVE-2022-44356,0,1,7678667c0a4b5e6b43389a64f9a9efa65bbdfbd023ebb596082024943d137780,2025-04-25T15:15:33.157000
|
||||
CVE-2022-4436,0,0,054096d3f3721387e7dc56a27e838b284f4344ca986c9ea87b6f33dddc4e2e72,2024-11-21T07:35:15.543000
|
||||
CVE-2022-44361,0,0,158ecd08bcc8c992b334e8c57664261b8f7baf3f04b2be7d9265673963783b57,2025-04-23T16:15:26.770000
|
||||
CVE-2022-44362,0,0,5de74f0423cb0832b158fc7782276089054534a3cae5a467753066b2e8fe9ab3,2025-04-24T20:15:27.430000
|
||||
@ -210096,7 +210096,7 @@ CVE-2022-44631,0,0,904a5299fff9f1e42831dd9fc3355acf63552007983f7ea10077d27a7a35f
|
||||
CVE-2022-44632,0,0,2189346ebe03fd6a8a3377bf04091ee79ee7a7b61743753d2b08063c09ad712d,2024-11-21T07:28:14.030000
|
||||
CVE-2022-44633,0,0,0bfaac3c672191c188b3f4444616f3b5b039dbdbbe7f7dea28d72fe5e677910a,2024-11-21T07:28:14.150000
|
||||
CVE-2022-44634,0,0,4e993b4b2d7eb3f52420143b74ffe66d7781b97d58c7e36ac1f9cf5ae2377e02,2025-02-20T20:15:43.653000
|
||||
CVE-2022-44635,0,0,1d4e9827860f1d893d17ced644b360aca4a9f601c13d078d5690c46725557645,2024-11-21T07:28:14.380000
|
||||
CVE-2022-44635,0,1,0d9c2c65e766980a30cb1546a922370a17062f5c3380ba54aaa4f361707fe5de,2025-04-25T15:15:33.310000
|
||||
CVE-2022-44636,0,0,e665458aad0f0d22671191865ac84b2be1559efb5003d90593cf542d7bfcf6de,2025-04-22T04:15:22.493000
|
||||
CVE-2022-44637,0,0,da7a53295a19af466bc4ca27b53eda2bd51c45808487aea816d1ed7230628a92,2025-04-23T14:15:24.383000
|
||||
CVE-2022-44638,0,0,cd4dfe11fbb405feccdca7af9c78159d06c16ecbe89ded61e0cc6f9a854d2a6b,2024-11-21T07:28:14.783000
|
||||
@ -210462,8 +210462,8 @@ CVE-2022-45197,0,0,e2797594facab33eb8a64e894f3d80227e2c3fb6b001db583f81a9c4f5277
|
||||
CVE-2022-45198,0,0,2f83eca86b413074047ae0108c6feb23d1202b02e6f4005aad94fb4653e9740e,2024-11-21T07:28:56.987000
|
||||
CVE-2022-45199,0,0,d1c1175a0ef080fdf9a7cc241c1ae7cb7fccb388690911059d96e4fbe19a95c0,2024-11-21T07:28:57.157000
|
||||
CVE-2022-4520,0,0,59776d2d88f47898fb2ed20a9d8341b4b24af397bef01454feef5b302af26bef,2024-11-21T07:35:25.283000
|
||||
CVE-2022-45202,0,0,7ead26bcfbbf435d52e99b1465af1cf5b95d4b9c03ad6c45cc041d150297c878,2024-11-21T07:28:57.310000
|
||||
CVE-2022-45204,0,0,092d58ecc48d5286aa2021f14afa88ee40c26a5c33306ab8571e9b59896fd0f9,2024-11-21T07:28:57.453000
|
||||
CVE-2022-45202,0,1,6d810646cf9e046103e1ed7e39a7ac83759b3cd3ca90520431debb7d12c60d93,2025-04-25T15:15:33.627000
|
||||
CVE-2022-45204,0,1,d2d39768e026bfb3b62a3942046fda292b5b6936c6060f38eb00666b832b7655,2025-04-25T15:15:33.810000
|
||||
CVE-2022-45205,0,0,e6fa24785e02d2437657ce26199e180fe86db56ec5d79b8f1910e6ab0189a808,2024-11-21T07:28:57.597000
|
||||
CVE-2022-45206,0,0,929abf60432f0b5a312a8a73c0c203d7ecdbfba21a1c6a3e48590e9aff8ef12e,2024-11-21T07:28:57.747000
|
||||
CVE-2022-45207,0,0,228696c2311bc6d2e1e96776b82219e109666fce16b81004358914bf00bee35e,2024-11-21T07:28:57.890000
|
||||
@ -210503,11 +210503,11 @@ CVE-2022-45292,0,0,b6751d2b25f768435678970f6173efb33bf49946476133da8f80186049d39
|
||||
CVE-2022-45297,0,0,c3d40692f2eb008a64501f776ffefb318506ed5f4f8f6afcf25ee9a4b43f6c16,2025-03-27T19:15:45.603000
|
||||
CVE-2022-45299,0,0,c3cdec51ad489e268fa0adba84e426154f37216284280ee0f5cd064bdca33ade,2025-04-07T20:15:18.080000
|
||||
CVE-2022-4530,0,0,cf8765ea8602d8dec88060a36fdc1b0bde04159fab852625f65a01f5454769e4,2024-08-30T20:15:06.780000
|
||||
CVE-2022-45301,0,0,7f21a6a89058d69c22a2f6146a515a15fceca6c3b69b098486015a26d4dab81a,2024-11-21T07:29:01.920000
|
||||
CVE-2022-45304,0,0,80a65f6816d77386d34521e9d264fe35e29c557a576795fd8e54012d6ad6ecc7,2024-11-21T07:29:02.067000
|
||||
CVE-2022-45305,0,0,b1619789a0822c2d8f5b37753cd4bc64870c87283b035efbfb171573e11f33af,2024-11-21T07:29:02.210000
|
||||
CVE-2022-45306,0,0,d70e566b4a0d5dcaee18467d88435622533217aae3bf891ab2975136f81e5ba0,2024-11-21T07:29:02.360000
|
||||
CVE-2022-45307,0,0,efec774b802115486fa6f52b3ea251aef6304f75603caf5dd11138d8348915e1,2024-11-21T07:29:02.500000
|
||||
CVE-2022-45301,0,1,480d6e2ee94f475b4c05c28a3766005e335ccfbd76428dc5d82107cc027d0e33,2025-04-25T15:15:33.970000
|
||||
CVE-2022-45304,0,1,41d8df1f88e99f9138aba36e5fc33e614fac6d772d4c583d996527518c3f5287,2025-04-25T15:15:34.133000
|
||||
CVE-2022-45305,0,1,78feafa2372a19987621527382d7262a6231c879403e921e624443a313369917,2025-04-25T15:15:34.287000
|
||||
CVE-2022-45306,0,1,86b3f5d6df5c52ae52718e7f104d9816f0c1c58c1c5d3fcf3525eea3a3ceba00,2025-04-25T15:15:34.437000
|
||||
CVE-2022-45307,0,1,43708ed18c5f7f3db58dbb06cfe9d22255608c044aa65e187e28a715d54b551e,2025-04-25T15:15:34.593000
|
||||
CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf59,2023-11-07T03:58:05.790000
|
||||
CVE-2022-45313,0,0,7df76c36ff95f039b19b9a5010d37f7d1c54257ed685c022114fa169cdb3ec28,2025-04-24T14:15:40.890000
|
||||
CVE-2022-45315,0,0,f8ad030613b7695cdf72a7a1f7b384686f9a9303d0ca9f0fbca7b3b72fb6b0df,2025-04-24T14:15:41.063000
|
||||
@ -243966,7 +243966,7 @@ CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecd
|
||||
CVE-2024-0403,0,0,c9b6ae724b586a946619c8ef0c81865180cac480da67df518481991ba669f2a4,2024-12-31T17:35:53.340000
|
||||
CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000
|
||||
CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000
|
||||
CVE-2024-0406,0,0,9f2b6dbfc4bb6fd60151e853679215a73049311f45bbb54e1ce15eac5966bf97,2025-03-11T04:15:22.860000
|
||||
CVE-2024-0406,0,1,624b2b319e3e58430af78d1cf5b29e249f2f4fa81ef5368a490d7607f60ace06,2025-04-25T15:02:44.233000
|
||||
CVE-2024-0407,0,0,bf7446b50e0f1a0b381fa6716fb89f82f79db67f0ab4fa78f751b5ca6c555100,2024-11-21T08:46:31.027000
|
||||
CVE-2024-0408,0,0,e030a2f701c930b593d7d8ff457fa175da0a5c43fe41606146dc8b73cdf52f60,2024-11-21T08:46:31.200000
|
||||
CVE-2024-0409,0,0,9ef4dd3ff45e8aeeb4d2ab9d9226ad37168b774e60bec3b6e361da09f5c22590,2024-11-21T08:46:31.373000
|
||||
@ -246458,7 +246458,7 @@ CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230b
|
||||
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
|
||||
CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000
|
||||
CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000
|
||||
CVE-2024-11917,1,1,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
|
||||
CVE-2024-11917,0,0,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
|
||||
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
|
||||
CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000
|
||||
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
|
||||
@ -258385,7 +258385,7 @@ CVE-2024-32026,0,0,4773c1e06d48d931c50925611674b98234951891d140d0343af0eb572b751
|
||||
CVE-2024-32027,0,0,6ce23269e48b4377ce344209985d7aeb11dc4ec2bf2a00a704c1d82f0ed8340b,2024-11-21T09:14:21.480000
|
||||
CVE-2024-32028,0,0,22e622c774c542e7be36c4f7d635ed93a3762d447ae249c728e3841b0fb820a3,2024-11-21T09:14:21.583000
|
||||
CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8240,2024-05-30T16:15:10.050000
|
||||
CVE-2024-3203,0,0,b9bd43409050d98289f0520141839a5b27219a64af11671f292622a563cd36d4,2024-11-21T09:29:08.600000
|
||||
CVE-2024-3203,0,1,1e2303c3547909eb91a5135ac853ec048bf0b4a7e25985e7e1f09b52bec09df0,2025-04-25T14:45:29.780000
|
||||
CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce3990347b,2024-11-21T09:14:21.720000
|
||||
CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000
|
||||
CVE-2024-32035,0,0,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000
|
||||
@ -258393,7 +258393,7 @@ CVE-2024-32036,0,0,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597
|
||||
CVE-2024-32037,0,0,949387a92a73eceb7807931e568a1355c21b628d8d44a2415cefd9b4784da648,2025-02-11T22:15:27.930000
|
||||
CVE-2024-32038,0,0,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000
|
||||
CVE-2024-32039,0,0,e75d836ac2de29a0c0b50581e5d6dc6ab8a2307f840547494c81dc65cfcfdadd,2025-02-04T18:03:30.070000
|
||||
CVE-2024-3204,0,0,b1166a23098fea3c82611f1499c0d6fe5df471feadfbca64f6a4601fdb9a6e74,2024-11-21T09:29:08.737000
|
||||
CVE-2024-3204,0,1,e41fa60a24fec2ed23a74802bb999150b30e9aecfea81ee0f33bc35c59482c9d,2025-04-25T14:45:32.610000
|
||||
CVE-2024-32040,0,0,e8f90104a90da8610737c992d81a09858ef163c3a23ec8b9e39f3c7946394fbf,2025-02-04T17:54:59.780000
|
||||
CVE-2024-32041,0,0,e9bed5c3651e2c0893124b7eacf46217be524e42bf05cd50c4a7df68e0e4d7bc,2025-02-04T17:56:13.770000
|
||||
CVE-2024-32042,0,0,d0fd67f1ac88090ecbce5619555ebbbc8e6cafaf16de5009d4624dfe7a912cca,2024-11-21T09:14:22.697000
|
||||
@ -258419,7 +258419,7 @@ CVE-2024-32063,0,0,29f2a1892e1bdbc51f377e16f8f2040d6017a1d65a3f945cee689a886d42e
|
||||
CVE-2024-32064,0,0,dbd54301038cc21ecfd959ae6b4c22d3f3371dcb1f683d2492a8558fb73b537e,2024-11-21T09:14:25.020000
|
||||
CVE-2024-32065,0,0,4e269c3b4617b51abbf7fad0fb189e864f793651d042c42c0e6c76cdaab0ff9f,2024-11-21T09:14:25.143000
|
||||
CVE-2024-32066,0,0,e2d564a6fee7a9e5f3fdab2d0b49dd5d8b58b3bad6120a98104b2feb5f2112fa,2024-11-21T09:14:25.267000
|
||||
CVE-2024-3207,0,0,02d8ec17fdfdc3fcf46708a9320e4db12160865848100afd95416d6fbb5d38fa,2024-11-21T09:29:08.997000
|
||||
CVE-2024-3207,0,1,8fa2f3a0513bff3278c8dcece3222e4d4d6cebf4f86fa253a454a12dcf8d9ec9,2025-04-25T14:38:36.010000
|
||||
CVE-2024-32077,0,0,393ddbdf68ebdbb785c0675192e8c78c93a985173eff509b5f298da2241d687d,2025-03-27T20:15:26.090000
|
||||
CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000
|
||||
CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000
|
||||
@ -258434,7 +258434,7 @@ CVE-2024-32086,0,0,72c9870173bce8d88a34ed70f3c12ae4d8f5b964aaf1ba4378ac5c2cb3f12
|
||||
CVE-2024-32087,0,0,35a7c92bfe089a0106ac1cf4fcc6939a2d286d022cb6e3fe5479d3a1c8ad52aa,2025-04-02T15:07:31.400000
|
||||
CVE-2024-32088,0,0,09b51e56a6b4f889b0e1b07b3f1d01c2b9169677a6b4526ef3345bb6696f4f00,2024-11-21T09:14:26.787000
|
||||
CVE-2024-32089,0,0,ef8adcb2491e9d4f8796a216454a00d3605e19ebfa3a9b9e4d48da5c5d235765,2024-11-21T09:14:26.910000
|
||||
CVE-2024-3209,0,0,5228f92463fd9d1e4264aaefa77852711b145714e3e6ef47ceb920905bbab29e,2024-11-21T09:29:09.260000
|
||||
CVE-2024-3209,0,1,5ff619df9db84dcdbf6f9ad995f12b5d6411fa1a20893e41e9b88a1843ae185c,2025-04-25T14:33:54.060000
|
||||
CVE-2024-32090,0,0,75926a377885047463452d5a3bf9253f75177f2255621a9473d19e9546b9034d,2024-11-21T09:14:27.043000
|
||||
CVE-2024-32091,0,0,8b927b36c6473a1dd9b971a4882da7440d5c3a4627233401d44d0b45f1fc4b05,2024-11-21T09:14:27.170000
|
||||
CVE-2024-32092,0,0,626f7d6fbf6c177cf8867b6f471f5c96daa6af3eec23f87f6edabf0d4ce72181,2024-11-21T09:14:27.290000
|
||||
@ -258530,7 +258530,7 @@ CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242
|
||||
CVE-2024-3226,0,0,d62a9b3627d473bf4da79a5994599afd5c9f26e2657570b8d6caf53a5569c149,2025-02-27T18:07:16.257000
|
||||
CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000
|
||||
CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000
|
||||
CVE-2024-3227,0,1,9e1d1fdbd4e1a4c34f6443452404f929d05306c6519fd21de6a244492ebf2163,2025-04-25T13:52:04.237000
|
||||
CVE-2024-3227,0,1,9f9078b2d11d9d3abdbf01c873581dda3999b4080c3d4878841b1d9262d74bf9,2025-04-25T14:23:04.283000
|
||||
CVE-2024-3228,0,0,08ccf2d9f01838c2ec15add697673a4972e6918a8d27a226bfa96edaba6deef9,2024-11-21T09:29:11.610000
|
||||
CVE-2024-32281,0,0,7a66376ebdecf29b4444f8dc1c8f2ff04e98ba785ec70376a9c15ff0e2aacc79,2025-03-17T14:35:04.940000
|
||||
CVE-2024-32282,0,0,46f9031bc243af75396d20ca183c4cf0747f94988e54cae7dc9de7135eba9c12,2025-04-09T14:20:58.563000
|
||||
@ -271764,7 +271764,7 @@ CVE-2024-49669,0,0,f5af1df54e8b7d7f9667dcdd7a6962c4e16f9b133913097ee0daebd53c256
|
||||
CVE-2024-4967,0,0,4fec59b0c38110a60cb49f88104ba4994971df287b36df28c54db2c2b507f465,2025-02-10T13:42:20.800000
|
||||
CVE-2024-49670,0,0,e6e2ea1c6b1aefc6292e9a4fc9f11356fc42c84627f1848e8c50c0236524cfd7,2024-11-08T14:57:58.190000
|
||||
CVE-2024-49671,0,0,ca8113d74fabe4e2a65c834fdb9dd061048f4f7679635eb0241bc77cd321748d,2024-10-25T12:56:36.827000
|
||||
CVE-2024-49672,0,0,9b42148224eabbb4ba442eca72c86ebfe871626b37b9700a4cf0e41a21e29e63,2024-11-08T15:16:00.327000
|
||||
CVE-2024-49672,0,1,80432de28b0621ee15e36079d608bf1300b6798f2e500190929dd2a0c56def48,2025-04-25T14:02:39.477000
|
||||
CVE-2024-49673,0,0,5cfbaeb230b289604e6a9a17a0e3169a5fd351a546e39f0d9f8cdbcaef1b223d,2024-11-08T14:57:27.190000
|
||||
CVE-2024-49674,0,0,485cc36f092613aa15cc1bf9c84e4863b887e4a287065a305bbaf4e37c253850,2024-11-01T12:57:03.417000
|
||||
CVE-2024-49675,0,0,b7fbdd38c92d79ba1d7bcc6ed0be95e3d48c155f778ae6bd0a0ba79a52dcf7e9,2024-11-06T22:24:22.907000
|
||||
@ -272154,7 +272154,7 @@ CVE-2024-50082,0,0,8e85b94985a472359e7ad0617254fd31b64c77f2f36289cb4bbc5af5d6a75
|
||||
CVE-2024-50083,0,0,de1d51f865c94ab365e97cd039ee3870a1a30b178e746690742c8e78aca3de82,2024-10-30T15:07:02.577000
|
||||
CVE-2024-50084,0,0,b5257c57e10aeb1b0e84c4712b2b356a0ca0c40710c5a3dd9a3145007b3bef22,2024-12-11T15:15:11.340000
|
||||
CVE-2024-50085,0,0,b3ef415259af94dfaf8bcfe0bcff2c51beb7119bdbd5c2e18d18d67b492b8793,2024-12-11T15:15:11.520000
|
||||
CVE-2024-50086,0,0,c6f33f3609f366d17ec962500a85ec8a163f627e45c9fc88fa1d938f52063985,2024-11-08T16:15:46.247000
|
||||
CVE-2024-50086,0,1,0471e85c6b36e1c59b81acd3fcdc1f4238e2c471db3732bf92aa389e342c197d,2025-04-25T15:15:34.760000
|
||||
CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2cf0,2024-10-30T14:40:16.377000
|
||||
CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000
|
||||
CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000
|
||||
@ -276975,6 +276975,7 @@ CVE-2024-5737,0,0,cd5c6423a27e90a610242cf52e502989ca1429c1507f238a032817178b3a04
|
||||
CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000
|
||||
CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000
|
||||
CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000
|
||||
CVE-2024-57375,1,1,82696e9ab6d80cf47263dffbeff460400b01b8eafd4708f416d81909b7716fa8,2025-04-25T14:15:20.567000
|
||||
CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000
|
||||
CVE-2024-57378,0,0,cc86489a14332f4fb3581ace2a871cae306512c21437ab59547843f810ccce83,2025-03-17T19:15:24.463000
|
||||
CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000
|
||||
@ -277867,8 +277868,8 @@ CVE-2024-6194,0,0,edbd6241b7f987aa3a81863460dff0ff43067716b0eb6760c0d7999432f960
|
||||
CVE-2024-6195,0,0,b4caf70d1edba8ea49e05884b1f80490b69a86c6f542eb35b84fa4578f274f1c,2024-11-21T09:49:10.187000
|
||||
CVE-2024-6196,0,0,b1f39cc423aa2f573c963bfda2e2954c189faa3c6a65007de94824a0fe67c7b5,2024-11-21T09:49:10.340000
|
||||
CVE-2024-6197,0,0,341d9f6df4ae3e4e99279c2cfac2e321c8271a012cdb7cb8f491cac94878c7fc,2024-11-29T12:15:08.430000
|
||||
CVE-2024-6198,1,1,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
|
||||
CVE-2024-6199,1,1,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
|
||||
CVE-2024-6198,0,0,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
|
||||
CVE-2024-6199,0,0,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
|
||||
CVE-2024-6200,0,0,9ea80a7e2b2604a341d4266c7e6316677c4c7b3562bbab6c326247f642929732,2024-08-29T17:53:40.483000
|
||||
CVE-2024-6201,0,0,d7508e5c68d1c9f58af9fd9a0f0c496f8219bfb780e580739e4f5ce4075f9531,2024-08-29T17:52:07.493000
|
||||
CVE-2024-6202,0,0,6ede66ad5d88af3e4e7acd719dab516e45d0d130ab973638092e6c9d7ab6930d,2024-08-29T17:48:43.723000
|
||||
@ -284062,7 +284063,7 @@ CVE-2025-22093,0,0,b24898d0dc107f2346d4f833c1e67c8777d58976698fba06e76ef65fa2245
|
||||
CVE-2025-22094,0,0,09059d5b58fbce3fad4eec10c69cc254c1648cdfac3dad0ef08bac2421a9be35,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22095,0,0,4fe140e98f99be6f92b616d06388d067b7260a8e9d2fa1df5fc4a895c33e6785,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22096,0,0,15b45f8823c1996770a96b120ba092f00becf4bccf2d6c3fffa128e5e78bf9e9,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22097,0,0,587655f74ecb9818a87daf42a5d4bb3f061499c9760d94d56f399edc1aabccc1,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22097,0,1,97a4a0d6b56c0154f972186cd420d43ebf62d6e5f01e1cca44d8ecc0935f4b19,2025-04-25T15:15:35.647000
|
||||
CVE-2025-22098,0,0,6c4fdc85168785cf9bc2888afe555bae93a6aae32137479fb1d6e685ac07fbc0,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22099,0,0,34c86007a0246898343f27ac5d47b808a7794c7beb1126406566dff2e90f041f,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2210,0,0,86475c50184989786e182feb1184f7a2855d2c84538b322933b89181189cad61,2025-03-12T14:15:20.017000
|
||||
@ -286124,7 +286125,7 @@ CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149
|
||||
CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000
|
||||
CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000
|
||||
CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000
|
||||
CVE-2025-2470,1,1,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
|
||||
CVE-2025-2470,0,0,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
|
||||
CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000
|
||||
CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000
|
||||
CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000
|
||||
@ -287696,8 +287697,8 @@ CVE-2025-2736,0,0,e7cf98020d21878cb789676050f2b64482f392b9f6e63f08f76876bbe2073f
|
||||
CVE-2025-27363,0,0,eacfc55a70741273922ea22dff488f5249055c44f792def36c729ba640204fe8,2025-04-02T22:15:18.963000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-2737,0,0,9d40414dcab50f45f0c2fa5c2a682879f8d578b9615da1fd43e795859731e769,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
|
||||
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
|
||||
CVE-2025-27370,0,1,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000
|
||||
CVE-2025-27371,0,1,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000
|
||||
CVE-2025-2738,0,0,e698101b4b8baa5b6d74722f9a5a2fd56a7a9ed4b926613e8c3fa693afa80c00,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2739,0,0,f4fbf6446ec2451df539fdc2165d89cda075d9eb4f1c2bfad7a40ecffa8d5b9b,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27391,0,0,c782f9b884022f97c5a60c69190305dd5a13fa0bd9d3036dcc826fa9cec725bc,2025-04-09T20:02:41.860000
|
||||
@ -288090,6 +288091,7 @@ CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d0
|
||||
CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000
|
||||
CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28072,0,0,321583596f07ee7a11b5edcf4c985e43a00852706ec6a22ba926fc63543c9b04,2025-04-17T20:21:48.243000
|
||||
CVE-2025-28076,1,1,db70c8fef1d0820af94d47420f9b4ac9d92041297fcdd83fede7c3a5f63dbbf3,2025-04-25T15:15:36.057000
|
||||
CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000
|
||||
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
||||
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
||||
@ -288150,6 +288152,7 @@ CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed8583
|
||||
CVE-2025-2832,0,0,cb7d7ad79effe9b806885a95f2ec7289cdd7a0d7d71df2be39be5f751b3cbeb5,2025-04-11T16:25:55.093000
|
||||
CVE-2025-2833,0,0,9a52ee089c5cfe9509a1e8871d17816b70a7313c16002967d895358fd72885f7,2025-04-01T15:43:23.657000
|
||||
CVE-2025-2835,0,0,f8c0fd9595480681bd283ae5c205524a5787cd2cba5ce2f877a12280939c81a6,2025-04-01T15:43:38.550000
|
||||
CVE-2025-28354,1,1,b7ca52ed378f87fd5c1ed9b145cf5fcb9eeb626e59116335650caa6a5f0fa671,2025-04-25T14:15:21.560000
|
||||
CVE-2025-28355,0,0,bd8de930b23f6184ab39d0c81e4ee9cdd924adbcf0d121098e5d134a3a60799c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000
|
||||
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
|
||||
@ -288577,7 +288580,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
|
||||
CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000
|
||||
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2986,1,1,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
|
||||
CVE-2025-2986,0,0,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
|
||||
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
|
||||
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
|
||||
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
|
||||
@ -290008,6 +290011,8 @@ CVE-2025-32034,0,0,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04eb
|
||||
CVE-2025-32035,0,0,70a6888bf34d8ab81fb00f2d46e41bf70535bbafb3937f8df2bfd461f8a5aab1,2025-04-09T20:03:01.577000
|
||||
CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82a67,2025-04-09T20:03:01.577000
|
||||
CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000
|
||||
CVE-2025-32044,1,1,82488ff51414fffca606c9feb6d2238106d8fe543bd8d88e42ffdf646c55ce7c,2025-04-25T15:15:36.170000
|
||||
CVE-2025-32045,1,1,104efd8363c05c967ca4a14dfeae9d2f3d006cbfe9ec0bf2e4f766d5a3449f24,2025-04-25T15:15:36.307000
|
||||
CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3205,0,0,0c26d77384caecfacdebfbce05973b001403188f1a4dd9f2048d6f99e8de6522,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32050,0,0,0a47cfad52d7f8e56c261b87c53507ae6a7f0c5195729ce7a2f5bf37484c4b9d,2025-04-07T14:18:34.453000
|
||||
@ -290263,6 +290268,7 @@ CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710
|
||||
CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000
|
||||
CVE-2025-32432,1,1,bb9c6d246a629688898cb376f2801e83dc1b55b2499826cfb239f3d739157757,2025-04-25T15:15:36.440000
|
||||
CVE-2025-32433,0,0,b09c31f6643195b4a1d992889b32cafe0f931f328c07138c1e538f5f63253f0e,2025-04-21T17:15:24.330000
|
||||
CVE-2025-32434,0,0,3d3061039e555845c648c2cd4ddde07ee66a966a450d5d2a63cf7163cec950d6,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
|
||||
@ -290842,8 +290848,8 @@ CVE-2025-3547,0,0,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6
|
||||
CVE-2025-3548,0,0,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3549,0,0,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3550,0,0,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3551,0,0,0af495328e32fa4289c7f25e609803a47f9639c2693a9cf28fe39eba4f6a3f0f,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3552,0,0,2eee97925b40dc2eacf4ba01e66d0bdb8d286a517e59cfd6a72f8d18568a8faf,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3551,0,1,7ed5829e5d026f1c03262321afe4b2fcc0af60af369c627605818f04ad27b702,2025-04-25T14:15:22.650000
|
||||
CVE-2025-3552,0,1,10bc72b296492c08f732779e187dfffb8db758900c33748a57d9854aae10efc4,2025-04-25T14:15:22.790000
|
||||
CVE-2025-3553,0,0,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3554,0,0,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3555,0,0,b7c360be3db59a3fe1c48e7f971bfcde48092d0da4916799343add506c814c87,2025-04-16T12:15:16.760000
|
||||
@ -290895,6 +290901,21 @@ CVE-2025-3618,0,0,304b127c053921d914e116b0c3d51c4ee5b2fd33efb8ce7a0d299de12188b5
|
||||
CVE-2025-3619,0,0,d6505a8fbe042bc57caae6de787bee69f36be813ff60b26db9609f14022d6c10,2025-04-23T18:12:45.323000
|
||||
CVE-2025-3620,0,0,fac1ac0d011a3ca6c7407b0f1dd2c7aa4f0d27161282923069a13fa36620f271,2025-04-23T18:11:43.153000
|
||||
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3625,1,1,3bdf52e9169bfb6678a00932a78a0f452d8e65112fc777501b1fd7239568c811,2025-04-25T15:15:36.753000
|
||||
CVE-2025-3627,1,1,dabf06095078b9860f1769392c38fe36fec3b9ecc6c420da3f4d7317cdc01872,2025-04-25T15:15:36.927000
|
||||
CVE-2025-3628,1,1,423998b402f85d4296c3f8db6c0725e827a10a7ba3b3fe671c0f66abe5fe7a86,2025-04-25T15:15:37.057000
|
||||
CVE-2025-3634,1,1,c249616fcd5306954c7d56d551e8b0519a46a3d77d022c90495e60ea868758db,2025-04-25T14:15:22.917000
|
||||
CVE-2025-3635,1,1,82bb269846d3df9accc7f03b877a95650ed9373767a5bc824156d089abecb1cd,2025-04-25T15:15:37.230000
|
||||
CVE-2025-3636,1,1,baa88194ce5460ba4031b3c76f0ad7b59d61d93b8db26be41142300f1e981740,2025-04-25T15:15:37.363000
|
||||
CVE-2025-3637,1,1,3c38d23c601d6f8f06e183f269a947596b2ff8a03965e630670af08150139833,2025-04-25T15:15:37.510000
|
||||
CVE-2025-3638,1,1,591e988ecde7e9276bf9aa4b0cf755a560e73138187eb5b71e2d87dd843cbe25,2025-04-25T15:15:37.640000
|
||||
CVE-2025-3640,1,1,859eeb5ca538cc9609daa0f57bfb173c4c062bf5438e109a0572e4e175e312d2,2025-04-25T15:15:37.757000
|
||||
CVE-2025-3641,1,1,d7ced09d557988f3d03673d6158a9cba4ba2b4c8f6b5a36fd90c7068e9f39b3e,2025-04-25T15:15:37.887000
|
||||
CVE-2025-3642,1,1,b58524ae75fb0c1ea52ebe6efecec46a031660351cd24908bae81c30facc81be,2025-04-25T15:15:38.013000
|
||||
CVE-2025-3643,1,1,29d31905ca4d8a47767b92c8379d23bffddbb1ce482f5cfaeb6b6f4a96cd0115,2025-04-25T15:15:38.147000
|
||||
CVE-2025-3644,1,1,c0d7f6ccc2417c81e8f33db9f457bd8cc05a229dc602a014b4ccf8b31aeca770,2025-04-25T15:15:38.280000
|
||||
CVE-2025-3645,1,1,745f62b481d4218b210f1e051781b94d0f85c5bddeb53cfe92daa0d1c221718f,2025-04-25T15:15:38.410000
|
||||
CVE-2025-3647,1,1,bdf3593bc1009ac99e7220911651b086757fc39b97ca18d69fba0420972903c7,2025-04-25T15:15:38.550000
|
||||
CVE-2025-3651,0,0,0d88deff7ea7df5b2f76479933db1e164c52ae4da2ee01153c4c1f7101550c92,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3661,0,0,57a3cd623ae52b068097bac07587daee7447c5e10d2129379d83b4265c5b02fd,2025-04-21T14:23:45.950000
|
||||
CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000
|
||||
@ -290930,7 +290951,7 @@ CVE-2025-3696,0,0,32f2de58ed96b74775e2c60a486478c10d70019522c35cc3e9b072109db54b
|
||||
CVE-2025-3697,0,0,efc24626d60f226a7c8893f741d68acfce7ef4171b33da45528fa7fe06636210,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000
|
||||
CVE-2025-37087,0,0,a32cfc93639cde0565b8ba96aa9e37c7b9002ed2bfbea62267aca86b19c1b098,2025-04-23T14:15:29.167000
|
||||
CVE-2025-37088,0,0,71e133b695e1add0e8b8869552c8d0cfe6f0ddc03af2e189826b44ff9e058128,2025-04-23T14:15:29.307000
|
||||
CVE-2025-37088,0,1,71633ca0bded0afe76b62e0125774b335261cca8d10e4cf7c2e40c7ecc23dc6b,2025-04-25T15:15:36.593000
|
||||
CVE-2025-3723,0,0,b4760de84ab5ad290fe476e11df508c34a5e1ece7a524dc9b4dda1f2e95b557b,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3724,0,0,3604e5f95b0ccc5cf202d1d68d9ef517bcacb52e6bf4b156e6577be4c7c5f23e,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3725,0,0,8ec71cb32939874b59fcf524cd8a7503311a419a9177764ff9a7d08a2f806b20,2025-04-17T20:21:48.243000
|
||||
@ -291039,7 +291060,7 @@ CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936
|
||||
CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000
|
||||
CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb939,2025-04-23T19:16:25.977000
|
||||
CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000
|
||||
CVE-2025-3912,1,1,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
|
||||
CVE-2025-3912,0,0,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
|
||||
CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000
|
||||
CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000
|
||||
CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000
|
||||
@ -291210,6 +291231,7 @@ CVE-2025-43012,0,0,18e1af789e53f96a6c881eae07096e79716556b48ee757b9a80a5d7ad315f
|
||||
CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07c4b,2025-04-23T15:29:33.910000
|
||||
CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000
|
||||
CVE-2025-43015,0,0,2a48e113361cb9a0483ab563a6b6e0e9918b5505e9e0f6b69858ea7bf2701b9d,2025-04-17T20:21:05.203000
|
||||
CVE-2025-43016,1,1,d4e5ad3758c737aa4cd5c4bfda5a881ca8580212e69ffa040608a171f6d0e29c,2025-04-25T15:15:39.260000
|
||||
CVE-2025-43703,0,0,9ffdd9596bfa1e88ec9059e0286523ec84cddbc80b74fbe08d9a126526684bcf,2025-04-17T20:21:48.243000
|
||||
CVE-2025-43704,0,0,93215b502ded5b759f01e8bfd4bceefdbd3e881e2349bfb7d79f62333fd912ac,2025-04-17T20:21:48.243000
|
||||
CVE-2025-43708,0,0,dcc5cc9a4e3747e1ffafbd764dd9d656ce28ca0c166ce05480007b6731988175,2025-04-17T20:21:48.243000
|
||||
@ -291220,6 +291242,7 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde
|
||||
CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000
|
||||
CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000
|
||||
CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000
|
||||
CVE-2025-43862,1,1,d337541dda278a63b48e56dbf2722874cf10bdc8cbe8b3446906dd70a2f92f14,2025-04-25T15:15:39.920000
|
||||
CVE-2025-43864,0,0,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000
|
||||
CVE-2025-43865,0,0,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000
|
||||
CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000
|
||||
@ -291241,7 +291264,7 @@ CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a1086
|
||||
CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
|
||||
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
|
||||
CVE-2025-43946,0,0,6b506e54a200df802ce1259ba4eaebc57f351718014e173df406945d407ec7f6,2025-04-23T14:15:29.630000
|
||||
CVE-2025-43946,0,1,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000
|
||||
CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000
|
||||
@ -291331,6 +291354,8 @@ CVE-2025-46417,0,0,90720a97861fe0edf996810e9f8b24cf965d682b200404a75f2856619f814
|
||||
CVE-2025-46419,0,0,1a34f5342e64579d123a08cc24aef78b0d6763ffebef4f99c528ca3f0aa12df1,2025-04-24T01:15:51.360000
|
||||
CVE-2025-46420,0,0,abc71b52b849f726ff8be64ef3abd516b554526457a7cbece372d17d3340fe09,2025-04-24T13:15:45.553000
|
||||
CVE-2025-46421,0,0,5cbb299ad045c28edb58aa77219a50cf2d13612c6ce8ead13af817b802d58002,2025-04-24T13:15:45.703000
|
||||
CVE-2025-46432,1,1,aecf65fba42e2dbb1bf1a1ee12de0d9f753c6cf20c38d0c95ae6a6c2293b6b2b,2025-04-25T15:15:40.347000
|
||||
CVE-2025-46433,1,1,ee6c70859808495f920cc4802ce386ae1292288f3eb3ec4c12efa1fd6aaec717,2025-04-25T15:15:40.480000
|
||||
CVE-2025-46435,0,0,d48bb27c598239c885ff66faff400a31ddacfc2e77f794e65e2deb46d7af7cd2,2025-04-24T16:15:34.613000
|
||||
CVE-2025-46436,0,0,8e2edf5d6c15d988e2c57e12c5b455814b906ca6ebe9a781e03fd35cc0e8207c,2025-04-24T16:15:34.770000
|
||||
CVE-2025-46438,0,0,7e9dd8bb37207b4aaedd1211fdc8230dca9a2429529669a208734dc2ddfe6eb0,2025-04-24T16:15:34.910000
|
||||
@ -291420,3 +291445,4 @@ CVE-2025-46599,0,0,507c3921a2341d2bbda9e73d2f3cef8c521c3ee588d0088efd73881d2da1d
|
||||
CVE-2025-46613,0,0,fb63aa932416287c8229af8ca941c8fc1e3cc17d68277bca805056b66b2de1ef,2025-04-25T06:15:46.273000
|
||||
CVE-2025-46616,0,0,6f77a3deea80513a0e444e82f1b969313a83fb972c392a9b077d9c4200172c06,2025-04-25T07:15:48.643000
|
||||
CVE-2025-46617,0,0,8264fe3c72bbb8b882b06aaed5126806c5af44dc16714e5ba80c3b2cd476f946,2025-04-25T07:15:48.837000
|
||||
CVE-2025-46618,1,1,4e5b2699bfdedc6ad58a2dd050f1132b14684461f25e6c5475feda78ee59e7e9,2025-04-25T15:15:40.957000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user