mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-03-07T17:00:20.214746+00:00
This commit is contained in:
parent
671807418e
commit
5d58920b43
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-1472",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-08-17T19:15:15.117",
|
||||
"lastModified": "2024-11-21T05:10:37.640",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-330"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-17463",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-08-13T13:15:17.357",
|
||||
"lastModified": "2025-02-04T20:15:37.210",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-5847",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-16T18:15:12.713",
|
||||
"lastModified": "2025-02-04T20:15:38.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-5849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-16T18:15:12.790",
|
||||
"lastModified": "2025-02-04T20:15:39.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-8644",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-02-05T22:15:11.003",
|
||||
"lastModified": "2025-02-04T21:15:21.113",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-8655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-02-07T00:15:09.613",
|
||||
"lastModified": "2025-02-04T21:15:21.360",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-8657",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-02-06T18:15:13.963",
|
||||
"lastModified": "2025-02-04T21:15:21.563",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1647",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-01-12T20:15:30.727",
|
||||
"lastModified": "2024-11-21T05:44:48.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -260,7 +260,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1647",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26855",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-03-03T00:15:12.103",
|
||||
"lastModified": "2025-02-04T20:15:40.873",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26857",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-03-03T00:15:12.167",
|
||||
"lastModified": "2025-02-04T20:15:41.077",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26858",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-03-03T00:15:12.227",
|
||||
"lastModified": "2024-11-21T05:56:54.283",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-27876",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-03-01T22:15:14.350",
|
||||
"lastModified": "2024-11-21T05:58:40.010",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-27877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-03-01T22:15:14.460",
|
||||
"lastModified": "2024-11-21T05:58:40.160",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27878",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-03-01T22:15:14.537",
|
||||
"lastModified": "2024-11-21T05:58:40.347",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -95,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-3129",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-12T15:15:16.453",
|
||||
"lastModified": "2025-02-04T21:15:21.940",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:57:32.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36713",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-06T22:15:09.683",
|
||||
"lastModified": "2024-11-21T06:13:57.817",
|
||||
"lastModified": "2025-03-07T16:15:34.533",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3277",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:10.763",
|
||||
"lastModified": "2024-11-21T07:19:11.957",
|
||||
"lastModified": "2025-03-07T16:15:35.637",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -131,6 +151,23 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.launchpad.net/neutron/+bug/1988026",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129193",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3707",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:10.933",
|
||||
"lastModified": "2024-11-21T07:20:04.870",
|
||||
"lastModified": "2025-03-07T16:15:35.833",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41082",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-03T01:15:08.843",
|
||||
"lastModified": "2025-02-24T15:45:38.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T16:15:36.047",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -141,6 +141,14 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-detection-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability-mitigation-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41862",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-03T16:15:09.497",
|
||||
"lastModified": "2024-11-21T07:23:57.490",
|
||||
"lastModified": "2025-03-07T16:15:36.247",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-45449",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-07-16T15:15:10.840",
|
||||
"lastModified": "2024-11-21T07:29:16.553",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
@ -49,16 +71,92 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15",
|
||||
"matchCriteriaId": "547972AF-7F43-4A6D-AFC7-5514DD9995A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89899D10-1343-4276-919A-9C1DF2DB8B55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A77B2499-B3A4-4278-BA0D-59AB59C60352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BAF6A576-C320-4550-B7F8-4FCAE82FB06A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9740A956-D589-4846-8717-B6182EB65F8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9AB8B19B-2B40-4F1B-AE24-1C43D362E4BC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-5279",
|
||||
"source": "security@acronis.com"
|
||||
"source": "security@acronis.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-5279",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22424",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-03-06T00:15:10.640",
|
||||
"lastModified": "2024-11-21T07:44:47.277",
|
||||
"lastModified": "2025-03-07T16:15:36.670",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24757",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-01T15:15:11.683",
|
||||
"lastModified": "2024-11-21T07:48:22.593",
|
||||
"lastModified": "2025-03-07T16:15:36.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25358",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-02T15:15:10.370",
|
||||
"lastModified": "2024-11-21T07:49:26.333",
|
||||
"lastModified": "2025-03-07T16:15:37.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26213",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T22:15:09.840",
|
||||
"lastModified": "2024-11-21T07:50:55.620",
|
||||
"lastModified": "2025-03-07T16:15:37.243",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33979",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-31T19:15:27.163",
|
||||
"lastModified": "2024-11-21T08:06:20.273",
|
||||
"lastModified": "2025-03-07T15:30:57.390",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,9 +86,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpt_academic_project:gpt_academic:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:binary-husky:gpt_academic:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.37",
|
||||
"matchCriteriaId": "F668B717-FBAD-4982-9C25-C725A580EC34"
|
||||
"matchCriteriaId": "1D81EE9C-45BE-44E6-97CC-F839A18169DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3359",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-28T22:15:09.707",
|
||||
"lastModified": "2024-11-21T08:17:05.823",
|
||||
"lastModified": "2025-03-07T16:15:37.470",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10266",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-29T11:15:03.590",
|
||||
"lastModified": "2024-10-29T14:34:04.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.10.61",
|
||||
"matchCriteriaId": "41CD3D93-BD25-4369-887C-EC14EA82BD34"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3176303/premium-addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6102c07-2776-4963-8d16-a779c5979275?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12837",
|
||||
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"published": "2025-03-07T08:15:37.313",
|
||||
"lastModified": "2025-03-07T08:15:37.313",
|
||||
"lastModified": "2025-03-07T16:15:37.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33489",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:15.753",
|
||||
"lastModified": "2024-11-21T09:17:00.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,75 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33490",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:16.180",
|
||||
"lastModified": "2024-11-21T09:17:01.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33491",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:16.640",
|
||||
"lastModified": "2024-11-21T09:17:01.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33492",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:17.060",
|
||||
"lastModified": "2024-11-21T09:17:01.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33493",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:17.547",
|
||||
"lastModified": "2024-11-21T09:17:01.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CA9C494-767C-4CFA-AB07-106298B7B2C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34771",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:29.187",
|
||||
"lastModified": "2024-11-21T09:19:22.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,60 @@
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34772",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:29.610",
|
||||
"lastModified": "2024-11-21T09:19:22.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8FB23E-280D-46FD-BD44-5D4552639E00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2417A0-DD31-46FC-8D5A-9128B86C9352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34773",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-05-14T16:17:30.040",
|
||||
"lastModified": "2024-11-21T09:19:22.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:12.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,60 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "224.0",
|
||||
"matchCriteriaId": "D3887095-4E46-43B0-8A1E-4938EB474419"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0119E8F-1FAF-4A3B-B6E9-20F78360FC82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "829C4AEB-7C8D-408B-A79C-8684753F45E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37158",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T14:15:10.430",
|
||||
"lastModified": "2024-11-21T09:23:19.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,64 @@
|
||||
"value": "CWE-691"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0.0",
|
||||
"matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37159",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-17T14:15:10.693",
|
||||
"lastModified": "2024-11-21T09:23:19.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,64 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.0.0",
|
||||
"matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39696",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-05T19:15:10.673",
|
||||
"lastModified": "2024-11-21T09:28:14.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,64 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "19.0.0",
|
||||
"matchCriteriaId": "2FB8E6A7-2AFB-4E0F-811C-C64344CDFA91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:26.750",
|
||||
"lastModified": "2025-03-06T19:15:26.750",
|
||||
"lastModified": "2025-03-07T15:15:13.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, and W1000. Lack of a boundary check in STOP_KEEP_ALIVE_OFFLOAD leads to out-of-bounds access. An attacker can send a malformed message to the target through the Wi-Fi driver."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Samsung Mobile Processor y Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930 y W1000. La falta de una comprobaci\u00f3n de los l\u00edmites en STOP_KEEP_ALIVE_OFFLOAD provoca un acceso fuera de los l\u00edmites. Un atacante puede enviar un mensaje mal formado al objetivo a trav\u00e9s del controlador de Wi-Fi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5685",
|
||||
"sourceIdentifier": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"published": "2024-06-14T10:15:10.817",
|
||||
"lastModified": "2024-11-21T09:48:09.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,48 +69,107 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.6.17",
|
||||
"versionEndExcluding": "6.4.2",
|
||||
"matchCriteriaId": "AF218717-840A-48E9-9DDC-BA7EB22F54D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.checkmarx.net/?search=CVE-2024-5685",
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/",
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1",
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/pull/14745",
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2",
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647"
|
||||
"source": "596c5446-0ce5-4ba2-aa66-48b3b757a647",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://advisory.checkmarx.net/?search=CVE-2024-5685",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://devhub.checkmarx.com/cve-details/CVE-2024-5685/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/commit/34f1ea1c0ecd403047cd1327569ee391a7201cc1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/pull/14745",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/snipe/snipe-it/releases/tag/v6.4.2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57982",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T02:15:11.397",
|
||||
"lastModified": "2025-02-27T02:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T15:07:16.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,92 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xfrm: state: fix out-of-limits read during lookup lookup and resize can run in parallel. El xfrm_state_hash_generation seqlock ensures a retry, but the hash functions can observe a hmask value that is too large for the new hlist array. rehash does: rcu_assign_pointer(net->xfrm.state_bydst, ndst) [..] net->xfrm.state_hmask = nhashmask; While state lookup does: h = xfrm_dst_hash(net, daddr, saddr, tmpl->reqid, encap_family); hlist_for_each_entry_rcu(x, net->xfrm.state_bydst + h, bydst) { This is only safe in case the update to state_bydst is larger than net->xfrm.xfrm_state_hmask (or if the lookup function gets serialized via state spinlock again). Solucione esto al precargar state_hmask y los punteros asociados. El reintento de seqlock xfrm_state_hash_generation asegurar\u00e1 que el puntero y el hmask sean consistentes. Los ayudantes existentes, como xfrm_dst_hash(), ahora no son seguros para el lado de RCU, agregue afirmaciones lockdep para documentar que solo son seguros para el lado de inserci\u00f3n. xfrm_state_lookup_byaddr() usa el bloqueo giratorio en lugar de RCU. AFAICS esto es un descuido de cuando la b\u00fasqueda de estado se convirti\u00f3 a RCU, este bloqueo debe reemplazarse con RCU en un parche futuro."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.9",
|
||||
"versionEndExcluding": "6.12.13",
|
||||
"matchCriteriaId": "1F3C05B7-5F93-443D-9334-0B93D74DDA67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.2",
|
||||
"matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a16871c7832ea6435abb6e0b58289ae7dcb7e4fc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd4c2a174994238d55ab54da2545543d36f4e0d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e952837f3ddb0ff726d5b582aa1aad9aa38d024d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57983",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T02:15:11.503",
|
||||
"lastModified": "2025-02-27T02:15:11.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T15:07:16.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,77 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: th1520: Se corrige la corrupci\u00f3n de memoria debido a un tama\u00f1o de matriz incorrecto Las funciones th1520_mbox_suspend_noirq y th1520_mbox_resume_noirq tienen como objetivo guardar y restaurar los registros de m\u00e1scara de interrupci\u00f3n en MBOX ICU0. Sin embargo, la matriz utilizada para almacenar estos registros ten\u00eda un tama\u00f1o incorrecto, lo que provocaba una corrupci\u00f3n de memoria al acceder a los cuatro registros. Esta confirmaci\u00f3n corrige el tama\u00f1o de la matriz para acomodar los cuatro registros de m\u00e1scara de interrupci\u00f3n, lo que evita la corrupci\u00f3n de memoria durante las operaciones de suspensi\u00f3n y reanudaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.2",
|
||||
"matchCriteriaId": "6D4116B1-1BFD-4F23-BA84-169CC05FC5A3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2cd12c7fba59f30369e8647a2b726c7280903304",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/db049866943a38bf46a34fa120d526663339d7a5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9221",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-11T13:15:18.100",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T14:55:48.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "0.21.11",
|
||||
"matchCriteriaId": "04CA08B8-5D2B-49BF-97AF-48A54D2C3A2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1298",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1524",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3165873/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/85a8a7df-b472-4a81-b808-a413c158c1cf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-9458",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-07T10:15:16.497",
|
||||
"lastModified": "2025-03-07T10:15:16.497",
|
||||
"lastModified": "2025-03-07T15:15:14.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Reservit Hotel WordPress plugin before 3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Reservit Hotel de WordPress anterior a la versi\u00f3n 3.0 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1157d6ae-af8b-4508-97e9-b9e86f612550/",
|
||||
|
145
CVE-2025/CVE-2025-20xx/CVE-2025-2088.json
Normal file
145
CVE-2025/CVE-2025-20xx/CVE-2025-2088.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2088",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-07T15:15:14.833",
|
||||
"lastModified": "2025-03-07T15:15:14.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Pre-School Enrollment System up to 1.0. Affected is an unknown function of the file /admin/profile.php. The manipulation of the argument fullname/emailid/mobileNumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SECWG/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298902",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298902",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514974",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-20xx/CVE-2025-2089.json
Normal file
141
CVE-2025/CVE-2025-20xx/CVE-2025-2089.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2089",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-07T15:15:15.033",
|
||||
"lastModified": "2025-03-07T15:15:15.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in StarSea99 starsea-mall 1.0/2.X and classified as critical. Affected by this vulnerability is the function updateUserInfo of the file /personal/updateInfo of the component com.siro.mall.controller.mall.UserController. The manipulation of the argument userId leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
|
||||
"baseScore": 5.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 4.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298903",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298903",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514977",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.shikangsi.com/post/share/baecf028-1116-4600-ae9c-f655cc93c29b",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-20xx/CVE-2025-2090.json
Normal file
145
CVE-2025/CVE-2025-20xx/CVE-2025-2090.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2090",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-07T15:15:15.220",
|
||||
"lastModified": "2025-03-07T15:15:15.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php of the component Sub Admin Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SECWG/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298904",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298904",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.515017",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-256xx/CVE-2025-25617.json
Normal file
25
CVE-2025/CVE-2025-256xx/CVE-2025-25617.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25617",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-07T16:15:38.543",
|
||||
"lastModified": "2025-03-07T16:15:38.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Access Control in Unifiedtransform 2.X leads to Privilege Escalation allowing teachers to create syllabus."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/armaansidana2003/CVE-2025-25617",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/changeweb/Unifiedtransform",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-26331",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-03-07T08:15:43.040",
|
||||
"lastModified": "2025-03-07T08:15:43.040",
|
||||
"lastModified": "2025-03-07T16:15:38.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell ThinOS 2411 y versiones anteriores contienen una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando ('inyecci\u00f3n de comando'). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107",
|
||||
"source": "security_alert@emc.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-271xx/CVE-2025-27152.json
Normal file
82
CVE-2025/CVE-2025-271xx/CVE-2025-27152.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27152",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:38.773",
|
||||
"lastModified": "2025-03-07T16:15:38.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if \u2060baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/axios/axios/issues/6463",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/axios/axios/security/advisories/GHSA-jr5f-v2jv-69x6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-275xx/CVE-2025-27518.json
Normal file
86
CVE-2025/CVE-2025-275xx/CVE-2025-27518.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27518",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:39.187",
|
||||
"lastModified": "2025-03-07T16:15:39.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. An insecure CORS configuration in the Cognita backend server allows arbitrary websites to send cross site requests to the application. This vulnerability is fixed in commit 75079c3d3cf376381489b9a82ee46c69024e1a15."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/truefoundry/cognita/commit/75079c3d3cf376381489b9a82ee46c69024e1a15",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/truefoundry/cognita/pull/424",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-275xx/CVE-2025-27519.json
Normal file
86
CVE-2025/CVE-2025-275xx/CVE-2025-27519.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27519",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:39.623",
|
||||
"lastModified": "2025-03-07T16:15:39.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/truefoundry/cognita/commit/a78bd065e05a1b30a53a3386cc02e08c317d2243",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/truefoundry/cognita/pull/393",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-193_GHSL-2024-194_Cognita/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-275xx/CVE-2025-27597.json
Normal file
82
CVE-2025/CVE-2025-275xx/CVE-2025-27597.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27597",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:39.893",
|
||||
"lastModified": "2025-03-07T16:15:39.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.9,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/intlify/vue-i18n/commit/4bb6eacda7fc2cde5687549afa0efb27ca40862a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-276xx/CVE-2025-27603.json
Normal file
60
CVE-2025/CVE-2025-276xx/CVE-2025-27603.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27603",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:40.037",
|
||||
"lastModified": "2025-03-07T16:15:40.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-95"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/commit/36cef2271bd429773698ca3a21e47b6d51d6377d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-27795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-07T06:15:33.273",
|
||||
"lastModified": "2025-03-07T06:15:33.273",
|
||||
"lastModified": "2025-03-07T16:15:40.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits."
|
||||
"value": "ReadJXLImage in JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -51,6 +51,22 @@
|
||||
{
|
||||
"url": "http://www.graphicsmagick.org/NEWS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/9bbae7314e3c3b19b830591010ed90bb136b9c42",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libjxl/libjxl/issues/3792#issuecomment-2330978387",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libjxl/libjxl/issues/3793#issuecomment-2334843280",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.oss-fuzz.com/issues/42536330#comment6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-27796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-07T06:15:35.620",
|
||||
"lastModified": "2025-03-07T06:15:35.620",
|
||||
"lastModified": "2025-03-07T16:15:40.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation."
|
||||
"value": "WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation, resulting in out-of-bounds access to heap memory in ReadBlob."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -52,6 +52,10 @@
|
||||
"url": "http://www.graphicsmagick.org/NEWS.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/883ebf8cae6dfa5873d975fe3476b1a188ef3f9f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/graphicsmagick/bugs/750/",
|
||||
"source": "cve@mitre.org"
|
||||
|
71
README.md
71
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-07T15:00:19.533557+00:00
|
||||
2025-03-07T17:00:20.214746+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-07T14:49:58.017000+00:00
|
||||
2025-03-07T16:15:40.287000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284475
|
||||
284484
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2025-2086](CVE-2025/CVE-2025-20xx/CVE-2025-2086.json) (`2025-03-07T14:15:37.850`)
|
||||
- [CVE-2025-2087](CVE-2025/CVE-2025-20xx/CVE-2025-2087.json) (`2025-03-07T14:15:38.030`)
|
||||
- [CVE-2025-2088](CVE-2025/CVE-2025-20xx/CVE-2025-2088.json) (`2025-03-07T15:15:14.833`)
|
||||
- [CVE-2025-2089](CVE-2025/CVE-2025-20xx/CVE-2025-2089.json) (`2025-03-07T15:15:15.033`)
|
||||
- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-03-07T15:15:15.220`)
|
||||
- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T16:15:38.543`)
|
||||
- [CVE-2025-27152](CVE-2025/CVE-2025-271xx/CVE-2025-27152.json) (`2025-03-07T16:15:38.773`)
|
||||
- [CVE-2025-27518](CVE-2025/CVE-2025-275xx/CVE-2025-27518.json) (`2025-03-07T16:15:39.187`)
|
||||
- [CVE-2025-27519](CVE-2025/CVE-2025-275xx/CVE-2025-27519.json) (`2025-03-07T16:15:39.623`)
|
||||
- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T16:15:39.893`)
|
||||
- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T16:15:40.037`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `40`
|
||||
Recently modified CVEs: `49`
|
||||
|
||||
- [CVE-2019-20171](CVE-2019/CVE-2019-201xx/CVE-2019-20171.json) (`2025-03-07T14:24:42.067`)
|
||||
- [CVE-2019-20208](CVE-2019/CVE-2019-202xx/CVE-2019-20208.json) (`2025-03-07T14:24:42.067`)
|
||||
- [CVE-2019-7238](CVE-2019/CVE-2019-72xx/CVE-2019-7238.json) (`2025-03-07T14:22:47.347`)
|
||||
- [CVE-2021-29621](CVE-2021/CVE-2021-296xx/CVE-2021-29621.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2021-32805](CVE-2021/CVE-2021-328xx/CVE-2021-32805.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2021-41265](CVE-2021/CVE-2021-412xx/CVE-2021-41265.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2022-21659](CVE-2022/CVE-2022-216xx/CVE-2022-21659.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2022-24776](CVE-2022/CVE-2022-247xx/CVE-2022-24776.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2022-31177](CVE-2022/CVE-2022-311xx/CVE-2022-31177.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2023-0784](CVE-2023/CVE-2023-07xx/CVE-2023-0784.json) (`2025-03-07T14:49:58.017`)
|
||||
- [CVE-2023-0785](CVE-2023/CVE-2023-07xx/CVE-2023-0785.json) (`2025-03-07T14:49:58.017`)
|
||||
- [CVE-2023-1962](CVE-2023/CVE-2023-19xx/CVE-2023-1962.json) (`2025-03-07T14:49:58.017`)
|
||||
- [CVE-2023-29005](CVE-2023/CVE-2023-290xx/CVE-2023-29005.json) (`2025-03-07T14:37:51.330`)
|
||||
- [CVE-2023-47714](CVE-2023/CVE-2023-477xx/CVE-2023-47714.json) (`2025-03-07T12:36:39.820`)
|
||||
- [CVE-2023-50307](CVE-2023/CVE-2023-503xx/CVE-2023-50307.json) (`2025-03-07T12:36:39.820`)
|
||||
- [CVE-2024-13668](CVE-2024/CVE-2024-136xx/CVE-2024-13668.json) (`2025-03-07T14:15:36.520`)
|
||||
- [CVE-2024-5985](CVE-2024/CVE-2024-59xx/CVE-2024-5985.json) (`2025-03-07T14:49:58.017`)
|
||||
- [CVE-2024-9008](CVE-2024/CVE-2024-90xx/CVE-2024-9008.json) (`2025-03-07T14:49:58.017`)
|
||||
- [CVE-2025-1869](CVE-2025/CVE-2025-18xx/CVE-2025-1869.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1870](CVE-2025/CVE-2025-18xx/CVE-2025-1870.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1871](CVE-2025/CVE-2025-18xx/CVE-2025-1871.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1872](CVE-2025/CVE-2025-18xx/CVE-2025-1872.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1873](CVE-2025/CVE-2025-18xx/CVE-2025-1873.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1874](CVE-2025/CVE-2025-18xx/CVE-2025-1874.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2025-1875](CVE-2025/CVE-2025-18xx/CVE-2025-1875.json) (`2025-03-07T14:45:38.780`)
|
||||
- [CVE-2023-26213](CVE-2023/CVE-2023-262xx/CVE-2023-26213.json) (`2025-03-07T16:15:37.243`)
|
||||
- [CVE-2023-3359](CVE-2023/CVE-2023-33xx/CVE-2023-3359.json) (`2025-03-07T16:15:37.470`)
|
||||
- [CVE-2023-33979](CVE-2023/CVE-2023-339xx/CVE-2023-33979.json) (`2025-03-07T15:30:57.390`)
|
||||
- [CVE-2024-10266](CVE-2024/CVE-2024-102xx/CVE-2024-10266.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-12837](CVE-2024/CVE-2024-128xx/CVE-2024-12837.json) (`2025-03-07T16:15:37.893`)
|
||||
- [CVE-2024-33489](CVE-2024/CVE-2024-334xx/CVE-2024-33489.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33490](CVE-2024/CVE-2024-334xx/CVE-2024-33490.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33491](CVE-2024/CVE-2024-334xx/CVE-2024-33491.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33492](CVE-2024/CVE-2024-334xx/CVE-2024-33492.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33493](CVE-2024/CVE-2024-334xx/CVE-2024-33493.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34771](CVE-2024/CVE-2024-347xx/CVE-2024-34771.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34772](CVE-2024/CVE-2024-347xx/CVE-2024-34772.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34773](CVE-2024/CVE-2024-347xx/CVE-2024-34773.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-39696](CVE-2024/CVE-2024-396xx/CVE-2024-39696.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-07T15:15:13.750`)
|
||||
- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-57982](CVE-2024/CVE-2024-579xx/CVE-2024-57982.json) (`2025-03-07T15:07:16.373`)
|
||||
- [CVE-2024-57983](CVE-2024/CVE-2024-579xx/CVE-2024-57983.json) (`2025-03-07T15:07:16.373`)
|
||||
- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-9458](CVE-2024/CVE-2024-94xx/CVE-2024-9458.json) (`2025-03-07T15:15:14.370`)
|
||||
- [CVE-2025-26331](CVE-2025/CVE-2025-263xx/CVE-2025-26331.json) (`2025-03-07T16:15:38.650`)
|
||||
- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T16:15:40.187`)
|
||||
- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T16:15:40.287`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
191
_state.csv
191
_state.csv
@ -32430,7 +32430,7 @@ CVE-2008-2988,0,0,537d83846b733f191b5bd4cf9a6e680d0442cb19ac8e074de5196fef91675b
|
||||
CVE-2008-2989,0,0,a564e6d73db62c279491a9c9eed59c9b55085d1c4337edf209af578b122e553a,2024-11-21T00:48:10.743000
|
||||
CVE-2008-2990,0,0,eba446fdb90523cef752ec8b2816ef2f0a0180e9194e5450344ed618d41db604,2024-11-21T00:48:10.877000
|
||||
CVE-2008-2991,0,0,c06441c8d15072989775165f31107538fa46ff9c6d70cb1892d9c64fc09aae99,2024-11-21T00:48:11.017000
|
||||
CVE-2008-2992,0,1,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000
|
||||
CVE-2008-2992,0,0,7791e7d67b5d0ac545b8ec8dd43a0e4998230d96e4fe8975d62a4b74b4cee255,2025-03-07T14:22:47.347000
|
||||
CVE-2008-2993,0,0,4ff6dae709cc34854d1f786ba3620c8013380ad46239c929f68c8a8fa52a8ba5,2024-11-21T00:48:11.360000
|
||||
CVE-2008-2994,0,0,0597746e117c9d7156e751fea86a7abeddefd2ede916fe2b98b5bae313c92409,2024-11-21T00:48:11.503000
|
||||
CVE-2008-2995,0,0,8add2cd5a741a53ba8e416df70fbb49265d426028ba4fdf56ec03a42ffab5827,2024-11-21T00:48:11.647000
|
||||
@ -37592,7 +37592,7 @@ CVE-2009-0923,0,0,9d6bc7aa2f532aeca2611a212fd1d01d7fa3b2e1808aa6c8131b0c233a67d8
|
||||
CVE-2009-0924,0,0,1f976f6c0a294c03107a3b7fceebb6a46d75e27be1795d464608e48d6f4508d4,2024-11-21T01:01:14.270000
|
||||
CVE-2009-0925,0,0,feec22dc0d278fb3ecad4119f3bcb4e6cc9aa8eb71fe8e012c6b352e24e4f2c1,2024-11-21T01:01:14.407000
|
||||
CVE-2009-0926,0,0,912a33629cf2cefe3556a8ceedabd16b35be5a0efeac5595123bbfd790dd486c,2024-11-21T01:01:14.550000
|
||||
CVE-2009-0927,0,1,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000
|
||||
CVE-2009-0927,0,0,889850a826e1de0277ce8eb75c9f53bf90626fbbdc34c1180cfad6afe188273b,2025-03-07T14:22:47.347000
|
||||
CVE-2009-0928,0,0,c0fecc6255e02786116ce96b8321383c3b1ea994544a390fa423376b66ec4763,2024-11-21T01:01:14.860000
|
||||
CVE-2009-0929,0,0,ae1f2ef9734ca0f38acbfbdcf2a24d40ade42afc84b7184d502d35b14ab58447,2024-11-21T01:01:15.020000
|
||||
CVE-2009-0930,0,0,eff3d813782bb023f22ae8edfc659d7632990fa0410bacaa1567fb706b95087f,2024-11-21T01:01:15.157000
|
||||
@ -86924,7 +86924,7 @@ CVE-2016-3638,0,0,7d10d08a9c330e8186c8b1df8131ce4ada33f48ecfa9a498b77a809b275d50
|
||||
CVE-2016-3639,0,0,421db73e8a71b5ada97776de5bc41fde15eb5c7dd19ee95fa07e640c7c6c7281,2024-11-21T02:50:26.267000
|
||||
CVE-2016-3640,0,0,cb1598d890a5236b6bcfc0dbf4eb736e3623e2422c26299b356149123bffa0a0,2024-11-21T02:50:26.407000
|
||||
CVE-2016-3642,0,0,163b466ec35987c6c4ff6c7c3a6b6420d30f51d42875bea496195e99af2ad6a1,2024-11-21T02:50:26.543000
|
||||
CVE-2016-3643,0,1,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000
|
||||
CVE-2016-3643,0,0,94f5630bac8f9697090183c57446245d7d51a083030276cdf22ffb0fae8a3b42,2025-03-07T14:22:47.347000
|
||||
CVE-2016-3644,0,0,2f773b2080e944e29a7225da4cf2b1e15544f83aaacfce580e0be10986def148,2024-11-21T02:50:26.800000
|
||||
CVE-2016-3645,0,0,e6ec797e2c73b3d4d9d38cafe825c448b9919243611ff39d36902ebe02db13f1,2024-11-21T02:50:26.927000
|
||||
CVE-2016-3646,0,0,218a224d61f25a41e628ededad2ee6951c5f8d9d725370ab342b10c8c7355e56,2024-11-21T02:50:27.047000
|
||||
@ -87239,7 +87239,7 @@ CVE-2016-3972,0,0,142b5864b63bfc280b9196f5dc10503afea2cd42fdc57440f77dfb1cc02f80
|
||||
CVE-2016-3973,0,0,64b61a4e20dfcc6c3ca1ba6b7b37a7cf1299a0185d89781ada0686a1dc724993,2024-11-21T02:51:03.727000
|
||||
CVE-2016-3974,0,0,c34eaf17f1393560453bbf29c4145a745a6efb4dd9cd76f0f2476130f2bf1c7f,2024-11-21T02:51:03.880000
|
||||
CVE-2016-3975,0,0,83aa673a7d7d02e9b9867fcdc1d69825fd51722f6c6ca0d8082474b374cc969a,2024-11-21T02:51:04.037000
|
||||
CVE-2016-3976,0,1,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000
|
||||
CVE-2016-3976,0,0,7fac0115515579a37b661bd617aff0d2909add379f6f9a76589a3ddfc8fa826f,2025-03-07T14:22:47.347000
|
||||
CVE-2016-3977,0,0,30f3cd031e35dcbff31cbff191ebde45d75518c8acbc78d2827f448275345ded,2024-11-21T02:51:04.350000
|
||||
CVE-2016-3978,0,0,12d9a451bb9f3a35f8fee4c8b8f336e7e3c81c968d06ffa2e28fc8caa37e3896,2024-11-21T02:51:04.520000
|
||||
CVE-2016-3979,0,0,76d258813b652f5ee36eb61ddb3e21ddd4346c3001992c892299908e0589135b,2024-11-21T02:51:04.670000
|
||||
@ -94900,9 +94900,9 @@ CVE-2017-10926,0,0,f62c5a7bdd10387979ec23b93f0720e14bc87e33ea4363d285692a17ebe09
|
||||
CVE-2017-10928,0,0,54d44869550359987fb5845e6b9096f8e4145f6a6d3ec2636a22741caa760108,2024-11-21T03:06:46.333000
|
||||
CVE-2017-10929,0,0,47adc303ddf736b0af14aff87fd4fdd70a41c76803e80b583b5f66671524b015,2024-11-21T03:06:46.487000
|
||||
CVE-2017-1093,0,0,9a328a371d3aa43cf6e4a54b97d016716cb76fc946e11851d2774b8cd54d53f3,2024-11-21T03:21:19.047000
|
||||
CVE-2017-10930,0,1,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10931,0,1,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10932,0,1,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10930,0,0,af284ea7fde063c0d722998f9df0eaf22040ff94d22d2ddb327779927e1e62c2,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10931,0,0,0d71d321c29e2f8094f03b86115382dcd953a2de4bf6f405799d167929d1cf1f,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10932,0,0,f91f7914487807492ce4cce73961ee3bda5cd7945a51b55074c1e10c429be8a7,2025-03-07T14:22:47.347000
|
||||
CVE-2017-10933,0,0,cf1481e7f399080dd76d32fedb30445c891211da6cb262d719bc996d1f2f5268,2024-11-21T03:06:47.010000
|
||||
CVE-2017-10934,0,0,c87b419ee217d74264bc741931ad0293dfc1764a3f33086a94424f52d0d4d046,2024-11-21T03:06:47.140000
|
||||
CVE-2017-10935,0,0,64594bbf331ebd26bfc841593635b6bbab0781bac59e517b90f5378544be5704,2024-11-21T03:06:47.253000
|
||||
@ -106956,7 +106956,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b
|
||||
CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000
|
||||
CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000
|
||||
CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000
|
||||
CVE-2017-6862,0,1,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000
|
||||
CVE-2017-6862,0,0,0ee0fc04edf15cb28194c9e1aa0c545f93c11f6a28d67fc52beea99e2e201fd6,2025-03-07T14:22:47.347000
|
||||
CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000
|
||||
CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000
|
||||
CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000
|
||||
@ -116241,7 +116241,7 @@ CVE-2018-15807,0,0,4860614cde85e0da34784a34d1164133dcee109fa857a1d60d0bf8ae79b49
|
||||
CVE-2018-15808,0,0,455d016e838e06912ba454dbc791b32313c6dce517a5a90a513152cae9a1cf43,2024-11-21T03:51:29.257000
|
||||
CVE-2018-15809,0,0,d16fc4ec045ff884ac854a3295369387cc90fcfaf38ac1f078e3532c4f171b3c,2024-11-21T03:51:29.397000
|
||||
CVE-2018-15810,0,0,c6fa6edee7f866d094f9f9f4cd68ea2fddd6850ba36412320a4439f6e9695a5a,2024-11-21T03:51:29.550000
|
||||
CVE-2018-15811,0,1,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000
|
||||
CVE-2018-15811,0,0,e7835f3f23fda0d8ec92f6f62d37889b8278a9f4dc78eab1f9eee13a0810a6f2,2025-03-07T14:24:42.067000
|
||||
CVE-2018-15812,0,0,aa48b9c7a99f71771f1ad1123f7f4d0f9d04fd2533dc0d140bdf0a1b07ecab3e,2024-11-21T03:51:29.867000
|
||||
CVE-2018-15813,0,0,eeee8e2865764565421fb3cb76851a575dd32b95666b6744fb9f429381d54523,2024-11-21T03:51:30.023000
|
||||
CVE-2018-15814,0,0,1a1c1d94303941d4f6e8b2bbf713356b09dc58da2f988827b40d4a22ad567104,2024-11-21T03:51:30.190000
|
||||
@ -118335,7 +118335,7 @@ CVE-2018-18320,0,0,97ef2131e3cf9d5d09d7522df5c0f116618a7d18e5a1434a7b0739869774c
|
||||
CVE-2018-18322,0,0,3ac5b0f2536f99c6b307b260d1a55cde391a8faf9e3fc736535c9ab4e3b5d2a0,2024-11-21T03:55:42.483000
|
||||
CVE-2018-18323,0,0,4d898a4c393c16593efb56b95759cb197bbf4dcd3f95abb7dbd9c7c9428c7760,2024-11-21T03:55:42.640000
|
||||
CVE-2018-18324,0,0,9c0c3ee8983950689ca89d0570c1a9e31ca8718e87fd93485d7bd8b7254f31bb,2024-11-21T03:55:42.797000
|
||||
CVE-2018-18325,0,1,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000
|
||||
CVE-2018-18325,0,0,618c28bfeb6a14f87f35e656e1840f50fb93dbf50aff36153e77ac153466e5aa,2025-03-07T14:24:42.067000
|
||||
CVE-2018-18326,0,0,db8f6cdd70338e3bbc4bc3623d3cc122d1e6769392767c9b840dc685704c6110,2024-11-21T03:55:43.100000
|
||||
CVE-2018-18327,0,0,4566d95fb908418b3cf19ef5d0605251696471933c9dca1d2ce4ff8ff122a4a8,2024-11-21T03:55:43.250000
|
||||
CVE-2018-18328,0,0,e4a1f93fd883ec209b4d0fa5026795c497287e16fe37865c3e21fd92f95f9bb2,2024-11-21T03:55:43.377000
|
||||
@ -119835,7 +119835,7 @@ CVE-2018-20059,0,0,a51c9dc7c637cc654ff1697815121d270bdcff703f0c68f60fdcdc128d1e4
|
||||
CVE-2018-2006,0,0,47aaf5fb46e012c3cfb603348c2121f9a9a743a62e7e9289ff736907f0b910fd,2024-11-21T04:03:34.943000
|
||||
CVE-2018-20060,0,0,e1385d2fac30923e70f75b5e2c91f03777167fa23ae8a6a4823f87a95d33d42f,2024-12-27T16:15:22.593000
|
||||
CVE-2018-20061,0,0,1f3af18deb366266af78da0ceefcafeb4c84a14e1efa3997c111e9f0e822cf58,2024-11-21T04:00:49.627000
|
||||
CVE-2018-20062,0,1,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000
|
||||
CVE-2018-20062,0,0,7d43faedc93f8cedfa27d3cc2f0c3d6647511fd87263ed57a2f9482436921d7b,2025-03-07T14:22:47.347000
|
||||
CVE-2018-20063,0,0,34f0aa6d0bd4f9600ecd5e922724926b6fd20feacc9a5c41e95ea24a58e17160,2024-11-21T04:00:49.940000
|
||||
CVE-2018-20064,0,0,db5b51f009f055b35c9ae4c72e7ff854b051d67ecaaf7e317679acbf9d48d3ab,2024-11-21T04:00:50.090000
|
||||
CVE-2018-20065,0,0,b70f15819a2df13416f828d9056d4d769ce048ef842f7ebe753c4b20dcf1d0e4,2024-11-21T04:00:50.243000
|
||||
@ -133934,7 +133934,7 @@ CVE-2019-15945,0,0,33a06b26e906fd5c70eb9d1ee5090af1ff5406b915cd924d396d7acb4ce33
|
||||
CVE-2019-15946,0,0,5a7d83f8665502ce0831bf67797c94c5d4090dfd33f97087c0e89dbbe6c4f94c,2024-11-21T04:29:47.763000
|
||||
CVE-2019-15947,0,0,0af8d327d16a5d79613ddc9e3ec9b1ba1968fa0a3ef1f7159b0ba45fea374f3c,2024-11-21T04:29:47.923000
|
||||
CVE-2019-15948,0,0,f584935d7812d2d0b85a5698b7c7daec96f60298baa5fc482aedf43e9eabcd8f,2024-11-21T04:29:48.073000
|
||||
CVE-2019-15949,0,1,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000
|
||||
CVE-2019-15949,0,0,f868dcabc81a9b4e9437d19cf59fb5a08210a34469985c42909d6c529866f2dc,2025-03-07T14:24:42.067000
|
||||
CVE-2019-1595,0,0,88ccd21b327ff58a8ee4b0ed2c599bb7ffd0b9cdf189f7abdcf010b611bbf4aa,2024-11-21T04:36:53.020000
|
||||
CVE-2019-15950,0,0,2517d3ef69503853d6312e43202c28f44abfec972870fb968db5c09e40e667af,2024-11-21T04:29:48.370000
|
||||
CVE-2019-15952,0,0,28b03c0ce9770ebcb4825ab2fb26e2b2fe76a5b9be6086826eae6fbae26fc9c4,2024-11-21T04:29:48.513000
|
||||
@ -134736,7 +134736,7 @@ CVE-2019-16924,0,0,9fcdfb6b12ecc8988c872cff850f9a12b1670164d1bb55acd50399f671caa
|
||||
CVE-2019-16925,0,0,09e9fe08610d8c3a46ab83d8b1ba82a92ebd59df6db7a4d9bb12062c4d1e8512,2024-11-21T04:31:21.370000
|
||||
CVE-2019-16926,0,0,2fd405866642062f213851dd941fd9525e358af4d2584ef5723f7ad01eeb5570,2024-11-21T04:31:21.510000
|
||||
CVE-2019-16927,0,0,2fb3d9c2c8b5c2842e6547a10802b9b10a58031279b3deedbb8a89126f5833d4,2024-11-21T04:31:21.647000
|
||||
CVE-2019-16928,0,1,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000
|
||||
CVE-2019-16928,0,0,1393412047634ffcead34d249688d50528369038037297056be712dd98b32a40,2025-03-07T14:24:42.067000
|
||||
CVE-2019-16929,0,0,c8559756654e9a62a5c6980e74381ab3fad1e9d0bea48008bca5276d026b6dd3,2024-11-21T04:31:21.970000
|
||||
CVE-2019-1693,0,0,2e2222b2223836b512c461945a8a924406481fff3bb11ce5f908ab466355f121,2024-11-21T04:37:06.883000
|
||||
CVE-2019-16930,0,0,2c3d17f3b220f1a83aac157676c5ab4c85646fd8c0e9135c161bdbe1973570bc,2024-11-21T04:31:22.113000
|
||||
@ -135308,7 +135308,7 @@ CVE-2019-17554,0,0,fd1679d149b915ba1ebb4cd91b6406a705f82d7aacae8b24302b1d840b775
|
||||
CVE-2019-17555,0,0,c79a46cc3235cb0805cf1dabe799ea3cef4664bd98a5a061bde8b9bd0bce7e2c,2024-11-21T04:32:31.097000
|
||||
CVE-2019-17556,0,0,dfc45f73027f031fefc79a0156d2ab7571b3f741c49b1431a9c4c9cb608446b5,2024-11-21T04:32:31.200000
|
||||
CVE-2019-17557,0,0,2765353326187bfb3caf488301fe76eb67bac10840648f333a8f5f229ab08e5e,2024-11-21T04:32:31.327000
|
||||
CVE-2019-17558,0,1,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000
|
||||
CVE-2019-17558,0,0,876a0bcf498e025aa6e344e1b54322159e33123ecd744d0d702301b60b424ce4,2025-03-07T14:24:42.067000
|
||||
CVE-2019-17559,0,0,ece668b06a6f358fb8eb3ee85628d2086d7c6e147d352d7cd06ac3d8ce38ab60,2024-11-21T04:32:31.673000
|
||||
CVE-2019-1756,0,0,29e8e4aa3a8fae54efbea0ea2d8a6835f4a0fbeffc6925b6b0d4310f284e5e1c,2024-11-21T04:37:17.833000
|
||||
CVE-2019-17560,0,0,9cb09af49e361a69d0d03fa2b24de3af3540cbdfdf14fe00a8f4e341c5514a63,2024-11-21T04:32:31.797000
|
||||
@ -136298,7 +136298,7 @@ CVE-2019-19045,0,0,819333f2d4f317f3258589f967c788bd309aa8ecf95c668675e18c04363c1
|
||||
CVE-2019-19046,0,0,8987a45d05deb3cd3a08c21378a7d20a9ee8bc3609cccafcbb5e35b01d4f4898,2024-11-21T04:34:03.773000
|
||||
CVE-2019-19047,0,0,cb343d11b8c4e8202adea20892f3da33685debcea842b5b8a2288e6ea68f15eb,2024-11-21T04:34:03.933000
|
||||
CVE-2019-19048,0,0,3da2b293cdb641ef1900d5f9142e3956b032b28fd106db70735bd795ec71dc93,2024-11-21T04:34:04.083000
|
||||
CVE-2019-19049,0,1,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000
|
||||
CVE-2019-19049,0,0,21d035fd2d82e617c145b1cc248d92f1e81e6ee54de8a53ece4602aa84951688,2025-03-07T14:24:42.067000
|
||||
CVE-2019-1905,0,0,0b0eb4362f19b07aea9340092a53aa6ec78876ad887d29a07805e338537aaff2,2024-11-21T04:37:39.443000
|
||||
CVE-2019-19050,0,0,2a878b8a0e2c61d567fbdd2b56dfd6f9f43844593e9b39ce9662625233ee1896,2024-11-21T04:34:04.403000
|
||||
CVE-2019-19051,0,0,125269ec287e7bfa24a3821003123e06e7e3f35db5c63efafd5dfbf9140883a0,2024-11-21T04:34:04.570000
|
||||
@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e
|
||||
CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000
|
||||
CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000
|
||||
CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000
|
||||
CVE-2019-20171,0,1,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000
|
||||
CVE-2019-20171,0,0,9254023a39412fc7bf79fe1fb2d64a2e0a8595bf5fe241f183a0d5ffdfc1c18b,2025-03-07T14:24:42.067000
|
||||
CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000
|
||||
CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000
|
||||
CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000
|
||||
@ -137276,7 +137276,7 @@ CVE-2019-20202,0,0,225754f16f47c90380fccf8827c98465d47385fda3f6f7310dc138e5e178f
|
||||
CVE-2019-20203,0,0,81f8f500e4dacfa1a464fa6cc2647a4e94891e1a1f31c0e2ff413ca325b05e95,2024-11-21T04:38:12.003000
|
||||
CVE-2019-20204,0,0,71d4f11dc2031a94c71229ceea553dfef2723fe46a773ffae589b572ce57ceac,2024-11-21T04:38:12.147000
|
||||
CVE-2019-20205,0,0,6f4bfd166b4284407214c4899f6e88fd50def278a49e724981580660eb622539,2024-11-21T04:38:12.300000
|
||||
CVE-2019-20208,0,1,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000
|
||||
CVE-2019-20208,0,0,581599c6ee68c9e00985be9e864eeec013c4b0d936d49ed2321a04d327dc3b68,2025-03-07T14:24:42.067000
|
||||
CVE-2019-20209,0,0,efd75c14a5c6e81194b3619da1ff2a9fc5b7f814652709cfbf81fc3f656b480c,2024-11-21T04:38:12.580000
|
||||
CVE-2019-2021,0,0,fbcb1d3495d7618f920e224680b2702bc2f65966152303d5c8b5fa92f30e9868,2024-11-21T04:40:04.950000
|
||||
CVE-2019-20210,0,0,2fc1ff5a0a75d3bd86e6c6aba2c77494fb2307544c863374c5a2e43cb40c28f9,2024-11-21T04:38:12.737000
|
||||
@ -142018,7 +142018,7 @@ CVE-2019-7234,0,0,24df5dc286b4bcb50e15ebc5107b005238769e52042d27e8cecc9fb8011b7f
|
||||
CVE-2019-7235,0,0,3a597d90344429af136670129afd8f8f1b968f443cfa523946d5fe5ae8ddcbd8,2024-11-21T04:47:48.950000
|
||||
CVE-2019-7236,0,0,5fd5f2f0f96fd762fb8ebe091c4921b6cad12fc4a52b5fe15d7027ba4b34ba14,2024-11-21T04:47:49.107000
|
||||
CVE-2019-7237,0,0,eb999e15c8f803705dbadbe525adac0fbf06d738ec0736da398e2c9442c45ef0,2024-11-21T04:47:49.253000
|
||||
CVE-2019-7238,0,1,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000
|
||||
CVE-2019-7238,0,0,d6722fef814b4a78894be63cb5a4065bbde86e5f16454169b8a6d57d5f4008a3,2025-03-07T14:22:47.347000
|
||||
CVE-2019-7240,0,0,3164e6a97d0852ad445683d25bedc5673bf299019e74959848d8e4da9e568270,2024-11-21T04:47:49.550000
|
||||
CVE-2019-7244,0,0,7ed3c3ac5e977098dcf1373742e698928c974f4d4a8492120a670f26b92c5dad,2024-11-21T04:47:49.697000
|
||||
CVE-2019-7245,0,0,c2749efec42c5dc73a9db6e9ad9027c8d51c3b2a86f4a38a20533c1a180f9607,2024-11-21T04:47:49.867000
|
||||
@ -149687,7 +149687,7 @@ CVE-2020-14716,0,0,70d66e7d8e80fb4d43f94bf54c1dc7b730315a1924c7d9ae759bc161cfff9
|
||||
CVE-2020-14717,0,0,1b1936ab258b5ca2f69f41c8a28f5de330c564737f80d45b1d2ba8c5299ad536,2024-11-21T05:03:58.007000
|
||||
CVE-2020-14718,0,0,47b3847c8e0ad7e1cf65e84d8ff206d05b95ba08016fc9fc25c80fe989838ad3,2024-11-21T05:03:58.150000
|
||||
CVE-2020-14719,0,0,2519153b65f7a2eaa8802944bcab1a17ff477cbea89f414b1ba913633e831e3e,2024-11-21T05:03:58.290000
|
||||
CVE-2020-1472,0,0,a760ecffa82ea6edd5efff66434eb8b7abaca72e312f423e2c637019f8b1099e,2024-11-21T05:10:37.640000
|
||||
CVE-2020-1472,0,1,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000
|
||||
CVE-2020-14720,0,0,a6a4dd928dc73ee3a2223498ff7ec3a434a9d87196fb0bba33306609b9652f67,2024-11-21T05:03:58.443000
|
||||
CVE-2020-14721,0,0,677e040400c6b37d2d28fe5fe9e0570e19e78317804c8f50ac90977a0fba7930,2024-11-21T05:03:58.587000
|
||||
CVE-2020-14722,0,0,bfc5f9939bc9c5fbdfa5f30f7afbd4ba716c6cfa243c24942ad536f2e510aab2,2024-11-21T05:03:58.743000
|
||||
@ -151898,7 +151898,7 @@ CVE-2020-17457,0,0,304666ebed82001d08af7fb6abc759208104ca1d7c7e0e0b188d0cfb6c453
|
||||
CVE-2020-17458,0,0,25cd994ed4882520597cb423f48aadd4e5bb2fac882054daf1ab25aeb596c24b,2024-11-21T05:08:09.513000
|
||||
CVE-2020-1746,0,0,5ade46611c222a1c9d0844bd94b21ff8c5e86579026017bbfd7a5cd2ec833167,2024-11-21T05:11:17.757000
|
||||
CVE-2020-17462,0,0,dec14e35b954be98e4f456b3da60cf7ea2601d7108dbc0df7cf9c9630fd61564,2024-11-21T05:08:09.663000
|
||||
CVE-2020-17463,0,0,d2624e49add7398a1ebda0a27e4a31db9f8c1fa4637cad96a4477ded8f065489,2025-02-04T20:15:37.210000
|
||||
CVE-2020-17463,0,1,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000
|
||||
CVE-2020-17464,0,0,e860379cc0b2b1fe9b1929183acf4fefa76c4c56161d2bb20eef1936bf91b085,2023-11-07T03:19:11.557000
|
||||
CVE-2020-17465,0,0,6fa34c2a07df8f06e1ed6962dc93c0567cc563e0eaa10999b4977a3c63529215,2024-11-21T05:08:09.990000
|
||||
CVE-2020-17466,0,0,d223484e1c0a2bec6302370e40313a4d5cb6ebf8c1a04b6cfa404cbad72f30df,2024-11-21T05:08:10.137000
|
||||
@ -161321,8 +161321,8 @@ CVE-2020-5842,0,0,dcb0f27f4317979c203b2c51bfab7cda27207ed5b71ee1c718a48e678a9f1e
|
||||
CVE-2020-5843,0,0,8378e8ca1d755c52b556a28b9a03d7cb9bb7f46e105c7df46b82ac95ec1f9c73,2024-11-21T05:34:41.133000
|
||||
CVE-2020-5844,0,0,b894bec74321616318be63acacbc6a64ba72f10a231dbf6aa0116c83f7aecd7d,2024-11-21T05:34:41.263000
|
||||
CVE-2020-5846,0,0,d2f3ffda68de3ecb9a5597e60cdc311709fce66834c02bfdd0ee4735d05b664e,2024-11-21T05:34:41.400000
|
||||
CVE-2020-5847,0,0,148ae289735b8653fae2fda53e3b573000c0c22251ad4d8a160c28a10fa44e8c,2025-02-04T20:15:38.803000
|
||||
CVE-2020-5849,0,0,c96e336b8e81cc4b23b0122c703ba811e64671db678cb8f602f4b706461b160b,2025-02-04T20:15:39.013000
|
||||
CVE-2020-5847,0,1,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5849,0,1,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5851,0,0,0e6b8a980d42461bdeef132eb484123c19dc7a4e5f253f6abcd12b6bfeb3765c,2024-11-21T05:34:41.807000
|
||||
CVE-2020-5852,0,0,a0d14d33aa5d76474940760e02808323b0255fdfa7ef7263fbf5fb39b4b3f9c4,2024-11-21T05:34:41.950000
|
||||
CVE-2020-5853,0,0,ec5939c37c53e690929c801d26a949d22ea000c2d5657b7eea502e2f09c386d8,2024-11-21T05:34:42.357000
|
||||
@ -163716,15 +163716,15 @@ CVE-2020-8637,0,0,2217c7386170afe6b12de345c9c160276185b7c89e0dcda019627a55f9fb85
|
||||
CVE-2020-8638,0,0,32c95e1823a3ea2f35b4d4087afa45e38f0aa3a6d2ec116bb344b25d3aabb7c5,2024-11-21T05:39:10.230000
|
||||
CVE-2020-8639,0,0,8f89ab272a0ef46c31d75a3858f8022a4d9111848565bd65e9343b97ffd6fd3f,2024-11-21T05:39:10.353000
|
||||
CVE-2020-8641,0,0,0d1c513fef1a173802745a61846ead8e61fdbfe5801ff740fb1aca89505c7ddb,2024-11-21T05:39:10.483000
|
||||
CVE-2020-8644,0,0,4a513e833768052e94cdb586f9f4f9a5954cba100bb8afcbe81e0f148f918af4,2025-02-04T21:15:21.113000
|
||||
CVE-2020-8644,0,1,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8645,0,0,2a03db6fa2b770ea0a59249c2f2585abe34df165b555d7ac782ed537d96c9f97,2024-11-21T05:39:10.747000
|
||||
CVE-2020-8647,0,0,f068f0e57339478200309cb959bd7fd17a53a6b7117775a657951595e793600e,2024-11-21T05:39:10.877000
|
||||
CVE-2020-8648,0,0,8fdc221d2ebb6dc8fb93bf4742dc8dfa23ef56dd805cde8998884f9ff56ef701,2024-11-21T05:39:11.030000
|
||||
CVE-2020-8649,0,0,37c65f7d0c74c220929895992a0c92fb2e2d2fac5e634773795c784a74ea10b0,2024-11-21T05:39:11.190000
|
||||
CVE-2020-8654,0,0,a3a76c24f693047768fb5b923623c39d10ba6a5e4698aa407fa5faf6a5f662ed,2024-11-21T05:39:11.347000
|
||||
CVE-2020-8655,0,0,178f17f1d5f32b498840e903fd14586d50751635c32fd7aeaf31b57eff3dfe16,2025-02-04T21:15:21.360000
|
||||
CVE-2020-8655,0,1,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8656,0,0,4786fc01a1c7dfdec763b31be079dfcb520c2439d320352e6b9d715294d319ca,2024-11-21T05:39:12.467000
|
||||
CVE-2020-8657,0,0,438d4382b40ba7fec80b3db67b8733969df33003b03a35203155e5500813f546,2025-02-04T21:15:21.563000
|
||||
CVE-2020-8657,0,1,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8658,0,0,4573f49c55d9f3879273cc4a97630ce9e9cf8aae9a1c623e533e4c3238f46259,2024-11-21T05:39:12.757000
|
||||
CVE-2020-8659,0,0,0058e06c3c4af6d2c2f20fc9f830318b2a5c5c55545999cea86f50e52d91077f,2024-11-21T05:39:12.880000
|
||||
CVE-2020-8660,0,0,c8eb75df1246ad70e7d88e25da868f2489d66b14a433ad144d2fcc75766974f8,2024-11-21T05:39:13.013000
|
||||
@ -166303,7 +166303,7 @@ CVE-2021-1643,0,0,4060b809fead12bb9d67f78be5df56a37d87ee4646fa6e6df86052c1df4b14
|
||||
CVE-2021-1644,0,0,efef402905230983da5bdfdf12143b0e50435ebe4d4fb21c1fe5c122d402ef18,2024-11-21T05:44:47.930000
|
||||
CVE-2021-1645,0,0,25258a77695180ba77c99bd2c6823d73e5a5f58b3767fb51d6c767a59a2b7412,2024-11-21T05:44:48.047000
|
||||
CVE-2021-1646,0,0,dd5db096be9e6e8c998f36cbbb20089c7e8840cca55aeece215ab90e471c3d0d,2024-11-21T05:44:48.180000
|
||||
CVE-2021-1647,0,0,be2c26c2dccb7ab1f8fba3c2545668363ab71b87ba8040f62766d5b531b2455c,2024-11-21T05:44:48.307000
|
||||
CVE-2021-1647,0,1,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000
|
||||
CVE-2021-1648,0,0,442992d9469b43ae43cc0ca7fd4e0fc4dea65be20b3af1ea5c7d4bd9dcb9c3fd,2024-11-21T05:44:48.457000
|
||||
CVE-2021-1649,0,0,b02803d777e0231640dee4f5831d7188c99fb48f5d6a9a75e7a6945731355893,2024-11-21T05:44:48.590000
|
||||
CVE-2021-1650,0,0,bf70b4a3c0b73b36f07cd9c7e86a8dc7f79730c1ed3fc35784abee243ce739fe,2024-11-21T05:44:48.727000
|
||||
@ -172381,9 +172381,9 @@ CVE-2021-26843,0,0,e22c85b76cfecdfffe08cb6d2ad5cbb9f4c9a7db43ad8249c84af125becc2
|
||||
CVE-2021-26844,0,0,02cc15f895219c53d39be6e1f4c6a51757746b0bf8fffc23217ee117f819801d,2024-11-21T05:56:53.557000
|
||||
CVE-2021-26845,0,0,d16f5d1bf8b70b13ab07460aba2ea681026589dea89b8756fa7229f826d22ecf,2024-11-21T05:56:53.713000
|
||||
CVE-2021-26854,0,0,c4bcbb9b671013b7c4c294d860d3419f36080d16f644917d5e58ee1c30b46045,2024-11-21T05:56:53.857000
|
||||
CVE-2021-26855,0,0,c341a85fdf72b7a3ce00bfaed1a11b84082484487cfc74cf0926e4cf07311b54,2025-02-04T20:15:40.873000
|
||||
CVE-2021-26857,0,0,0321dd18fa858f61ee590f6b2e93a7397316308d7e541958f0ffeb14216fac42,2025-02-04T20:15:41.077000
|
||||
CVE-2021-26858,0,0,543dbe64013d93d6e82a9c895da08a2138d91ba911e38fb691df4f54f07c0d2f,2024-11-21T05:56:54.283000
|
||||
CVE-2021-26855,0,1,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26857,0,1,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26858,0,1,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26859,0,0,5355f8a65fd9a2daa85a7f9efe95e508d18de450153222105a4194499f856cab,2024-11-21T05:56:54.420000
|
||||
CVE-2021-26860,0,0,cb9bc2194420b618bd81851fe6d2a08a1be6a880c0edf922353c2faf291197c9,2024-11-21T05:56:54.547000
|
||||
CVE-2021-26861,0,0,6f3d935057cf053b76c7041731ccc09d592a8c11b4860b84ecf1bdff18fea857,2024-11-21T05:56:54.663000
|
||||
@ -173152,9 +173152,9 @@ CVE-2021-27859,0,0,993f7636ab44f63e13208197998ae7db16b9d062167251918517bbcbfe7e1
|
||||
CVE-2021-27860,0,0,dfab7aeaff73bc97888f133c03739b011132bd10ea3c893619d85892c04dedfc,2025-02-04T20:15:42.070000
|
||||
CVE-2021-27861,0,0,2e874793f7920b781935eba26fcbb236ca8c4ecce3e14a7ee776186e960e718b,2024-11-21T05:58:39.770000
|
||||
CVE-2021-27862,0,0,fc7e14948885397a858c226d74b5728d90a6f062785c550fae571d5169db34ae,2024-11-21T05:58:39.887000
|
||||
CVE-2021-27876,0,0,6bed32be5997809a85bbab8ccbdc4bd432fa31f82e9d3e5c6eaa48844e22ea8d,2024-11-21T05:58:40.010000
|
||||
CVE-2021-27877,0,0,6bfed69baa44a1cd79399e8251321838a3c0507783fe330d8e03847b6842defc,2024-11-21T05:58:40.160000
|
||||
CVE-2021-27878,0,0,4d868fa7f3f6936eea4da2953de01b5fcf3f545e4181d522efa85c6a15e3e539,2024-11-21T05:58:40.347000
|
||||
CVE-2021-27876,0,1,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27877,0,1,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27878,0,1,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27884,0,0,07ef68bb7a49a5e41de55ecdb94a5317031927a7badddc4c1dcd133b77daf30c,2024-11-21T05:58:41.470000
|
||||
CVE-2021-27885,0,0,6846b02647cb7751bb45d0264c610c218765b765257a96f038efde08963f4d38,2024-11-21T05:58:41.690000
|
||||
CVE-2021-27886,0,0,c596fb96a9799b2965bc5d05f26e95b1ee896238a8a7188e7a76c1cda9de11e8,2024-11-21T05:58:41.943000
|
||||
@ -174262,7 +174262,7 @@ CVE-2021-29617,0,0,9282d36ab379047bed777a5e35deacd1e0575ef6e75507cf39cf4dcae2e7a
|
||||
CVE-2021-29618,0,0,194d4344d2fcf4ccd0f88ea5b65d6a910a0e9559a4974341f57cd78fd81ae3dc,2024-11-21T06:01:30.350000
|
||||
CVE-2021-29619,0,0,00a25d6082589853bca127e06f5e411bebce27f4a00260438b8cdd300763e97d,2024-11-21T06:01:30.480000
|
||||
CVE-2021-29620,0,0,704ad315ab1e6d012dbe4076f98dbc92c3ff90a91f673743cad74e3b7c18942e,2024-11-21T06:01:30.600000
|
||||
CVE-2021-29621,0,1,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000
|
||||
CVE-2021-29621,0,0,39533b7a420390b3d7d905422af5f63d677ff314703da35debaceb4d1287caf7,2025-03-07T14:37:51.330000
|
||||
CVE-2021-29622,0,0,d2899e830da51139c8d424727c70985c06567ad17d63b6f66ede76ef6c7d3699,2024-11-21T06:01:30.877000
|
||||
CVE-2021-29623,0,0,0759820b8e134268198dc843b4c7c1ea75ddd67d65ae513f9c7f3c31e5ac3f8a,2024-11-21T06:01:31.007000
|
||||
CVE-2021-29624,0,0,34811731354719bcc6bd50d5f7b3cef38f1a63b507ce803b6e12be5dffce564e,2024-11-21T06:01:31.150000
|
||||
@ -175649,7 +175649,7 @@ CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b
|
||||
CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000
|
||||
CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000
|
||||
CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000
|
||||
CVE-2021-3129,0,0,9994df7613e57bf94027d16b1fba3e4148ba3fb5bc8610bf6dbcc5810386cb67,2025-02-04T21:15:21.940000
|
||||
CVE-2021-3129,0,1,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000
|
||||
CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000
|
||||
CVE-2021-31294,0,0,d4eb37e109e629565a20435c105b1449a6efda6d20165a8248479e9ceb3a9e5b,2024-11-21T06:05:24.390000
|
||||
@ -176736,7 +176736,7 @@ CVE-2021-32801,0,0,3c6dd25a05868da4a86c030a2817b3d451feae5897a19131855eb266b60fb
|
||||
CVE-2021-32802,0,0,d236a8457168dbf023cd6d8ad06e6c6c3774018a64b408098c15d389cd53efd1,2024-11-21T06:07:46.450000
|
||||
CVE-2021-32803,0,0,c3c9ab6affbf0a5ae127dff1b4146143431cf108914bbb69b17c8c4ca6823875,2024-11-21T06:07:46.637000
|
||||
CVE-2021-32804,0,0,667d9ec0fbb9dc2bc8940f6df11d93ca5972baf8123871a037d7c2d42c269c4d,2024-11-21T06:07:46.800000
|
||||
CVE-2021-32805,0,1,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000
|
||||
CVE-2021-32805,0,0,13f9e1d5ee81f723d19798df182da7dd5182e9caa59b22b071130eea3ecc41e6,2025-03-07T14:37:51.330000
|
||||
CVE-2021-32806,0,0,f32f9ae0cbeab289fa5cfcf1745216957a12dfe502d7378612e30036a32d4e7b,2024-11-21T06:07:47.067000
|
||||
CVE-2021-32807,0,0,3a550a99818711747837014ae0e7ae011001a9c4fb372a57b534f58137b4ec4a,2024-11-21T06:07:47.197000
|
||||
CVE-2021-32808,0,0,fa771f7f84d0048b919dafe1fd07575baf9244e1734ab1de2baa00dfab809c4b,2024-11-21T06:07:47.340000
|
||||
@ -179564,7 +179564,7 @@ CVE-2021-3671,0,0,2e98707d05a3d5dd6bb82a24011add61bf4093e9d7d7c0ef54e15be3c44712
|
||||
CVE-2021-36710,0,0,30d3f6219f02843c7db6762f93c7bb35bf6a07d0e6a066f808321a415ace3d4c,2024-11-21T06:13:57.340000
|
||||
CVE-2021-36711,0,0,ff91331951413364cc0c150d1e96e169d83ffdc9156d5799838288065cb37de3,2024-11-21T06:13:57.510000
|
||||
CVE-2021-36712,0,0,86f9316723405930d5e8c829281e4fa6d3291043cf5a570cded38ee796a6d85d,2024-11-21T06:13:57.670000
|
||||
CVE-2021-36713,0,0,eaaf5637f08ddd66d5ca729b7b9926ffd326110fe975632fe207875bd8eae11a,2024-11-21T06:13:57.817000
|
||||
CVE-2021-36713,0,1,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000
|
||||
CVE-2021-36716,0,0,5662ce55ac5c83778feb49af51a4a7a09a851153e5c2c010efd65d93cb4fdbba,2024-11-21T06:13:57.973000
|
||||
CVE-2021-36717,0,0,ec369d3ecfa389c0148878e8348c016478ec723b90d9011f790f892d64463eba,2024-11-21T06:13:58.143000
|
||||
CVE-2021-36718,0,0,775941130e24c7529766d8f19f5e9007abe25d5d504a9926d5087c9e9f872619,2024-11-21T06:13:58.283000
|
||||
@ -183272,7 +183272,7 @@ CVE-2021-41261,0,0,83bba306350529d8dabc8c83cbeb7046dc564256ae523575810b60d44e7a9
|
||||
CVE-2021-41262,0,0,bf80ac48037448e6df08a82bda34068b2ac600309a6a8351eb4a6c54cdcad830,2024-11-21T06:25:54.900000
|
||||
CVE-2021-41263,0,0,310b0871228f23a9b74738a9d46d0e79d3f808295715b91cd825c950ac2e0457,2024-11-21T06:25:55.033000
|
||||
CVE-2021-41264,0,0,801d2fa4216ccca6242c40b3a379b65daa94386bf06f22ae3549b97d95d66978,2024-11-21T06:25:55.170000
|
||||
CVE-2021-41265,0,1,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000
|
||||
CVE-2021-41265,0,0,27a10ac76dcef45638a8ac7299bed32511224e23b4cc948f550b36825e4ac50f,2025-03-07T14:37:51.330000
|
||||
CVE-2021-41266,0,0,ee67f3b30157c7c7f9739c64138b97c04e26dedcdad6f83b024214f0b6849071,2024-11-21T06:25:55.447000
|
||||
CVE-2021-41267,0,0,06bdb3467f4577c7e3c0c73a0be52e604a93f0d1247e5f0d74efb2be3411d0c9,2024-11-21T06:25:55.573000
|
||||
CVE-2021-41268,0,0,4802f87b6baa03fec9b494114a47b62395b260260f7c05c5038061d133694b7d,2024-11-21T06:25:55.713000
|
||||
@ -191396,7 +191396,7 @@ CVE-2022-21655,0,0,0bb88de39562d74edb3c5dc14260c1aa5cbe0977dc72fbaaa5c5907520b12
|
||||
CVE-2022-21656,0,0,ae7f6f10a25d538e61091eca399af275b55323a531d01051babac34f68f2ea48,2024-11-21T06:45:10.103000
|
||||
CVE-2022-21657,0,0,b61506454d82cdd81703ed3b3ecbcc360c8d9cea3021356f27ad4df0658b70e4,2024-11-21T06:45:10.227000
|
||||
CVE-2022-21658,0,0,d719323787fe690295be479284556910df4cce28acd3a4271d2df3c828e3c587,2024-11-21T06:45:10.343000
|
||||
CVE-2022-21659,0,1,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000
|
||||
CVE-2022-21659,0,0,c54b2d3b0b4e31a51568bfe5d874918614ad866f2c364f41572f69b929a14f39,2025-03-07T14:37:51.330000
|
||||
CVE-2022-2166,0,0,db40856ed54a003d747ba667ab28b0b777e7ebe27eab76bf63b0fa68659a981b,2024-11-21T07:00:27.670000
|
||||
CVE-2022-21660,0,0,e50b313e5f4482d2e57a75d95baab2766781ef80064185e266441dcc35a29fac,2024-11-21T06:45:10.633000
|
||||
CVE-2022-21661,0,0,ad357031852de2d6644171e49bb6eaa4f4bbf912a4d0ba884c85ab873ba8fc58,2024-11-21T06:45:10.750000
|
||||
@ -194263,7 +194263,7 @@ CVE-2022-24772,0,0,6d621b212079b521cfec536bfc00e1cdf6229c234d240f6fcaf7a6d823905
|
||||
CVE-2022-24773,0,0,f964173bb7f73806f9514ae8330f53cc50353516625bf354de792d9345abe2a3,2024-11-21T06:51:04.093000
|
||||
CVE-2022-24774,0,0,e8bad2914e190a27904c4a729a974bff227be750d052cd8fa5b5418bfeba9c6d,2024-11-21T06:51:04.210000
|
||||
CVE-2022-24775,0,0,a89d20f6084336008112954573b5daf0114c550ce2d67d379f72d396931f18a1,2024-11-21T06:51:04.337000
|
||||
CVE-2022-24776,0,1,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000
|
||||
CVE-2022-24776,0,0,ea502352631c6cddc7f72c9536a55cdf4c3fea997ea70ef7e5b663e5fbab4789,2025-03-07T14:37:51.330000
|
||||
CVE-2022-24777,0,0,4ae70f6204e3c0de25fbf985bc164399cafcff14ae66595c415bd3f9563c5849,2024-11-21T06:51:04.610000
|
||||
CVE-2022-24778,0,0,6a5d591d4ff287175baa38de8a91d18e5f05a33ad86097a680b95921569c0552,2024-11-21T06:51:04.737000
|
||||
CVE-2022-2478,0,0,7af5e30986fb9bf51521310ba62a96e4a2422836c99ef22f37780052983c46cb,2024-11-21T07:01:04.507000
|
||||
@ -199551,7 +199551,7 @@ CVE-2022-31172,0,0,7cd9bbbf9b368874155a4d61081b8e77b23805251922a97f9af3a9ddf2bec
|
||||
CVE-2022-31173,0,0,2febc62e1a3a54d82009b58dd26871e86a20ff205513f52ef4ffc35f7bee528d,2024-11-21T07:04:03.200000
|
||||
CVE-2022-31175,0,0,66bd23a7faf006cd60074400cfa39699bdce3330f83c19b81ff998a44cda9420,2024-11-21T07:04:03.343000
|
||||
CVE-2022-31176,0,0,cc99b523e99dfb029a0458f6ebd536fbe395e927d120462d7d40e06968e26a7c,2024-11-21T07:04:03.473000
|
||||
CVE-2022-31177,0,1,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000
|
||||
CVE-2022-31177,0,0,3cde9bc6dc49ee0496407c65f1c86cdf434cec1b5015a202e07ac3a10d045ef1,2025-03-07T14:37:51.330000
|
||||
CVE-2022-31178,0,0,18b14454630e74a88e35da2b6639bc5f9a9a45604736c7bbddbfe831ab8237c1,2024-11-21T07:04:03.733000
|
||||
CVE-2022-31179,0,0,1ed6f4ace29b1759241c40df1c9bf6b4b22a23f458fc7b8e045d5ff2502bff81,2024-11-21T07:04:03.850000
|
||||
CVE-2022-3118,0,0,f5cf3681168aa2b9e58ed05115af196bca87b81960ed57d08b4414c34c75f504,2024-11-21T07:18:51.780000
|
||||
@ -200879,7 +200879,7 @@ CVE-2022-32765,0,0,288c46848ca90bc0970228e4c106898962265fe5ef966fdb621059ec6e48a
|
||||
CVE-2022-32766,0,0,f8af3e288bc19c30281a1d0ccfabd1595b6500716a3aad9106452d2f8828a86f,2024-11-21T07:06:55.190000
|
||||
CVE-2022-32768,0,0,c7d4fb2b17fec1c41f721ec7f12f58d3dd128594cc56036f151ab10b94ff5402,2024-11-21T07:06:55.320000
|
||||
CVE-2022-32769,0,0,2bcd9e4801c613d9c501665e694fc1ccc87f19f08f4bfd7ec0020d43aabddf84,2024-11-21T07:06:55.457000
|
||||
CVE-2022-3277,0,0,4dcbf73632c2fb0f22f8b004b14c1b10deeeb35491ed4d14f04bf90315640cf9,2024-11-21T07:19:11.957000
|
||||
CVE-2022-3277,0,1,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000
|
||||
CVE-2022-32770,0,0,2117cde9ddfe9fc4190507bbd939b0b74257bcc2e26270c25a9c72ab9762f3d1,2024-11-21T07:06:55.587000
|
||||
CVE-2022-32771,0,0,71c6f498ac24328dd596adccf278375f0d0157867acd5b6c9e0a42d0130dfd43,2024-11-21T07:06:55.717000
|
||||
CVE-2022-32772,0,0,e3b68231aad472dc58151c5e29625a9adae7c2eb8114c08e61c9139b03dce259,2024-11-21T07:06:55.860000
|
||||
@ -204363,7 +204363,7 @@ CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40
|
||||
CVE-2022-37067,0,0,073a63c94609fb61c3c7478f5894b6cef5a4e645ffd2533f7feff90902f4bfe5,2024-11-21T07:14:23.250000
|
||||
CVE-2022-37068,0,0,bfbc21ac6f627e851e0b40b7ed324b42c9a2dd81234107a167e1ea24c57dec94,2024-11-21T07:14:23.400000
|
||||
CVE-2022-37069,0,0,dc864251b7b1e5b3758cf4caaf549434af36e31ac4247583a5727ca221971dd0,2024-11-21T07:14:23.567000
|
||||
CVE-2022-3707,0,0,a9a5ba336fb0115ec23c86b7602de9c20dd6da9e7854961bc6aa1da885a432c8,2024-11-21T07:20:04.870000
|
||||
CVE-2022-3707,0,1,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000
|
||||
CVE-2022-37070,0,0,e2c0503dbb97f457cda6fc0db7f472cd6525c918effd3957023eb8ec3528183a,2024-11-21T07:14:23.730000
|
||||
CVE-2022-37071,0,0,5425191f63dc698190eb62d1acf953318f967db9b131d7887dfce006cb96572c,2024-11-21T07:14:23.867000
|
||||
CVE-2022-37072,0,0,246171d66413946e2e9259efcef4d1da86ac9de1e57e619f1e332302396b624c,2024-11-21T07:14:24.013000
|
||||
@ -207254,7 +207254,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6
|
||||
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
|
||||
CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
|
||||
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
|
||||
CVE-2022-41082,0,0,942e30fea4d0eecc0abe3c211227f03814e3efec7d8323fcfd99cfc64386418d,2025-02-24T15:45:38.267000
|
||||
CVE-2022-41082,0,1,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000
|
||||
CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000
|
||||
CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000
|
||||
CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000
|
||||
@ -207941,7 +207941,7 @@ CVE-2022-41859,0,0,d7fddb015ce8a0ef2f9a3d1b5b02e117163f8e04fd79fce2bb8d303b5ea5f
|
||||
CVE-2022-4186,0,0,a065f65e44e81acbb6156b41d02f078148d8a8ce8b985b43a5a4cbc8cf2e82b3,2024-11-21T07:34:44.520000
|
||||
CVE-2022-41860,0,0,3902c9c181b31779a24cf74edb67fc91cfafe626663e3b5347822186d946f0ad,2024-11-21T07:23:57.257000
|
||||
CVE-2022-41861,0,0,5444bba71b3cc5fb61cb2dfa5e4122b78a7ec8e4b4721212a077748536b0c745,2024-11-21T07:23:57.380000
|
||||
CVE-2022-41862,0,0,8f3427fbd84b514e55a79ecd45f0f60e5ff35c06e448419eb79f19ddcfabccba,2024-11-21T07:23:57.490000
|
||||
CVE-2022-41862,0,1,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000
|
||||
CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000
|
||||
CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000
|
||||
CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000
|
||||
@ -210552,7 +210552,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad
|
||||
CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000
|
||||
CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000
|
||||
CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000
|
||||
CVE-2022-45449,0,0,e43469c42fc1c14bec5f1182c8f9a484b17b151350cb8f57745968b28fa5cbc2,2024-11-21T07:29:16.553000
|
||||
CVE-2022-45449,0,1,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000
|
||||
CVE-2022-4545,0,0,99841b6aae53e9700cdfd19011146a18beac019ddefac29bac4f0b93aa4a600f,2024-11-21T07:35:27.730000
|
||||
CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000
|
||||
CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000
|
||||
@ -214676,8 +214676,8 @@ CVE-2023-0780,0,0,e8e2f0426cdd391a26483e8789d8e86bae4ddde8ba9e52dd1088ac20ab8a01
|
||||
CVE-2023-0781,0,0,8a8496d4416dfe6d64d43bbc8f0ea270163cd648da6a03d2e8ed80772b9c0df2,2024-11-21T07:37:48.583000
|
||||
CVE-2023-0782,0,0,4c0a4f642aa7a24d1014890feba5b408c26166a66aaebbacc58ff4d99b333dd8,2024-11-21T07:37:48.710000
|
||||
CVE-2023-0783,0,0,7e5bbb2038eedc37222715c2a900e05f94d758a225842991071596a750a7532a,2024-11-21T07:37:48.847000
|
||||
CVE-2023-0784,0,1,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000
|
||||
CVE-2023-0785,0,1,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000
|
||||
CVE-2023-0784,0,0,7c2a420809c468de68766c34d427fafc368317260a0b2fee99cbb949858443b5,2025-03-07T14:49:58.017000
|
||||
CVE-2023-0785,0,0,39afdd47821c09d85f44374ed1c83cbe83c9013a9388354e02149855153efc33,2025-03-07T14:49:58.017000
|
||||
CVE-2023-0786,0,0,9f4d2c852d70de6724f12a5989e00d1cabeb5b77f3984843da8a00c626444350,2024-11-21T07:37:49.993000
|
||||
CVE-2023-0787,0,0,a3af2d4a739da41e2884d7213d2426d7f2c8d7b0d7fc8836c1642926bdcd28e8,2024-11-21T07:37:50.117000
|
||||
CVE-2023-0788,0,0,43aa586f6fa0a93609ae74ba14816485c32634f75c8eca48cbdcb9e90180815e,2024-11-21T07:37:50.237000
|
||||
@ -215798,7 +215798,7 @@ CVE-2023-1958,0,0,92b4f50e187cfa91ad93be6d6d801bee29d9b901407aeff8e0e2f748923518
|
||||
CVE-2023-1959,0,0,b832511920dd34b2ee0f5b4e70369efeae5989e5e23e518c8ce4fb48ae9fce14,2024-11-21T07:40:13.837000
|
||||
CVE-2023-1960,0,0,9275175137e515b03393dfde9235ce20d55b233e6b1150889fdb7d9c43a816ea,2024-11-21T07:40:13.977000
|
||||
CVE-2023-1961,0,0,f7b49d3ff2f2449aa867b1ae7d36cb9a2f65278c430922c36a9efc58d3df23f9,2024-11-21T07:40:14.100000
|
||||
CVE-2023-1962,0,1,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000
|
||||
CVE-2023-1962,0,0,3f5df8a00d9aee7a498dd4414e1d09d8bba3c04c03459334dc8da75dcfae0365,2025-03-07T14:49:58.017000
|
||||
CVE-2023-1963,0,0,bd9346ac887c2f85ca33ac9a902dc041c51d793a6679b19dc89f9d01d98115f6,2024-11-21T07:40:14.363000
|
||||
CVE-2023-1964,0,0,fd2361ec5e3f1e6b036a6afb1d0c9643aa4d204c0955876c690a65ac50a9464b,2024-11-21T07:40:14.490000
|
||||
CVE-2023-1965,0,0,5788896c0bd8259fdbe118d4f434ec1b5b72febc35e1293735cf277a92a20ade,2024-11-21T07:40:14.613000
|
||||
@ -218008,7 +218008,7 @@ CVE-2023-22419,0,0,c1dd2f72f61814803cdf63bcf8dca22320a762690c8cf4b60f814521f088e
|
||||
CVE-2023-2242,0,0,4a937452ab57b5296438a1ae14dc38bfed91efb6c5653c71648121b31c6163c1,2024-11-21T07:58:13.417000
|
||||
CVE-2023-22421,0,0,c679e58c8416e77061e0c043851f1c9eb505ade7b79525a95ca89620b33fbb40,2024-11-21T07:44:47.053000
|
||||
CVE-2023-22422,0,0,1b35c84e2fb89995518f67e9309c4c9dbec4b7abbbf1d9cf247ec0366eeb4240,2024-11-21T07:44:47.157000
|
||||
CVE-2023-22424,0,0,58569a9f37da5822a4cfe472f89ab226a874d33a18a9993834627594ce70ea09,2024-11-21T07:44:47.277000
|
||||
CVE-2023-22424,0,1,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000
|
||||
CVE-2023-22425,0,0,2d237c6de59422283df9a7c8f88cb08b1ea8054670ffba4dcb711a39f4fb4683,2024-11-21T07:44:47.387000
|
||||
CVE-2023-22427,0,0,f490e42af5d94874676af58f877fe1ac393f7611b6800a738a6ae9c18e557f30,2024-11-21T07:44:47.500000
|
||||
CVE-2023-22428,0,0,b3eeca8a1daaffa1f36da6254dfad723add1cced54ccf9190fb4f8dda34204b0,2024-11-21T07:44:47.613000
|
||||
@ -219837,7 +219837,7 @@ CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f010
|
||||
CVE-2023-24754,0,0,42885f8db3ea1d2ab38e7fd061eee4daf1de514fe3c8843b43f6d2b02ce3d3d6,2024-11-21T07:48:22.170000
|
||||
CVE-2023-24755,0,0,c88f7e592135bce8a4a5ea2bfd86138da220b85446e7ae5773d7d7fa6bfa0910,2024-11-21T07:48:22.310000
|
||||
CVE-2023-24756,0,0,dc204becde6645b45c0da365ffdacca71444ef90cbef402419c82247d10a38d3,2024-11-21T07:48:22.457000
|
||||
CVE-2023-24757,0,0,927193cc66af039bb894275e2ed8ffc12dd8afb68a614b33cccd191514d8954a,2024-11-21T07:48:22.593000
|
||||
CVE-2023-24757,0,1,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000
|
||||
CVE-2023-24758,0,0,441e45920579ec0bfea433f0388c75e94eda4c0aa96df2e80a289332a4894341,2024-11-21T07:48:22.733000
|
||||
CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a48,2024-11-21T07:58:41.490000
|
||||
CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000
|
||||
@ -220337,7 +220337,7 @@ CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94
|
||||
CVE-2023-25350,0,0,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000
|
||||
CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000
|
||||
CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000
|
||||
CVE-2023-25358,0,0,c293b186724c778961eaee7691e3edb8240ff2943c5c22a7bf4907fb0cf4942c,2024-11-21T07:49:26.333000
|
||||
CVE-2023-25358,0,1,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000
|
||||
CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000
|
||||
CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000
|
||||
CVE-2023-25361,0,0,d8143811fa2fbed2aa47a7bb1803e2898e8970fe423990f5709306cbdb47446e,2024-11-21T07:49:26.613000
|
||||
@ -221082,7 +221082,7 @@ CVE-2023-26209,0,0,a892a2695c5017ffca11881763f9e45ffa97f8d9fd3ef81673d2b4d81967e
|
||||
CVE-2023-2621,0,0,46a71fd277c5850785baccb07629db57c3e33b88c0c891670a7f4746f333c8ea,2024-11-21T07:58:56.940000
|
||||
CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1002,2024-11-21T07:50:55.397000
|
||||
CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000
|
||||
CVE-2023-26213,0,0,918cbfbd489d618354d4dc527419766f5a31b4b4653d8b2671ae25fc3f1414fe,2024-11-21T07:50:55.620000
|
||||
CVE-2023-26213,0,1,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000
|
||||
CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000
|
||||
CVE-2023-26215,0,0,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000
|
||||
CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000
|
||||
@ -223416,7 +223416,7 @@ CVE-2023-29001,0,0,2e01e43c951dfdd64db54cc8ed52f50c39b9c76eb2af1a84feb2cc7e9477c
|
||||
CVE-2023-29002,0,0,f84b0106ce5dfa611795d04e5b91ff679923e08e69b7621ebdc4b6f3de2466ac,2024-11-21T07:56:22.330000
|
||||
CVE-2023-29003,0,0,3dc97278bcf396ba949725879aafa267b4fd447ad7cf66d92d1a33f01881edb7,2024-11-21T07:56:22.440000
|
||||
CVE-2023-29004,0,0,39a71876fb5a5115d257c4713449564c4dac4051956179716e0c87bebf78cdf0,2024-11-21T07:56:22.557000
|
||||
CVE-2023-29005,0,1,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000
|
||||
CVE-2023-29005,0,0,a68a77e609d3bdfad2507bd27cf825363e82484ef44887d96939df717734f351,2025-03-07T14:37:51.330000
|
||||
CVE-2023-29006,0,0,585a9d369737c7a352c58b58b365b45a9d31ebed1f7309dd0ee532fac3a88eb2,2024-11-21T07:56:22.780000
|
||||
CVE-2023-29007,0,0,0634e7fd207d3299b36698cb4116ba6c4a03b9e3bda5f501964e3a5debfcec85,2024-11-21T07:56:22.897000
|
||||
CVE-2023-29008,0,0,6dde19320b4cb68b21db819fafbd03f8289902bc4418aa90e213c506e9aa4a0d,2024-11-21T07:56:23.037000
|
||||
@ -226961,7 +226961,7 @@ CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726
|
||||
CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000
|
||||
CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000
|
||||
CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000
|
||||
CVE-2023-3359,0,0,6b4ba371c859d2e32ceef7547121e7afee7570752bec99ae04789bf27b0c8d71,2024-11-21T08:17:05.823000
|
||||
CVE-2023-3359,0,1,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000
|
||||
CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000
|
||||
CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000
|
||||
CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000
|
||||
@ -227252,7 +227252,7 @@ CVE-2023-33974,0,0,531e41d5b879646dc4c7aa0d04a15823a13b7b33472a4070b6d3df6d25837
|
||||
CVE-2023-33975,0,0,2fa415f380f19ec93055bc47f99763c1a62ccb69b74cc7e124876cbb580a8af1,2024-11-21T08:06:19.843000
|
||||
CVE-2023-33976,0,0,89ad541a1971f4e6c687199980a0c351ef4f09e89d264cf9da92848cc8d79bd3,2024-11-21T08:06:19.983000
|
||||
CVE-2023-33977,0,0,7f9ae9cf63258eb45b3160b45e0b54f8cf115775476935085e3f3f6ae5de4077,2024-11-21T08:06:20.147000
|
||||
CVE-2023-33979,0,0,099fb6dffcbc022c374218fb16825863b988bbe792a606c32f7a8b68a5254d6e,2024-11-21T08:06:20.273000
|
||||
CVE-2023-33979,0,1,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000
|
||||
CVE-2023-3398,0,0,ac532334ebc2ea5d377a047eed3a69a21b57b1a2389b634cb5b7a8c9c83c1db6,2024-11-21T08:17:11.240000
|
||||
CVE-2023-33980,0,0,b711df1691783ee08c058e35e642804a3b9c96d290c14ba311f8a31f13881963,2025-01-16T16:15:30.280000
|
||||
CVE-2023-33981,0,0,1b80f20492609165165bcb0710c37d0eb63e70c48a11fc8a6a92dff7de8524f9,2025-01-16T16:15:30.487000
|
||||
@ -237563,7 +237563,7 @@ CVE-2023-4771,0,0,1012847fc256ae9ff3628aa2a1fb6186f4f8c6f51233026703d280e3101d9a
|
||||
CVE-2023-47710,0,0,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
|
||||
CVE-2023-47711,0,0,77a15db2641f647545705c0975f3dcc067ad400a66996c3ed04d43cdacf82a1a,2025-01-14T21:06:23.587000
|
||||
CVE-2023-47712,0,0,8b46a8284f80a981721e7d29628c18ac4d5882204e99756c9a6971ec6710e9b1,2025-01-14T21:06:54.440000
|
||||
CVE-2023-47714,0,1,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000
|
||||
CVE-2023-47714,0,0,1e3b263706403cf3d443c1bcc4f3d0913700782d5185df1e380130f9e2fda73e,2025-03-07T12:36:39.820000
|
||||
CVE-2023-47715,0,0,f4fb27b0d4cb498487b45580c56700f79ca96278065bdf34fcab592745b89aaa,2024-11-21T08:30:43.703000
|
||||
CVE-2023-47716,0,0,f8aed9cae96f774992c57d65bc6710f8f6684bd42029405056f1fb8b451995c3,2024-11-21T08:30:43.847000
|
||||
CVE-2023-47717,0,0,d96caec94781e03ee35867e94de91fe6c0b557c8ca5c1e7570fe7751b23a7bf0,2024-12-06T22:15:19.067000
|
||||
@ -239486,7 +239486,7 @@ CVE-2023-50303,0,0,577942694687bbb9d20d9e62b97c43d31e6741104a6e0355ef83180bf4146
|
||||
CVE-2023-50304,0,0,8d7cf710ec0b485f385fbbc85e013f83f0695f8067df88dc02b330fdfee0f44f,2024-11-21T08:36:49.433000
|
||||
CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414d61,2024-11-21T08:36:49.587000
|
||||
CVE-2023-50306,0,0,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000
|
||||
CVE-2023-50307,0,1,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000
|
||||
CVE-2023-50307,0,0,e5e2708a18b00d68f2cf6f903acc964f0925452b073571269a977024a217fe3b,2025-03-07T12:36:39.820000
|
||||
CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000
|
||||
CVE-2023-50309,0,0,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d6fb,2025-03-04T21:36:47.970000
|
||||
CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000
|
||||
@ -244483,7 +244483,7 @@ CVE-2024-10261,0,0,6398f8d67bdd17ab366f9416d4ddf7ff0254d493e1fa2fab241a87e725ac9
|
||||
CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000
|
||||
CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000
|
||||
CVE-2024-10266,0,0,0e9c586a7b52bf6ef37d72c609708f87e3711d72e33bcee296d0f4f532850c3d,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10266,0,1,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000
|
||||
CVE-2024-10268,0,0,d0402bfb3091ce685faa51f2c4c40b45ff8d34a58666307c0eb05cdde79cb95c,2025-01-17T14:57:54.120000
|
||||
CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf733,2024-11-13T17:59:27.717000
|
||||
CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000
|
||||
@ -246854,7 +246854,7 @@ CVE-2024-12833,0,0,677c1333060f073d8c9581aaa17178e60be70e85d81a38adf3dadf4f16429
|
||||
CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000
|
||||
CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08
|
||||
CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000
|
||||
CVE-2024-12837,0,0,7df4ed7bbe4d67e6c1f92bf1270dfa3b3ef56a4db6a64af99757ce1c6f91d042,2025-03-07T08:15:37.313000
|
||||
CVE-2024-12837,0,1,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000
|
||||
CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585ebbdd,2024-12-31T02:15:05.877000
|
||||
CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
@ -247631,7 +247631,7 @@ CVE-2024-13663,0,0,880b175977ec5581b5d821dbb9009cc924e13e2d7908761bee2204a2ca2d3
|
||||
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
|
||||
CVE-2024-13665,0,0,e3a6c5d7c3dea123836f5860f2414dc33b702a945b7203507ad6f9df5efe220d,2025-02-24T15:51:18.327000
|
||||
CVE-2024-13667,0,0,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000
|
||||
CVE-2024-13668,0,1,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000
|
||||
CVE-2024-13668,0,0,d0895c8105ba12705cad27a2e8d00ad44adfaf3fc6f58cad5811ef09b59ce0c7,2025-03-07T14:15:36.520000
|
||||
CVE-2024-13669,0,0,8903b9e05cf18c6fbdaa9659ddbe3a812ca2295bd3ea5e29169ff59ba112842b,2025-02-26T15:15:23.263000
|
||||
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
|
||||
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
|
||||
@ -258780,12 +258780,12 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d
|
||||
CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000
|
||||
CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000
|
||||
CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000
|
||||
CVE-2024-33489,0,0,2fd64b47d87f02d515219db09afc61b80c2c20178417c6cb5c2c7a2d57e839f9,2024-11-21T09:17:00.957000
|
||||
CVE-2024-33489,0,1,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000
|
||||
CVE-2024-3349,0,0,77627706952ed9b21bd8fe86802e39c3a79b47bff5aa5a4099e6b50f2da27242,2025-02-11T14:43:45.883000
|
||||
CVE-2024-33490,0,0,5f563e8d0fcf5bb9893e7a6b4ddad19d85792bbefdd87ad3291c208cc1d74439,2024-11-21T09:17:01.093000
|
||||
CVE-2024-33491,0,0,f15743d3eb5df305a4b45f3d973b5d970af8ae7ee1fcac5043f4f950e58f32d1,2024-11-21T09:17:01.220000
|
||||
CVE-2024-33492,0,0,a1e0034b75eae4ea6bde8f071b76995b720b973a7fdced8d8ca1379be366e030,2024-11-21T09:17:01.340000
|
||||
CVE-2024-33493,0,0,ce6a19354e3fb2802f99261979f8a8e7c3468de824b4a201c73017a11b6f67e4,2024-11-21T09:17:01.457000
|
||||
CVE-2024-33490,0,1,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33491,0,1,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33492,0,1,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33493,0,1,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33494,0,0,59f5d90daeffa43cbbfaba78c93fa678a165d69a45e730b3cc8593deb34df95b,2024-11-21T09:17:01.577000
|
||||
CVE-2024-33495,0,0,57b81efae96a7f5a9931902412b22bf475f5cadbad96517560fbcc807d2b75f3,2024-11-21T09:17:01.720000
|
||||
CVE-2024-33496,0,0,3e0339b75603b80172a8dd08f9727b029d985209c64e779cc52c646d8e6027ce,2024-11-21T09:17:01.867000
|
||||
@ -259861,9 +259861,9 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a
|
||||
CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000
|
||||
CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000
|
||||
CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000
|
||||
CVE-2024-34771,0,0,8c1c3d9b82c5eaba33f3f71e8ec577fb6085b5be8a8cf547169d3de6d9ceed6f,2024-11-21T09:19:22.167000
|
||||
CVE-2024-34772,0,0,42418edd3388b62bba8cbdd0a0fcca3217c6812a8eba145942ce31a8d87ea14d,2024-11-21T09:19:22.297000
|
||||
CVE-2024-34773,0,0,c5b5c21cb0bb74417c7eb47914baa08816f098875208657202f0022fcf33232d,2024-11-21T09:19:22.427000
|
||||
CVE-2024-34771,0,1,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34772,0,1,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34773,0,1,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210544,2024-11-21T09:19:22.627000
|
||||
CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000
|
||||
@ -261684,8 +261684,8 @@ CVE-2024-37154,0,0,79775441c2eac00a4330a7a5e5b73461a1a9196f77dbc6e682df7449a12cc
|
||||
CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d9094aa,2024-11-18T17:11:17.393000
|
||||
CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000
|
||||
CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000
|
||||
CVE-2024-37158,0,0,7967b9c1ebde000c094bdb4985911add75942f3d07b607308ff63def742cbd68,2024-11-21T09:23:19.610000
|
||||
CVE-2024-37159,0,0,01dc70008a30432b7be4ecd03b55457f1cc54167266fd56547628aa9ed98e6d6,2024-11-21T09:23:19.740000
|
||||
CVE-2024-37158,0,1,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000
|
||||
CVE-2024-37159,0,1,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000
|
||||
CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000
|
||||
CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000
|
||||
CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000
|
||||
@ -263831,7 +263831,7 @@ CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138
|
||||
CVE-2024-39693,0,0,2a0c67223a67a4cd6565b19d41f2906bca2653f8f96542a5b62429b6479c76d0,2024-11-21T09:28:14.067000
|
||||
CVE-2024-39694,0,0,b33f1bc6cdf86d31af1545130725483f2391aa4c76f60be75b33572bad66ef8f,2024-08-01T12:42:36.933000
|
||||
CVE-2024-39695,0,0,4c6a4448c06a4c8d6ff6c2304228798d4d4aaab51edb52346088ef9cd9927593,2024-11-21T09:28:14.270000
|
||||
CVE-2024-39696,0,0,666eb1f28251dd112bc801e4df6720711bf4e41071fc9f1d21b98fd713510ce3,2024-11-21T09:28:14.413000
|
||||
CVE-2024-39696,0,1,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000
|
||||
CVE-2024-39697,0,0,f3a7cdaaf41d6cf05c77fea55d7ff9924821768d6a8fc884c5523aed59207e8a,2024-11-21T09:28:14.540000
|
||||
CVE-2024-39698,0,0,118caf2e6cd58e2f99a9fe181f4d1112f02ddf5bbdd7ff18cf94ce3936612acc,2024-11-21T09:28:14.690000
|
||||
CVE-2024-39699,0,0,09c189588d9dd611b59094ba3bc24c1b4e450d4d41ea906404b5a63c4aa31b07,2024-11-21T09:28:14.827000
|
||||
@ -271848,7 +271848,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c
|
||||
CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000
|
||||
CVE-2024-50600,0,0,57862be166b5927f92dbf71c7c467534c7341eebf3c63252e3212f6e509437ca,2025-03-06T19:15:26.750000
|
||||
CVE-2024-50600,0,1,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000
|
||||
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
|
||||
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
|
||||
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
|
||||
@ -275759,7 +275759,7 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3
|
||||
CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000
|
||||
CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000
|
||||
CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000
|
||||
CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f87,2024-11-21T09:48:09.570000
|
||||
CVE-2024-5685,0,1,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000
|
||||
CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000
|
||||
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
|
||||
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
|
||||
@ -276343,8 +276343,8 @@ CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b6564
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
CVE-2024-57980,0,0,10c77fb6a23488df204986089ebb05944e9c0539ba2e4d3b8fea5d9e62a33d18,2025-02-27T02:15:11.190000
|
||||
CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000
|
||||
CVE-2024-57982,0,0,983763b25b3653755c18e45f478486ce505422e8727217a6a78afd1a479cf237,2025-02-27T02:15:11.397000
|
||||
CVE-2024-57983,0,0,cc8076edbca9e9bc9f261b52c60d6967a1fc1ae72d285983b9b2f4988ca1a8e4,2025-02-27T02:15:11.503000
|
||||
CVE-2024-57982,0,1,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57983,0,1,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000
|
||||
CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000
|
||||
CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000
|
||||
@ -276606,7 +276606,7 @@ CVE-2024-5981,0,0,120e9491ac8bdb806523fa724951e345b102ad6f09efad6d29148104d1c7a5
|
||||
CVE-2024-5982,0,0,a70aacb82fb750efd13a720d435a192d8684b9dce2eabb99aac962fe30d3c0ee,2024-11-14T18:52:16.567000
|
||||
CVE-2024-5983,0,0,7c4833bfc7781d97f423faf674a27a12c2e287e8e9ab5652388348843317c92b,2024-11-21T09:48:41.653000
|
||||
CVE-2024-5984,0,0,e9007c02bfe46315499412adec83135fbd824808ac1333f399716005b27c2dfa,2024-11-21T09:48:41.800000
|
||||
CVE-2024-5985,0,1,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000
|
||||
CVE-2024-5985,0,0,7a843e1dbe47ac71a2cc1fab69899af45907e9dd09795e5910273916d2239e44,2025-03-07T14:49:58.017000
|
||||
CVE-2024-5987,0,0,beef228f72c05791dd04d199520be64d8eda1e129dbc1533ccdca0b455b9e6d7,2024-10-04T12:56:47.997000
|
||||
CVE-2024-5988,0,0,a9d27d5415bf1cd68cc2a13a9af856f779f310aa287fd46fc01b11e432f43874,2024-11-21T09:48:42.173000
|
||||
CVE-2024-5989,0,0,9b83ceb061ae8ffbb320f8308cc19d7b2b6774dd575e9b1f0942d3764bfb16da,2024-11-21T09:48:42.330000
|
||||
@ -279273,7 +279273,7 @@ CVE-2024-9004,0,0,a2437445f28c6fd040101cd729185112636146c841348f5ffdb5cbb6a1a6cc
|
||||
CVE-2024-9005,0,0,cf7157c1ddadca0c84dad1af4c725274926a9a73df3737beaab7889328488f57,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9006,0,0,8cc842e07a08255babd245e69b3c1353761d1387b094a4d6d6af3b01cc92dc8e,2024-09-25T18:44:48.940000
|
||||
CVE-2024-9007,0,0,fb9872a3e10e14f154983a561c697eb19f4cc80a62005f6fed3864bfefb98241,2024-09-25T18:40:31.320000
|
||||
CVE-2024-9008,0,1,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000
|
||||
CVE-2024-9008,0,0,e69041d113c9332adbec22fef4264df31a32076b3aa424ed77e1081498ed7780,2025-03-07T14:49:58.017000
|
||||
CVE-2024-9009,0,0,8063a9dee9ed37ad66d07d57c72f73b0e30cf8e7efc6c0a9bad9e9eb439197fa,2024-09-25T17:46:59.077000
|
||||
CVE-2024-9010,0,0,f1142db89cc1b709fb322bfbe809a95742487f2e35e71f8aae3232553465d8d6,2025-02-11T02:15:36.580000
|
||||
CVE-2024-9011,0,0,24ced7d06552bc9d1dd30636af61f2f64e910b6c47eefac677c31a4765d5a4db,2024-09-25T17:48:14.820000
|
||||
@ -279451,7 +279451,7 @@ CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8a
|
||||
CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000
|
||||
CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000
|
||||
CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000
|
||||
CVE-2024-9221,0,0,fe6dbc87d919c0427e67adb0b387a38f2ac1a522edeae3829279e72baef9a807,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9221,0,1,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000
|
||||
CVE-2024-9222,0,0,a4a3a09199c7d8b09b4738998d8104dbe367bbcd208fb9266439d154c7f5ddaa,2024-10-08T15:34:13.250000
|
||||
CVE-2024-9223,0,0,34caff13ef1092c98bf872963a60e7b0f874ac576cd17eef87075b656fb0164c,2024-11-23T04:15:10.037000
|
||||
CVE-2024-9224,0,0,39d8d5cb3a7793ab0481956574ccd81167c7fcdc46c2c7fe36e709b73a8dce1c,2024-10-07T19:19:38.157000
|
||||
@ -279645,7 +279645,7 @@ CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84b
|
||||
CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9457,0,0,237bf133deeeb6ce22bd7cb82b0da8d260edebfa1038d864508e5e70f23de04e,2024-10-15T14:23:57.307000
|
||||
CVE-2024-9458,0,0,80e3d14c9e2b213feb06fb9083f0b2f590246f33dde9293b093890a3cbc600a9,2025-03-07T10:15:16.497000
|
||||
CVE-2024-9458,0,1,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000
|
||||
CVE-2024-9459,0,0,b5f8918700d9fe4520a35b012c84c07b7eef34f306e657c26f87c88066e73f05,2024-11-06T15:29:04.917000
|
||||
CVE-2024-9460,0,0,a4133ee84221254d0c0b2ee042e3007266c6114612acf7d4db07e6602d682abe,2024-10-08T14:33:42.703000
|
||||
CVE-2024-9461,0,0,7d9c91cbe544cc2689e175f532112ea98289124a3780c869e31650a971e49d9c,2024-11-26T14:15:22.533000
|
||||
@ -281147,13 +281147,13 @@ CVE-2025-1864,0,0,5dcde85bed1ed1221f07f6484eca3855203db58c6f1815d82cefcaf7b5c072
|
||||
CVE-2025-1866,0,0,d0afd76161369e92718a3d901fc0c2664a4a6cd4b550406fdc5521568f9355a3,2025-03-03T09:15:39.370000
|
||||
CVE-2025-1867,0,0,8e365b83cef7b7a5f391f2005dcb9922258f062cedfa81b30500ba43743068fa,2025-03-03T09:15:39.520000
|
||||
CVE-2025-1868,0,0,458001b298730476004eac6d19a8af50c907ad4cd889604956695720bc492f98,2025-03-03T12:15:34.610000
|
||||
CVE-2025-1869,0,1,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1870,0,1,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1871,0,1,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1872,0,1,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1873,0,1,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1874,0,1,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1875,0,1,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1869,0,0,3ae43901159422bb599a3e2bd1c302b45ca2666d742fd790750e21c2baaa5800,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1870,0,0,ecb1efdcfe6ea18bd7c94adf553c22fd2abf7855ffe9e688b688195f9f395870,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1871,0,0,c0500a0cbf6c36ce75beb653ec65523e469560e58ff5026fce26e57ec3b138fb,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1872,0,0,6a08fc3748af2ea4eb8aedfc182326e0fd4521fb364e63525330bcf2498ae893,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1873,0,0,f1ed8498d44561be89fa5c77a8829a324e6eaf9c5e0d81ff2e65df54420ae37b,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1874,0,0,3873404b9a0b94ebd458c4edede96a379c89ff0574c175b92fc4e61e21e1f4af,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1875,0,0,e8bf91194500908197a64f87ef0f4f2aba8cf0ccf02baddf1e2ff90b9396c7bb,2025-03-07T14:45:38.780000
|
||||
CVE-2025-1876,0,0,b0ccd9a3c40b94458651917984a63f6cfe9c27f4d03f238f5e27495b9a9a3392,2025-03-04T17:15:14.313000
|
||||
CVE-2025-1877,0,0,7d73aa334c0864103a3ab0869970d09cd3d668eccad8f23727a1269ca151bc0e,2025-03-06T12:21:35.360000
|
||||
CVE-2025-1878,0,0,3ebce170851420b7dbf1460879d38b0859a7dd259c353dc64c458f5e8f2fb0f9,2025-03-06T12:21:35.360000
|
||||
@ -281356,8 +281356,9 @@ CVE-2025-2066,0,0,5dca3a37881c3080b5ed7399cf07d794623bec104102f99020f28f3358b971
|
||||
CVE-2025-2067,0,0,3e39862fd040dc0c3c929624d43984557b3839cb6c47b4edad23eed5ac7ebc44,2025-03-07T05:15:17.527000
|
||||
CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e863,2025-03-07T12:15:34.260000
|
||||
CVE-2025-2085,0,0,191ae6560abe8476fe190d0474dcec83084d054bdfc1b3da1737410b52c6b5f9,2025-03-07T12:15:35.270000
|
||||
CVE-2025-2086,1,1,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000
|
||||
CVE-2025-2087,1,1,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000
|
||||
CVE-2025-2086,0,0,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000
|
||||
CVE-2025-2087,0,0,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000
|
||||
CVE-2025-2088,1,1,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000
|
||||
CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000
|
||||
CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000
|
||||
CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000
|
||||
@ -281367,6 +281368,7 @@ CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0f
|
||||
CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000
|
||||
CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000
|
||||
CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000
|
||||
CVE-2025-2089,1,1,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000
|
||||
CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000
|
||||
CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000
|
||||
CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000
|
||||
@ -281377,6 +281379,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9
|
||||
CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000
|
||||
CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000
|
||||
CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000
|
||||
CVE-2025-2090,1,1,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000
|
||||
CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000
|
||||
CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000
|
||||
CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000
|
||||
@ -283890,6 +283893,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
|
||||
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
||||
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
||||
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
|
||||
CVE-2025-25617,1,1,865fa4993189a6053ac23342f82c40fff5f1cf19a2ef6e091748583a81dd852b,2025-03-07T16:15:38.543000
|
||||
CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000
|
||||
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
|
||||
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
|
||||
@ -284020,7 +284024,7 @@ CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a
|
||||
CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000
|
||||
CVE-2025-26331,0,0,60841d10062852a459306e6530bd7352dea18c104b031056802fcc3f586c4028,2025-03-07T08:15:43.040000
|
||||
CVE-2025-26331,0,1,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
|
||||
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
|
||||
@ -284302,6 +284306,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75
|
||||
CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
|
||||
CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000
|
||||
CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000
|
||||
CVE-2025-27152,1,1,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000
|
||||
CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000
|
||||
CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000
|
||||
CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000
|
||||
@ -284409,6 +284414,8 @@ CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c
|
||||
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
|
||||
CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000
|
||||
CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
|
||||
CVE-2025-27518,1,1,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000
|
||||
CVE-2025-27519,1,1,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000
|
||||
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
|
||||
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
|
||||
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
|
||||
@ -284416,8 +284423,10 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17
|
||||
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
|
||||
CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000
|
||||
CVE-2025-27597,1,1,6cd2d27e6f70c8b8dc560cd90930a7c6cca00c2cfb8b49c56b00236be1fb725c,2025-03-07T16:15:39.893000
|
||||
CVE-2025-27598,0,0,d2c5c2693a9de5786fd83ab9383213352b59e0b62bd0678134b8bb8975df0743,2025-03-06T23:15:12.183000
|
||||
CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000
|
||||
CVE-2025-27603,1,1,f47d7ab377c12d55b3fa6ae6bb3381884e202826994bb1575cdd6dffba4dc2d5,2025-03-07T16:15:40.037000
|
||||
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||
@ -284471,6 +284480,6 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc
|
||||
CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
|
||||
CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
|
||||
CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000
|
||||
CVE-2025-27795,0,0,6c63d0de52e5a5ce88dd4527b7e8b14e866b38ecb9c86e71d93fb66eb57c3f4f,2025-03-07T06:15:33.273000
|
||||
CVE-2025-27796,0,0,b3f979689e5dbaabbfdb2bf1ea0d456e5639782116f2a087e75a8e0f34304828,2025-03-07T06:15:35.620000
|
||||
CVE-2025-27795,0,1,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000
|
||||
CVE-2025-27796,0,1,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000
|
||||
CVE-2025-27816,0,0,5b2e23c42ea7b22c782ca4f40314ad964756890209d1d752208955d5f400b7bd,2025-03-07T08:15:44.527000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user