mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-22T22:00:19.683550+00:00
This commit is contained in:
parent
5b75f14c24
commit
5e5510cb8a
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-32415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-13T15:15:10.563",
|
||||
"lastModified": "2024-11-21T06:07:00.093",
|
||||
"lastModified": "2025-04-22T20:15:18.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39660",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:14.577",
|
||||
"lastModified": "2024-11-21T06:19:54.813",
|
||||
"lastModified": "2025-04-22T20:15:19.513",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-41943",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-13T00:15:11.170",
|
||||
"lastModified": "2024-11-21T06:26:58.843",
|
||||
"lastModified": "2025-04-22T21:15:41.187",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20240",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:15.187",
|
||||
"lastModified": "2024-11-21T06:42:25.273",
|
||||
"lastModified": "2025-04-22T20:15:19.700",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20411",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:15.243",
|
||||
"lastModified": "2024-11-21T06:42:45.883",
|
||||
"lastModified": "2025-04-22T20:15:19.860",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20442",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:15.300",
|
||||
"lastModified": "2024-11-21T06:42:49.207",
|
||||
"lastModified": "2025-04-22T20:15:20.020",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20480",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:16.367",
|
||||
"lastModified": "2024-11-21T06:42:53.583",
|
||||
"lastModified": "2025-04-22T20:15:20.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20482",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:16.420",
|
||||
"lastModified": "2024-11-21T06:42:53.807",
|
||||
"lastModified": "2025-04-22T20:15:20.323",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20483",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:16.480",
|
||||
"lastModified": "2024-11-21T06:42:53.950",
|
||||
"lastModified": "2025-04-22T20:15:20.483",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20484",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:16.533",
|
||||
"lastModified": "2024-11-21T06:42:54.073",
|
||||
"lastModified": "2025-04-22T20:15:20.743",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20485",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2022-12-13T16:15:16.587",
|
||||
"lastModified": "2024-11-21T06:42:54.190",
|
||||
"lastModified": "2025-04-22T20:15:21.007",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-25836",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T04:15:09.587",
|
||||
"lastModified": "2024-11-21T06:53:05.487",
|
||||
"lastModified": "2025-04-22T21:15:42.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-25837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T04:15:09.657",
|
||||
"lastModified": "2024-11-21T06:53:05.627",
|
||||
"lastModified": "2025-04-22T21:15:42.503",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-25912",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2022-12-06T05:15:11.570",
|
||||
"lastModified": "2024-11-21T06:53:12.270",
|
||||
"lastModified": "2025-04-22T21:15:42.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3259",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-09T18:15:19.617",
|
||||
"lastModified": "2024-11-21T07:19:09.773",
|
||||
"lastModified": "2025-04-22T21:15:43.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-09T22:15:10.087",
|
||||
"lastModified": "2024-11-21T07:09:14.803",
|
||||
"lastModified": "2025-04-22T21:15:42.933",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -85,6 +115,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yiisoft/yii2-gii",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yiiframework.com/doc/guide/2.0/en/start-gii",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3724",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2022-12-09T18:15:19.957",
|
||||
"lastModified": "2024-11-21T07:20:06.650",
|
||||
"lastModified": "2025-04-22T20:15:21.543",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-134"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-134"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3879",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:11.047",
|
||||
"lastModified": "2024-11-21T07:20:25.460",
|
||||
"lastModified": "2025-04-22T20:15:21.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3880",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:11.127",
|
||||
"lastModified": "2024-11-21T07:20:25.590",
|
||||
"lastModified": "2025-04-22T20:15:23.517",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3881",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:11.197",
|
||||
"lastModified": "2024-11-21T07:20:25.730",
|
||||
"lastModified": "2025-04-22T20:15:23.790",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3906",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:11.597",
|
||||
"lastModified": "2024-11-21T07:20:30.380",
|
||||
"lastModified": "2025-04-22T21:15:43.273",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3946",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:12.357",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"lastModified": "2025-04-22T20:15:25.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-08T17:15:10.493",
|
||||
"lastModified": "2024-11-21T07:22:16.900",
|
||||
"lastModified": "2025-04-22T21:15:43.420",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41559",
|
||||
"sourceIdentifier": "security@tibco.com",
|
||||
"published": "2022-12-06T19:15:10.043",
|
||||
"lastModified": "2024-11-21T07:23:23.633",
|
||||
"lastModified": "2025-04-22T21:15:43.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4122",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-08T16:15:14.870",
|
||||
"lastModified": "2024-11-21T07:34:37.210",
|
||||
"lastModified": "2025-04-22T21:15:44.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4123",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-12-08T16:15:14.937",
|
||||
"lastModified": "2024-11-21T07:34:37.330",
|
||||
"lastModified": "2025-04-22T21:15:44.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -52,6 +72,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T03:15:09.377",
|
||||
"lastModified": "2024-11-21T07:27:34.327",
|
||||
"lastModified": "2025-04-22T21:15:43.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44213",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-09T15:15:10.557",
|
||||
"lastModified": "2024-11-21T07:27:45.533",
|
||||
"lastModified": "2025-04-22T21:15:43.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T15:15:10.593",
|
||||
"lastModified": "2024-11-21T07:28:39.833",
|
||||
"lastModified": "2025-04-22T20:15:25.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -96,6 +126,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T03:15:09.587",
|
||||
"lastModified": "2024-11-21T07:29:40.157",
|
||||
"lastModified": "2025-04-22T20:15:25.697",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T03:15:09.687",
|
||||
"lastModified": "2024-11-21T07:29:40.443",
|
||||
"lastModified": "2025-04-22T20:15:25.870",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45760",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T03:15:09.747",
|
||||
"lastModified": "2024-11-21T07:29:40.587",
|
||||
"lastModified": "2025-04-22T20:15:26.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45910",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-12-07T10:15:11.217",
|
||||
"lastModified": "2024-11-21T07:29:55.880",
|
||||
"lastModified": "2025-04-22T21:15:44.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -52,6 +72,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45956",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T15:15:10.657",
|
||||
"lastModified": "2024-11-21T07:30:00.703",
|
||||
"lastModified": "2025-04-22T20:15:26.207",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T15:15:10.707",
|
||||
"lastModified": "2024-11-21T07:30:00.860",
|
||||
"lastModified": "2025-04-22T20:15:26.387",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45968",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T14:15:10.503",
|
||||
"lastModified": "2024-11-21T07:30:01.600",
|
||||
"lastModified": "2025-04-22T21:15:44.230",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46906",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-12T21:15:10.597",
|
||||
"lastModified": "2024-11-21T07:31:17.517",
|
||||
"lastModified": "2025-04-22T20:15:26.570",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4238",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-09-25T16:15:14.837",
|
||||
"lastModified": "2024-11-21T08:34:41.490",
|
||||
"lastModified": "2025-04-22T20:15:26.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4251",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-10-31T14:15:11.920",
|
||||
"lastModified": "2024-11-21T08:34:43.783",
|
||||
"lastModified": "2025-04-22T20:15:26.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-19T20:15:34.770",
|
||||
"lastModified": "2025-02-19T20:15:34.770",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:03:27.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpjabbers:hotel_booking_system:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7AC4C90-B643-4B17-89A3-DBE8B1338D4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176486/PHPJabbers-Hotel-Booking-System-4.0-Missing-Rate-Limiting.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/hotel-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51298",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-19T20:15:34.937",
|
||||
"lastModified": "2025-02-20T15:15:10.473",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:01:27.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpjabbers:event_booking_calendar:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A3C58A0-30C4-4B1C-A4E9-C4717F124ECB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176487/PHPJabbers-Event-Booking-Calendar-4.0-CSV-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/event-booking-calendar/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5211",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-10-31T14:15:12.297",
|
||||
"lastModified": "2024-11-21T08:41:18.437",
|
||||
"lastModified": "2025-04-22T20:15:27.130",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5237",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-10-31T14:15:12.453",
|
||||
"lastModified": "2024-11-21T08:41:21.087",
|
||||
"lastModified": "2025-04-22T20:15:27.300",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5238",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-10-31T14:15:12.557",
|
||||
"lastModified": "2024-11-21T08:41:21.197",
|
||||
"lastModified": "2025-04-22T20:15:27.470",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5307",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-10-31T14:15:12.713",
|
||||
"lastModified": "2024-11-21T08:41:29.873",
|
||||
"lastModified": "2025-04-22T20:15:27.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20005",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:06.917",
|
||||
"lastModified": "2024-11-21T08:51:46.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:03.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,239 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D23991D5-1893-49F4-8A06-D5E66C96C3B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "328DA6BE-1303-4646-89B7-2EC8DC444532"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF649E18-4DA8-4724-A9B2-575BC01BFACC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69D98D9F-4594-4411-B788-BBD53EE5B227"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20018",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.017",
|
||||
"lastModified": "2025-03-27T15:15:49.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:34.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,50 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.1.0.0",
|
||||
"matchCriteriaId": "B79B741E-4926-404D-AB0C-01E605332129"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05748BB1-0D48-4097-932E-E8E2E574FD8D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20023",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.193",
|
||||
"lastModified": "2024-11-21T08:51:49.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:44.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,189 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1488152-CC93-40DF-8D1F-BF33DC8444FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4675A09-0147-4690-8AA1-E3802CA1B3EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20024",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.237",
|
||||
"lastModified": "2024-11-21T08:51:49.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:49.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,139 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF649E18-4DA8-4724-A9B2-575BC01BFACC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69D98D9F-4594-4411-B788-BBD53EE5B227"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20025",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.280",
|
||||
"lastModified": "2024-11-21T08:51:49.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:54.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,259 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20026",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.320",
|
||||
"lastModified": "2024-11-21T08:51:50.183",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:36:59.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,161 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20027",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.363",
|
||||
"lastModified": "2024-11-21T08:51:50.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:37:03.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,149 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20028",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.403",
|
||||
"lastModified": "2024-11-21T08:51:50.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:37:08.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,149 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20031",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.540",
|
||||
"lastModified": "2024-11-21T08:51:51.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:37:13.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,149 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C27948-65A7-4B1E-9F10-6744D176A5C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F19C76A-50DF-4ACA-BACA-07157B4D838B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D2ED140-C41B-418B-9DC7-8C486304E769"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20032",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.587",
|
||||
"lastModified": "2024-11-21T08:51:51.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:14:41.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,229 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20033",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.630",
|
||||
"lastModified": "2024-11-21T08:51:51.587",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:18:33.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,324 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE4D2AED-C713-407F-A34A-52C3D8F65835"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CF88096-5CBD-4A4B-8F47-33D38985956F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE5FB550-7264-4879-BAF9-6798949113AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20034",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.673",
|
||||
"lastModified": "2024-11-21T08:51:51.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:23:07.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,149 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B5FE245-6346-4078-A3D0-E5F79BB636B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1BB05B1D-77C9-4E42-91AD-9F087413DC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20036",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.717",
|
||||
"lastModified": "2025-03-20T19:15:27.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:23:27.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,104 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20037",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.760",
|
||||
"lastModified": "2024-11-21T08:51:52.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:23:37.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,204 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20038",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.800",
|
||||
"lastModified": "2024-11-21T08:51:52.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:23:48.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,204 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A7D8055-F4B6-41EE-A078-11D56285AB66"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CE2FC35-716A-4706-97BA-5DB165041580"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T16:15:44.200",
|
||||
"lastModified": "2025-04-22T16:15:44.200",
|
||||
"lastModified": "2025-04-22T20:15:27.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T14:15:24.173",
|
||||
"lastModified": "2025-04-22T14:15:24.173",
|
||||
"lastModified": "2025-04-22T20:15:27.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Directory Traversal vulnerability in forkosh Mime Tex before v.1.77 allows an attacker to execute arbitrary code via a crafted file upload"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Oefenweb/mimetex/blob/master/mimetex.c#L12414-L12423",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48356",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-28T21:15:09.627",
|
||||
"lastModified": "2024-10-30T17:35:12.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-22T20:24:36.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.6.0",
|
||||
"matchCriteriaId": "DAB38CA4-DCAB-41D9-ABF0-C824EAFA0A56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jingyi-u/LyLme_Spage/blob/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-29T22:15:03.913",
|
||||
"lastModified": "2025-03-14T17:15:47.973",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:23:23.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aquila-cms:aquilacms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.409.20",
|
||||
"matchCriteriaId": "379C1347-BF12-46AD-93B3-671371CF0394"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48572",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-29T22:15:04.003",
|
||||
"lastModified": "2024-11-01T12:57:35.843",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:17:44.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aquila-cms:aquilacms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.409.20",
|
||||
"matchCriteriaId": "379C1347-BF12-46AD-93B3-671371CF0394"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-48573",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53569",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T19:15:51.703",
|
||||
"lastModified": "2025-04-22T19:15:51.703",
|
||||
"lastModified": "2025-04-22T21:15:44.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the New Goal Creation section of Volmarg Personal Management System v1.4.65 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the description parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@rudranshsinghrajpurohit/cve-2024-53569-stored-cross-site-scripting-xss-in-volmarg-personal-management-system-6cb0b9d6fe88",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57522",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T13:15:21.660",
|
||||
"lastModified": "2025-02-03T19:15:13.513",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:08:29.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:packers_and_movers_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00E7A5FB-799D-42CF-97F9-7250B4C49C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HackWidMaddy/CVE-2024-57522",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57523",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-06T19:15:19.547",
|
||||
"lastModified": "2025-02-06T20:15:40.050",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:06:16.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:packers_and_movers_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00E7A5FB-799D-42CF-97F9-7250B4C49C6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://sourcecodester.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HackWidMaddy/CVE-2024-57523.",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-261xx/CVE-2025-26159.json
Normal file
60
CVE-2025/CVE-2025-261xx/CVE-2025-26159.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26159",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T20:15:28.130",
|
||||
"lastModified": "2025-04-22T21:15:44.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nasirkhan/laravel-starter",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://godbadtry.github.io/posts/CVE-2025-26159/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T16:15:45.250",
|
||||
"lastModified": "2025-04-22T16:15:45.250",
|
||||
"lastModified": "2025-04-22T20:15:28.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a hardcoded password for the telnet service in product.ini."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://locrian-lightning-dc7.notion.site/Hard-code-Password-19f8e5e2b1a2803f864afbbc4262152e?pvs=73",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-09T16:15:24.523",
|
||||
"lastModified": "2025-04-18T18:15:47.750",
|
||||
"lastModified": "2025-04-22T21:15:45.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jaylan545/01e9653c0139638152927fe6f00cd82e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29547",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T15:16:12.447",
|
||||
"lastModified": "2025-04-22T15:16:12.447",
|
||||
"lastModified": "2025-04-22T20:15:28.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "In Rollback Rx Professional 12.8.0.0, the driver file shieldm.sys allows local users to cause a denial of service because of a null pointer dereference from IOCtl 0x96202000."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://horizondatasys.com/rollback-rx-time-machine/rollback-rx-professional/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29621",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T19:15:52.300",
|
||||
"lastModified": "2025-04-22T19:15:52.300",
|
||||
"lastModified": "2025-04-22T21:15:45.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Francois Jacquet RosarioSIS v12.0.0 was discovered to contain a content spoofing vulnerability in the Theme configuration under the My Preferences module. This vulnerability allows attackers to manipulate application settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@rudranshsinghrajpurohit/content-spoofing-vulnerability-in-rosariosis-student-information-system-f6101e1ff84d",
|
||||
|
56
CVE-2025/CVE-2025-297xx/CVE-2025-29743.json
Normal file
56
CVE-2025/CVE-2025-297xx/CVE-2025-29743.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-29743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T20:15:28.603",
|
||||
"lastModified": "2025-04-22T21:15:45.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "D-Link DIR-816 A2V1.1.0B05 was found to contain a command injection in /goform/delRouting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n0wstr/IOTVuln/blob/main/DIR-816/DelRouting/readme.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30306",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T19:15:51.197",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T21:01:49.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03",
|
||||
"matchCriteriaId": "226A6DBF-E27F-43E6-9741-E4FEBF7AA2FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30307",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T19:15:51.353",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T21:00:48.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03",
|
||||
"matchCriteriaId": "226A6DBF-E27F-43E6-9741-E4FEBF7AA2FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30308",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T19:15:51.513",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T21:00:10.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03",
|
||||
"matchCriteriaId": "226A6DBF-E27F-43E6-9741-E4FEBF7AA2FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30309",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T19:15:51.670",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-22T20:59:52.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2025.03",
|
||||
"matchCriteriaId": "226A6DBF-E27F-43E6-9741-E4FEBF7AA2FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-329xx/CVE-2025-32965.json
Normal file
90
CVE-2025/CVE-2025-329xx/CVE-2025-32965.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-32965",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-22T21:15:45.503",
|
||||
"lastModified": "2025-04-22T21:15:45.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-506"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XRPLF/xrpl.js/security/advisories/GHSA-33qr-m49q-rxfx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/assign-a-regular-key-pair",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://xrpl.org/docs/tutorials/how-tos/manage-account-settings/disable-master-key-pair",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-370xx/CVE-2025-37087.json
Normal file
21
CVE-2025/CVE-2025-370xx/CVE-2025-37087.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-37087",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-04-22T21:15:45.650",
|
||||
"lastModified": "2025-04-22T21:15:45.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the cmdb service of the HPE Performance Cluster Manager (HPCM) could allow an attacker to gain access to an arbitrary file on the server host."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/docDisplay?docLocale=en_US&docId=a00146087en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-43947",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:16:01.170",
|
||||
"lastModified": "2025-04-22T18:16:01.170",
|
||||
"lastModified": "2025-04-22T21:15:45.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Codemers KLIMS 1.6.DEV lacks a proper access control mechanism, allowing a normal KLIMS user to perform all the actions that an admin can perform, such as modifying the configuration, creating a user, uploading files, etc."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://de.linkedin.com/company/codemers",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-43948",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:16:01.277",
|
||||
"lastModified": "2025-04-22T18:16:01.277",
|
||||
"lastModified": "2025-04-22T21:15:45.887",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Codemers KLIMS 1.6.DEV allows Python code injection. A user can provide Python code as an input value for a parameter or qualifier (such as for sorting), which will get executed on the server side."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://de.linkedin.com/company/codemers",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-43952",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:16:01.773",
|
||||
"lastModified": "2025-04-22T18:16:01.773",
|
||||
"lastModified": "2025-04-22T21:15:46.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (reflected XSS) vulnerability was found in Mettler Toledo FreeWeight.Net Web Reports Viewer 8.4.0 (440). It allows an attacker to inject malicious scripts via the IW_SessionID_ parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2025-43952",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.mt.com/FreeWeighNet",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2025-43952",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
89
README.md
89
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-22T20:00:19.847748+00:00
|
||||
2025-04-22T22:00:19.683550+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-22T19:59:50.427000+00:00
|
||||
2025-04-22T21:15:46.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291114
|
||||
291118
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `34`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-28027](CVE-2025/CVE-2025-280xx/CVE-2025-28027.json) (`2025-04-22T18:15:58.910`)
|
||||
- [CVE-2025-28029](CVE-2025/CVE-2025-280xx/CVE-2025-28029.json) (`2025-04-22T18:15:59.037`)
|
||||
- [CVE-2025-28035](CVE-2025/CVE-2025-280xx/CVE-2025-28035.json) (`2025-04-22T18:15:59.160`)
|
||||
- [CVE-2025-28036](CVE-2025/CVE-2025-280xx/CVE-2025-28036.json) (`2025-04-22T18:15:59.260`)
|
||||
- [CVE-2025-28038](CVE-2025/CVE-2025-280xx/CVE-2025-28038.json) (`2025-04-22T18:15:59.377`)
|
||||
- [CVE-2025-28039](CVE-2025/CVE-2025-280xx/CVE-2025-28039.json) (`2025-04-22T18:15:59.500`)
|
||||
- [CVE-2025-29621](CVE-2025/CVE-2025-296xx/CVE-2025-29621.json) (`2025-04-22T19:15:52.300`)
|
||||
- [CVE-2025-31327](CVE-2025/CVE-2025-313xx/CVE-2025-31327.json) (`2025-04-22T19:15:52.420`)
|
||||
- [CVE-2025-31328](CVE-2025/CVE-2025-313xx/CVE-2025-31328.json) (`2025-04-22T19:15:52.570`)
|
||||
- [CVE-2025-32788](CVE-2025/CVE-2025-327xx/CVE-2025-32788.json) (`2025-04-22T18:15:59.630`)
|
||||
- [CVE-2025-32950](CVE-2025/CVE-2025-329xx/CVE-2025-32950.json) (`2025-04-22T18:15:59.793`)
|
||||
- [CVE-2025-32951](CVE-2025/CVE-2025-329xx/CVE-2025-32951.json) (`2025-04-22T18:15:59.940`)
|
||||
- [CVE-2025-32952](CVE-2025/CVE-2025-329xx/CVE-2025-32952.json) (`2025-04-22T18:16:00.097`)
|
||||
- [CVE-2025-32959](CVE-2025/CVE-2025-329xx/CVE-2025-32959.json) (`2025-04-22T18:16:00.233`)
|
||||
- [CVE-2025-32960](CVE-2025/CVE-2025-329xx/CVE-2025-32960.json) (`2025-04-22T18:16:00.380`)
|
||||
- [CVE-2025-32961](CVE-2025/CVE-2025-329xx/CVE-2025-32961.json) (`2025-04-22T18:16:00.557`)
|
||||
- [CVE-2025-32963](CVE-2025/CVE-2025-329xx/CVE-2025-32963.json) (`2025-04-22T18:16:00.710`)
|
||||
- [CVE-2025-32964](CVE-2025/CVE-2025-329xx/CVE-2025-32964.json) (`2025-04-22T18:16:00.847`)
|
||||
- [CVE-2025-43946](CVE-2025/CVE-2025-439xx/CVE-2025-43946.json) (`2025-04-22T18:16:01.047`)
|
||||
- [CVE-2025-43947](CVE-2025/CVE-2025-439xx/CVE-2025-43947.json) (`2025-04-22T18:16:01.170`)
|
||||
- [CVE-2025-43948](CVE-2025/CVE-2025-439xx/CVE-2025-43948.json) (`2025-04-22T18:16:01.277`)
|
||||
- [CVE-2025-43949](CVE-2025/CVE-2025-439xx/CVE-2025-43949.json) (`2025-04-22T18:16:01.410`)
|
||||
- [CVE-2025-43950](CVE-2025/CVE-2025-439xx/CVE-2025-43950.json) (`2025-04-22T18:16:01.517`)
|
||||
- [CVE-2025-43951](CVE-2025/CVE-2025-439xx/CVE-2025-43951.json) (`2025-04-22T18:16:01.650`)
|
||||
- [CVE-2025-43952](CVE-2025/CVE-2025-439xx/CVE-2025-43952.json) (`2025-04-22T18:16:01.773`)
|
||||
- [CVE-2025-26159](CVE-2025/CVE-2025-261xx/CVE-2025-26159.json) (`2025-04-22T20:15:28.130`)
|
||||
- [CVE-2025-29743](CVE-2025/CVE-2025-297xx/CVE-2025-29743.json) (`2025-04-22T20:15:28.603`)
|
||||
- [CVE-2025-32965](CVE-2025/CVE-2025-329xx/CVE-2025-32965.json) (`2025-04-22T21:15:45.503`)
|
||||
- [CVE-2025-37087](CVE-2025/CVE-2025-370xx/CVE-2025-37087.json) (`2025-04-22T21:15:45.650`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `46`
|
||||
Recently modified CVEs: `79`
|
||||
|
||||
- [CVE-2023-51299](CVE-2023/CVE-2023-512xx/CVE-2023-51299.json) (`2025-04-22T19:59:50.427`)
|
||||
- [CVE-2023-51300](CVE-2023/CVE-2023-513xx/CVE-2023-51300.json) (`2025-04-22T19:57:43.537`)
|
||||
- [CVE-2024-20029](CVE-2024/CVE-2024-200xx/CVE-2024-20029.json) (`2025-04-22T19:53:12.210`)
|
||||
- [CVE-2024-20030](CVE-2024/CVE-2024-200xx/CVE-2024-20030.json) (`2025-04-22T19:54:09.547`)
|
||||
- [CVE-2024-50766](CVE-2024/CVE-2024-507xx/CVE-2024-50766.json) (`2025-04-22T19:30:32.917`)
|
||||
- [CVE-2024-50960](CVE-2024/CVE-2024-509xx/CVE-2024-50960.json) (`2025-04-22T18:00:52.937`)
|
||||
- [CVE-2024-50993](CVE-2024/CVE-2024-509xx/CVE-2024-50993.json) (`2025-04-22T18:09:32.990`)
|
||||
- [CVE-2024-50994](CVE-2024/CVE-2024-509xx/CVE-2024-50994.json) (`2025-04-22T18:11:27.543`)
|
||||
- [CVE-2024-50995](CVE-2024/CVE-2024-509xx/CVE-2024-50995.json) (`2025-04-22T18:11:51.507`)
|
||||
- [CVE-2024-50998](CVE-2024/CVE-2024-509xx/CVE-2024-50998.json) (`2025-04-22T18:12:56.867`)
|
||||
- [CVE-2024-50999](CVE-2024/CVE-2024-509xx/CVE-2024-50999.json) (`2025-04-22T18:13:30.633`)
|
||||
- [CVE-2024-51000](CVE-2024/CVE-2024-510xx/CVE-2024-51000.json) (`2025-04-22T18:13:56.557`)
|
||||
- [CVE-2024-51001](CVE-2024/CVE-2024-510xx/CVE-2024-51001.json) (`2025-04-22T18:14:23.380`)
|
||||
- [CVE-2024-51006](CVE-2024/CVE-2024-510xx/CVE-2024-51006.json) (`2025-04-22T18:16:00.370`)
|
||||
- [CVE-2024-54802](CVE-2024/CVE-2024-548xx/CVE-2024-54802.json) (`2025-04-22T18:17:11.743`)
|
||||
- [CVE-2024-54803](CVE-2024/CVE-2024-548xx/CVE-2024-54803.json) (`2025-04-22T18:16:52.410`)
|
||||
- [CVE-2024-57252](CVE-2024/CVE-2024-572xx/CVE-2024-57252.json) (`2025-04-22T19:38:49.933`)
|
||||
- [CVE-2025-0532](CVE-2025/CVE-2025-05xx/CVE-2025-0532.json) (`2025-04-22T19:53:47.040`)
|
||||
- [CVE-2025-0535](CVE-2025/CVE-2025-05xx/CVE-2025-0535.json) (`2025-04-22T19:45:10.037`)
|
||||
- [CVE-2025-0565](CVE-2025/CVE-2025-05xx/CVE-2025-0565.json) (`2025-04-22T19:37:16.983`)
|
||||
- [CVE-2025-24948](CVE-2025/CVE-2025-249xx/CVE-2025-24948.json) (`2025-04-22T18:41:34.110`)
|
||||
- [CVE-2025-24949](CVE-2025/CVE-2025-249xx/CVE-2025-24949.json) (`2025-04-22T18:39:42.840`)
|
||||
- [CVE-2025-26269](CVE-2025/CVE-2025-262xx/CVE-2025-26269.json) (`2025-04-22T18:15:58.627`)
|
||||
- [CVE-2025-28198](CVE-2025/CVE-2025-281xx/CVE-2025-28198.json) (`2025-04-22T18:24:06.670`)
|
||||
- [CVE-2025-3402](CVE-2025/CVE-2025-34xx/CVE-2025-3402.json) (`2025-04-22T19:17:48.387`)
|
||||
- [CVE-2024-20032](CVE-2024/CVE-2024-200xx/CVE-2024-20032.json) (`2025-04-22T20:14:41.540`)
|
||||
- [CVE-2024-20033](CVE-2024/CVE-2024-200xx/CVE-2024-20033.json) (`2025-04-22T20:18:33.123`)
|
||||
- [CVE-2024-20034](CVE-2024/CVE-2024-200xx/CVE-2024-20034.json) (`2025-04-22T20:23:07.077`)
|
||||
- [CVE-2024-20036](CVE-2024/CVE-2024-200xx/CVE-2024-20036.json) (`2025-04-22T20:23:27.683`)
|
||||
- [CVE-2024-20037](CVE-2024/CVE-2024-200xx/CVE-2024-20037.json) (`2025-04-22T20:23:37.533`)
|
||||
- [CVE-2024-20038](CVE-2024/CVE-2024-200xx/CVE-2024-20038.json) (`2025-04-22T20:23:48.507`)
|
||||
- [CVE-2024-33452](CVE-2024/CVE-2024-334xx/CVE-2024-33452.json) (`2025-04-22T20:15:27.787`)
|
||||
- [CVE-2024-40445](CVE-2024/CVE-2024-404xx/CVE-2024-40445.json) (`2025-04-22T20:15:27.957`)
|
||||
- [CVE-2024-48356](CVE-2024/CVE-2024-483xx/CVE-2024-48356.json) (`2025-04-22T20:24:36.477`)
|
||||
- [CVE-2024-48572](CVE-2024/CVE-2024-485xx/CVE-2024-48572.json) (`2025-04-22T20:23:23.893`)
|
||||
- [CVE-2024-48573](CVE-2024/CVE-2024-485xx/CVE-2024-48573.json) (`2025-04-22T20:17:44.560`)
|
||||
- [CVE-2024-53569](CVE-2024/CVE-2024-535xx/CVE-2024-53569.json) (`2025-04-22T21:15:44.850`)
|
||||
- [CVE-2024-57522](CVE-2024/CVE-2024-575xx/CVE-2024-57522.json) (`2025-04-22T20:08:29.483`)
|
||||
- [CVE-2024-57523](CVE-2024/CVE-2024-575xx/CVE-2024-57523.json) (`2025-04-22T20:06:16.133`)
|
||||
- [CVE-2025-28031](CVE-2025/CVE-2025-280xx/CVE-2025-28031.json) (`2025-04-22T20:15:28.253`)
|
||||
- [CVE-2025-29394](CVE-2025/CVE-2025-293xx/CVE-2025-29394.json) (`2025-04-22T21:15:45.123`)
|
||||
- [CVE-2025-29547](CVE-2025/CVE-2025-295xx/CVE-2025-29547.json) (`2025-04-22T20:15:28.430`)
|
||||
- [CVE-2025-29621](CVE-2025/CVE-2025-296xx/CVE-2025-29621.json) (`2025-04-22T21:15:45.253`)
|
||||
- [CVE-2025-30306](CVE-2025/CVE-2025-303xx/CVE-2025-30306.json) (`2025-04-22T21:01:49.820`)
|
||||
- [CVE-2025-30307](CVE-2025/CVE-2025-303xx/CVE-2025-30307.json) (`2025-04-22T21:00:48.530`)
|
||||
- [CVE-2025-30308](CVE-2025/CVE-2025-303xx/CVE-2025-30308.json) (`2025-04-22T21:00:10.810`)
|
||||
- [CVE-2025-30309](CVE-2025/CVE-2025-303xx/CVE-2025-30309.json) (`2025-04-22T20:59:52.953`)
|
||||
- [CVE-2025-43947](CVE-2025/CVE-2025-439xx/CVE-2025-43947.json) (`2025-04-22T21:15:45.750`)
|
||||
- [CVE-2025-43948](CVE-2025/CVE-2025-439xx/CVE-2025-43948.json) (`2025-04-22T21:15:45.887`)
|
||||
- [CVE-2025-43952](CVE-2025/CVE-2025-439xx/CVE-2025-43952.json) (`2025-04-22T21:15:46.017`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
312
_state.csv
312
_state.csv
@ -152132,7 +152132,7 @@ CVE-2020-1823,0,0,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362
|
||||
CVE-2020-18230,0,0,ebe6a5a6a2698552960b0422ae9d0e50a9d70f16138ca3d85f0e7ad4347f523d,2024-11-21T05:08:29.907000
|
||||
CVE-2020-18232,0,0,5705461e816b6f6694e9ef2f2718b69a045749e869a3533e3ed5283cd8248b1c,2024-11-21T05:08:30.053000
|
||||
CVE-2020-1824,0,0,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000
|
||||
CVE-2020-18243,0,1,6103e403ac779981364ca6093b57c6b9bfb83ee84e9736cd661518d6d37d5039,2025-04-22T18:43:07.550000
|
||||
CVE-2020-18243,0,0,6103e403ac779981364ca6093b57c6b9bfb83ee84e9736cd661518d6d37d5039,2025-04-22T18:43:07.550000
|
||||
CVE-2020-1825,0,0,a942dde46b900514ca47c8e921ccce8d9844cba45eeb3a931cde0bf330b07fb0,2024-11-21T05:11:26.497000
|
||||
CVE-2020-18259,0,0,b06cdddd0c60b9cb1417c4294714ea460eb7e87371666ba861010dfe792d37cd,2024-11-21T05:08:30.217000
|
||||
CVE-2020-1826,0,0,9d793ee12c01e44af13c183cf0b2187da1411c3957dcb1f4bfb4e1b041d3db56,2024-11-21T05:11:26.610000
|
||||
@ -176405,7 +176405,7 @@ CVE-2021-3239,0,0,0a4597190d8f23dd2081bf0559d8d6310fd607faec9ae49c16d26f382cdd1d
|
||||
CVE-2021-32399,0,0,db159d6885d19b2e43865931737efbad828185f3031c36038324732ddb3faa6a,2024-11-21T06:06:59.640000
|
||||
CVE-2021-32402,0,0,d4e74057d74a21c9788d7c66bc0a73c9f344a9e89e9be574bcac7f8e7d30b4e0,2024-11-21T06:06:59.810000
|
||||
CVE-2021-32403,0,0,f840fc64fcfb816e2f09f7cae19752fe98865ae12fb8e5ebb5571d8443cef885,2024-11-21T06:06:59.950000
|
||||
CVE-2021-32415,0,0,6850bf86b7819adace455e2861880a0b7deee776aa2a5a9a282273d567f63bea,2024-11-21T06:07:00.093000
|
||||
CVE-2021-32415,0,1,c021449cb07a5826731300f6d2bccddba99033638aa1ff94c9385ebcaf3ccca0,2025-04-22T20:15:18.413000
|
||||
CVE-2021-32419,0,0,4e92804a2819bdd492360480a8535d2f8b1ce9dfe501c49b1413ece57d754cc9,2025-03-18T20:15:16.413000
|
||||
CVE-2021-3242,0,0,76383404096a0949c91eebe2b1c4daa6ebd1fa854c07a3dc74708e5c0441f394,2024-11-21T06:21:09.510000
|
||||
CVE-2021-32420,0,0,a7575ea9d2d43abaa95602199279c58d392c8615af2adefe771964be7b6f6555,2024-11-21T06:07:00.390000
|
||||
@ -181961,7 +181961,7 @@ CVE-2021-39657,0,0,eacc2776ee1fc6de6df3dee959632ed1e7a519b1b995832d5e4f959dcabbc
|
||||
CVE-2021-39658,0,0,697274918af0c87b72a6aacda49ee508ee7739392773a54786922caddb7f57fa,2024-11-21T06:19:54.393000
|
||||
CVE-2021-39659,0,0,8ef2c932d7a6ff062443a931117d372597953ad36b3d412dd40ed3ce69f7a75c,2024-11-21T06:19:54.547000
|
||||
CVE-2021-3966,0,0,ab8ea8ae52feef11cc0859c150253fd66373ffb427424be8d483b279559992ee,2024-11-21T06:23:15.100000
|
||||
CVE-2021-39660,0,0,3874c03d8a4fdb9a2c742a5fa9112b3f096bf1c76575235b88f989d121eb5704,2024-11-21T06:19:54.813000
|
||||
CVE-2021-39660,0,1,61ea246db26ef9005c1b006e4c5fc2ae9c37e248762fbe02e23a61236c64eb26,2025-04-22T20:15:19.513000
|
||||
CVE-2021-39661,0,0,c50ec3e413313ffef8552e7b69c574530f714a8edd1a536bcbe48b43b8e8748d,2024-11-21T06:19:55.587000
|
||||
CVE-2021-39662,0,0,98bde1fa6861eab91bcbd3fd7fcadb548ee6bb3113fb5bd06f0070a5bf60bc3b,2024-11-21T06:19:55.803000
|
||||
CVE-2021-39663,0,0,31a39b938bce906d5601ccc4bb5d0e641f9dee7be2652f38a7166ac17793985b,2024-11-21T06:19:56.017000
|
||||
@ -183806,7 +183806,7 @@ CVE-2021-41932,0,0,7290e3801ff683fea6c4c593b739e963849cb6754cbbe1ea2edec520b76b6
|
||||
CVE-2021-41938,0,0,efd478709f7d7a094758b024380b62ffc010ec0958df1137601d4646969bd8f9,2024-11-21T06:26:58.547000
|
||||
CVE-2021-4194,0,0,b3c3357c90d56479a8a760d95b47b78e00cca21ddffdc67f88048fbe055e2a2f,2024-11-21T06:37:07.213000
|
||||
CVE-2021-41942,0,0,054a2b3b9c4653030d8750e0c516c5d8240e95155d55d5b1e2c6c2de8a33e9b3,2024-11-21T06:26:58.697000
|
||||
CVE-2021-41943,0,0,4822c811a92203f0dfe8cc849609d3144fc2d5e3380f0a88401d1c6097b7d0ae,2024-11-21T06:26:58.843000
|
||||
CVE-2021-41943,0,1,ab9d37dcfd6603c9a62416aa7cbec84f08e92375d3c33d673b4e2aa825ce362a,2025-04-22T21:15:41.187000
|
||||
CVE-2021-41945,0,0,8e5d591af7183c18b83d69f3c8664f48e98f06a3ed8251c7a24a2d9081caead9,2024-11-21T06:26:58.990000
|
||||
CVE-2021-41946,0,0,ff2d83ece5208c3a3d2b8aee06b3ba418792ef8b212083ef7128324326e0ae28,2024-11-21T06:26:59.150000
|
||||
CVE-2021-41947,0,0,8e0bf5af5605ff05710176fd7ef608222af85e3d48eff345848e017f62cfd549,2024-11-21T06:26:59.300000
|
||||
@ -190099,7 +190099,7 @@ CVE-2022-20237,0,0,657b405ad7f694bdf71741f86de03a8e1118f3e784ab40c22b7dbcab6aeb5
|
||||
CVE-2022-20238,0,0,e2e365cc7c72201f8d424b24220050137a5c60ffce5aa0694d279d1a98fc3ff3,2024-11-21T06:42:25.030000
|
||||
CVE-2022-20239,0,0,efd6f2017103d3ef630b8bed4ec744dce4db5a3abe7e7150235fdd0bfc0f1e07,2024-11-21T06:42:25.157000
|
||||
CVE-2022-2024,0,0,4cea2ce76e2d694c229bfad840d79efbc6ce428f059eb7c6697b33933cbd2817,2024-11-21T07:00:11.533000
|
||||
CVE-2022-20240,0,0,cc421c1a2c38342c7cc7cf7439078c772d84da91c82b4db2ecc995cef8744276,2024-11-21T06:42:25.273000
|
||||
CVE-2022-20240,0,1,84efb01dc7e3673442c3fdbc4cd7dfdcba94e9176aca32563c4d3be78425292d,2025-04-22T20:15:19.700000
|
||||
CVE-2022-20241,0,0,212b350bb36d9329f1593f6471561341d7d671fa79864e09815b4a450e54f402,2024-11-21T06:42:25.403000
|
||||
CVE-2022-20242,0,0,223b984a6f54b1bfb34ad686df9bd704b615aa937bc207e6c44480f1f5517299,2024-11-21T06:42:25.527000
|
||||
CVE-2022-20243,0,0,1e2c7013cc710c70e79126958fc683d9a8ac7b7a476b9005c289d26bb734c7a1,2024-11-21T06:42:25.640000
|
||||
@ -190282,7 +190282,7 @@ CVE-2022-20408,0,0,d14071f7aba8bd3d31cf3ed06bf5e709f5e88703f42e050eaec03280fa1ce
|
||||
CVE-2022-20409,0,0,cd468fcb329061075d488c621e4d5b0df994d53ef7828d6b181bbea7a61c22aa,2024-11-21T06:42:45.677000
|
||||
CVE-2022-2041,0,0,29a31a5c801b973f454444ed60fa2758f3d76b9e5b8a6d46010dcdc10f21c83b,2025-01-16T15:08:00.773000
|
||||
CVE-2022-20410,0,0,0a92c39aac8de556dda15ccb789b54ccf99aed43f531a5b18fdd0a2c4e87502f,2024-11-21T06:42:45.780000
|
||||
CVE-2022-20411,0,0,d37d8d8bddcaf18118e4ac6fba3096311026113ecc61556908b9d386df325b64,2024-11-21T06:42:45.883000
|
||||
CVE-2022-20411,0,1,13092ec79c3b149ad5ceaaac12d68aaf14f4278f1e3b0a1dbc12b5290de8f3b0,2025-04-22T20:15:19.860000
|
||||
CVE-2022-20412,0,0,5f1a37172a8baa611d30d0d6d72966d9d0a4e08d2bcffc149774535a582659c0,2024-11-21T06:42:45.993000
|
||||
CVE-2022-20413,0,0,da8fbc44de8bf28635e97cb1c312ecedae2faffcbc902394c7c43941e556f4c9,2024-11-21T06:42:46.093000
|
||||
CVE-2022-20414,0,0,c0b83a950501c1513f75c3ff6396d06f505c3bbc5405db915f58a5bf25407667,2024-11-21T06:42:46.207000
|
||||
@ -190316,7 +190316,7 @@ CVE-2022-20439,0,0,4e0f469a358dec661499f8092e95875650055986e112bc0c09eabf3b700b5
|
||||
CVE-2022-2044,0,0,36c69cf7089313b1e07bcd1d1fa86f05ef1118e26409f6e85c78d9ae7ad6b420,2024-11-21T07:00:13.610000
|
||||
CVE-2022-20440,0,0,74fb659f0f2f504bd4eac888c374e0f3902baa9ae5b8347a107a1ed83b0bc797,2024-11-21T06:42:48.987000
|
||||
CVE-2022-20441,0,0,2517a3a10bddb50bfcb8f4e863e546058c98824f2f83c15ba3333e43b0fc4c5d,2024-11-21T06:42:49.090000
|
||||
CVE-2022-20442,0,0,b21fecd4589f70c150fe0ef477208c5d6bf552436bdec62c0ef1238b8b626126,2024-11-21T06:42:49.207000
|
||||
CVE-2022-20442,0,1,58c1328c83c69b6703ca40fa501f6f9edd31a10b2410dcce6bf007f2a83eb4db,2025-04-22T20:15:20.020000
|
||||
CVE-2022-20443,0,0,87b9c525e882beb8a402d178b882803c8fda1b00ced8015b167a482402a094ee,2024-11-21T06:42:49.353000
|
||||
CVE-2022-20444,0,0,7d36fbb59153ec6f42231c610f1c323c5ceac50d9b8309fb0fc750c8bf8083d4,2023-11-07T03:42:26.580000
|
||||
CVE-2022-20445,0,0,5878ce1af2db5b947bbe17f3e8adf30c9ab0ffa0428ed2812284e21c61d21d7e,2024-11-21T06:42:49.507000
|
||||
@ -190352,17 +190352,17 @@ CVE-2022-20472,0,0,dcce5a6f04ad09e3be80a417ce6b011a045f05bc4ae668b7836f7ad5eb55f
|
||||
CVE-2022-20473,0,0,93d73a25f3db142365fc2fea53d09f5cadca725d7418abc0e1f74b9e64dcd081,2025-04-22T15:15:58.640000
|
||||
CVE-2022-20474,0,0,7e7fc32602bdacd44376c59543b9ac7e597a08d5200917375704fe0ca7deece7,2025-04-22T15:15:58.793000
|
||||
CVE-2022-20475,0,0,09fa5942f56b77e2dee4de4a3f0f5c86f2679f021c86f45e31c48807868c2a15,2025-04-22T15:15:58.953000
|
||||
CVE-2022-20476,0,1,69ccf6508fab8a73b0f93e65723bd0e8d9e1ebb3a00d9854e7d38439c348ef9f,2025-04-22T18:15:44.853000
|
||||
CVE-2022-20477,0,1,e38e5579dd7eb016c7c85f17a4acc8c889cff9639bd8dc8a70a99fe91df1fd2d,2025-04-22T18:15:45.910000
|
||||
CVE-2022-20478,0,1,a1b2b32a0ae0da6c405541c4c21420f51810bd4a0769f05e30b5926ba9288c9c,2025-04-22T18:15:46.100000
|
||||
CVE-2022-20479,0,1,45b7b5834d047bc9f850fcd4f287824907253bdad4a5b2c283cdcc49e11874a0,2025-04-22T18:15:46.267000
|
||||
CVE-2022-20476,0,0,69ccf6508fab8a73b0f93e65723bd0e8d9e1ebb3a00d9854e7d38439c348ef9f,2025-04-22T18:15:44.853000
|
||||
CVE-2022-20477,0,0,e38e5579dd7eb016c7c85f17a4acc8c889cff9639bd8dc8a70a99fe91df1fd2d,2025-04-22T18:15:45.910000
|
||||
CVE-2022-20478,0,0,a1b2b32a0ae0da6c405541c4c21420f51810bd4a0769f05e30b5926ba9288c9c,2025-04-22T18:15:46.100000
|
||||
CVE-2022-20479,0,0,45b7b5834d047bc9f850fcd4f287824907253bdad4a5b2c283cdcc49e11874a0,2025-04-22T18:15:46.267000
|
||||
CVE-2022-2048,0,0,2da1ccc3cf73abd302ef5aa7a80dcd5b9c7985fdc5946e7672dc75039e6a65a6,2024-11-21T07:00:13.980000
|
||||
CVE-2022-20480,0,0,a964b30bda104c2d3f73b6048c7e509702847354f36ad0c998da85215f3e2006,2024-11-21T06:42:53.583000
|
||||
CVE-2022-20480,0,1,edc0f2bac2a58486ca0868e9a4aa1aca1e8272b3767c00f8335ff8432d05572f,2025-04-22T20:15:20.177000
|
||||
CVE-2022-20481,0,0,331b3bb0d71fb26eb0b2297497d1f5bdd64796f266495241866fa6705683ac63,2025-03-21T16:15:14.657000
|
||||
CVE-2022-20482,0,0,f6243b44c02f36253aed4e392ff85988096796156bcb988a52233649640db043,2024-11-21T06:42:53.807000
|
||||
CVE-2022-20483,0,0,b2b636295dc20f324a5dba58bba02215bbfdb769b61d23439295240446cafe7b,2024-11-21T06:42:53.950000
|
||||
CVE-2022-20484,0,0,c05411bcedf0455018fca08729cb7eb82689653ec92bb274c2520a910077b35a,2024-11-21T06:42:54.073000
|
||||
CVE-2022-20485,0,0,b3e1bd6f119b6e938ac76dabe8f80037d067b3885be747eca2a20b3c499a586c,2024-11-21T06:42:54.190000
|
||||
CVE-2022-20482,0,1,6bea20803c8048070a50d60e11fd27eec1f9b8063b2ea24283b5296549041fed,2025-04-22T20:15:20.323000
|
||||
CVE-2022-20483,0,1,5345b831819cac7ac609e43dd250630d227094d054a806edf57dadfa39983f95,2025-04-22T20:15:20.483000
|
||||
CVE-2022-20484,0,1,74433e2ba3ac19294aa17e70f0143dbd1b603c3d278f50fffa9d53f6a071867a,2025-04-22T20:15:20.743000
|
||||
CVE-2022-20485,0,1,ccd19d922fb8ded642e0ecb5402976e8258010354b82d4c88ee87b41d57b8ec6,2025-04-22T20:15:21.007000
|
||||
CVE-2022-20486,0,0,2562d9a10dd28be6da04b637cf4b48935aa87483e18655ecf35c2cf8dcbf69e4,2025-04-22T14:15:16.630000
|
||||
CVE-2022-20487,0,0,a5b80b6c81f412aadab0670380ebcbc04ac32c01b27d597f84540bc7c616858d,2025-04-22T14:15:17.450000
|
||||
CVE-2022-20488,0,0,ca343057758a8fb67663f148f61f04526b50ef068e2ec1bef70b2e60a96bf8d4,2025-04-22T14:15:17.607000
|
||||
@ -190380,8 +190380,8 @@ CVE-2022-20498,0,0,be6b68477d9d29a18955556693749e04daabaed1a7797a78a717f8cc2e561
|
||||
CVE-2022-20499,0,0,877e44e366e643c1614f7ddfe19db6480f131d92c9de4223d1d6c47aeba61347,2025-02-28T20:15:39.160000
|
||||
CVE-2022-2050,0,0,65167bb8fbf844311b8804ba174c061c4decb2dabb828b56ce409f93a3c4cdbf,2024-11-21T07:00:14.217000
|
||||
CVE-2022-20500,0,0,4cf38267c3a89ecc0b20378721710855d75137f99d0f9a239eaee770d775ff85,2025-04-22T14:15:18.550000
|
||||
CVE-2022-20501,0,1,da048a43a3f36503ca0afef421972d9e2019c94a31cf390a8ecf2021d7f1e14f,2025-04-22T18:15:46.427000
|
||||
CVE-2022-20502,0,1,74513c2cad36cc0838a738652df7f5310491eaa513d1b260c43e18fa8a0ddcb5,2025-04-22T18:15:46.600000
|
||||
CVE-2022-20501,0,0,da048a43a3f36503ca0afef421972d9e2019c94a31cf390a8ecf2021d7f1e14f,2025-04-22T18:15:46.427000
|
||||
CVE-2022-20502,0,0,74513c2cad36cc0838a738652df7f5310491eaa513d1b260c43e18fa8a0ddcb5,2025-04-22T18:15:46.600000
|
||||
CVE-2022-20503,0,0,970bd0b54141c152c4c8cb591ed25cd9b3ceebd61bfe3ebf8941b55d0ad5d8df,2025-04-21T14:15:22.280000
|
||||
CVE-2022-20504,0,0,e9afaceafa86eeb8aaa3e40a1344257b11b9ff991d8cb03f0880a72922a2045c,2025-04-21T14:15:22.443000
|
||||
CVE-2022-20505,0,0,ad021312d8d329b0cbb806ead952ffe5340c6bde7c692839e7ec01bb8480f1f6,2025-04-21T14:15:22.607000
|
||||
@ -190496,7 +190496,7 @@ CVE-2022-20608,0,0,e2acde627465b876ba79850f718c5ac2f72da2fec874f888cfbe9aec1f931
|
||||
CVE-2022-20609,0,0,66f8d6fbbbae7032d16fb4ae705a40ee0d5ac742d8400721a84af4919d3d2703,2025-04-18T14:15:17.413000
|
||||
CVE-2022-2061,0,0,17dab169794f21cc312fae4b46f24dcdf50f2d85fa839e50aed99fbc7fbf94d1,2024-11-21T07:00:15.263000
|
||||
CVE-2022-20610,0,0,239dcce2ccc19852f837d22fdcc78348f98a97c0312d709000fce86e430a25fd,2025-04-18T14:15:17.573000
|
||||
CVE-2022-20611,0,1,23934436e4623c71f77f841bb4e29d59e31f8dc6bdb2f6dfe1be50e379c3909c,2025-04-22T18:15:46.770000
|
||||
CVE-2022-20611,0,0,23934436e4623c71f77f841bb4e29d59e31f8dc6bdb2f6dfe1be50e379c3909c,2025-04-22T18:15:46.770000
|
||||
CVE-2022-20612,0,0,10b6784dcf65df43b1f06423bb72cedc4e4d61e0684450bb292ab0cf1df1ffc5,2024-11-21T06:43:09.423000
|
||||
CVE-2022-20613,0,0,e12ee35328553949009749263b4caae0079bc31a261bbb3e9cc375ef2c9638f8,2024-11-21T06:43:09.580000
|
||||
CVE-2022-20614,0,0,3551ebdd4bc4fe280da111d4236b9c16d622f16b73810434a5f4a366af2e488f,2024-11-21T06:43:09.733000
|
||||
@ -195250,8 +195250,8 @@ CVE-2022-25831,0,0,9859d90012a85c3437aa3cceabb5ff001dee95b563db6640950a109dbd28a
|
||||
CVE-2022-25832,0,0,73081542bdb56d846676a133804227fabe975fccac8897b5b85c83bc13de7bfe,2024-11-21T06:53:05.093000
|
||||
CVE-2022-25833,0,0,a7b60fa3e68ec772aa239de867ad98fc96fef394bd8ee1b88ea88b365589f6cb,2024-11-21T06:53:05.213000
|
||||
CVE-2022-25834,0,0,34154f05664f2dba01094c21207195d89a86c7ff6f3271f0193eace4332d8f12,2024-11-21T06:53:05.340000
|
||||
CVE-2022-25836,0,0,39cb2d7a6c4a5b38ef91c970a437e3beed34843628317c43f2677fd87c30630f,2024-11-21T06:53:05.487000
|
||||
CVE-2022-25837,0,0,1f3e22b5fe5ed8ba68f27187e64779dbf6a7d6dcad3044da227512ae34c6e824,2024-11-21T06:53:05.627000
|
||||
CVE-2022-25836,0,1,85db00c9b99d6ab1378c8c54fbb0abfdd7fbd74d102c1e97e2cae52c33489f4c,2025-04-22T21:15:42.160000
|
||||
CVE-2022-25837,0,1,d1b2ac8fa158c2815213cf0430c128ad0205fbf298f9a6e3fe3c40ec31be6615,2025-04-22T21:15:42.503000
|
||||
CVE-2022-25838,0,0,d564944ec28872aa7820766a077a6c91ecaefedad6b5f68df0e4145bdb701388,2024-11-21T06:53:05.747000
|
||||
CVE-2022-25839,0,0,c02a9cf4fa66de992dee363a5336993ddcb54f30a7fa33b8fbfcb3f5be2a91c6,2024-11-21T06:53:05.873000
|
||||
CVE-2022-2584,0,0,8b55bb628db358c01d88130f6e8cf7ea4745e4b3d1bc63cac3462f7927dfbaab,2025-04-11T17:15:36.570000
|
||||
@ -195318,7 +195318,7 @@ CVE-2022-25906,0,0,6fa7922cdc1470eec19e59eacf6c02beb9c4b496040ee3c5a4333d4193599
|
||||
CVE-2022-25907,0,0,1ee7db8b24041182a92e936f2ebd1a22380dbaf28121bda51fd362fedc6c17df,2024-11-21T06:53:12.060000
|
||||
CVE-2022-25908,0,0,b08d15422a8e8628def5a64f642fd73a0d8c66f3763a3a7b8396b7895efaa22b,2025-04-01T16:15:16.030000
|
||||
CVE-2022-2591,0,0,0458d48158bc5fa48589b7e6cb733bf9a8da70e51b25db03cb6adc4d9b384089,2024-11-21T07:01:18.613000
|
||||
CVE-2022-25912,0,0,d88f9a3d6240b92cbcfbda23fbd5c317b40840120cc8b3a5102a07f98561fb42,2024-11-21T06:53:12.270000
|
||||
CVE-2022-25912,0,1,59e1c9eab3297eb9c35c98354797ee34d0c83561fffdb8a20a25529f6fd69c16,2025-04-22T21:15:42.690000
|
||||
CVE-2022-25914,0,0,ea85b3d20fcdba40e98a1f2cdcd647c8276d14d85844e934ba691037c0cb5188,2024-11-21T06:53:12.377000
|
||||
CVE-2022-25915,0,0,5aa003b7e1f84307c964e23607671f46a7f7788a33952f993ccefd1f2966489a,2024-11-21T06:53:12.477000
|
||||
CVE-2022-25916,0,0,dce8b45aa57b4dc4edbd177863ae087ff5c96770b5950542262a7324dcde11f2,2025-03-27T14:15:18.600000
|
||||
@ -198558,7 +198558,7 @@ CVE-2022-29926,0,0,128c39044676388dfe021bc3d1b1ad399f900f98eacc5dce1a4c50ab82558
|
||||
CVE-2022-29927,0,0,dde882aa61c96e4537d5024baf2a80cbcc1d5bc263de2131550eed757d10bfa2,2024-11-21T06:59:58.983000
|
||||
CVE-2022-29928,0,0,d87bfa1d298f8557a528983b93eebd06e6240cf3e7cca11fe7756f48c6ad2f67,2024-11-21T06:59:59.110000
|
||||
CVE-2022-29929,0,0,4df6486371c03edd2edb930c17a9a7c18bb1f236be1992a2a5b7ee6573ea8f5a,2024-11-21T06:59:59.267000
|
||||
CVE-2022-2993,0,1,96173aeb8aff4a5e2c4fd88f9db65d63a38b4b0c58e215589d448e66e2128f5b,2025-04-22T18:15:49.893000
|
||||
CVE-2022-2993,0,0,96173aeb8aff4a5e2c4fd88f9db65d63a38b4b0c58e215589d448e66e2128f5b,2025-04-22T18:15:49.893000
|
||||
CVE-2022-29930,0,0,7f65dc3631a3d18a769e9e996767ec3462efe57640413ed3652a33cf3b8f6253,2024-11-21T06:59:59.397000
|
||||
CVE-2022-29931,0,0,93bd3b0d113a202147c7ea005d9fb2f6e855984bf39bf0be2c9aa6437c71cd35,2024-11-21T06:59:59.523000
|
||||
CVE-2022-29932,0,0,d96f85a9ea5b18395cf9c32f16ba230f3e3c3c3cb9df8106f00a91910d7953d3,2024-11-21T06:59:59.673000
|
||||
@ -199967,7 +199967,7 @@ CVE-2022-31592,0,0,da552be717c226060bc69884ddb1f8b1fa37e7174a1f3a6ec9ee5104c1000
|
||||
CVE-2022-31593,0,0,611c6c557632a0e1dae149340ae17b613f3627de51730968870dc55f614bdf3b,2024-11-21T07:04:48.483000
|
||||
CVE-2022-31594,0,0,a75a219ab3216d09bd047342814c268eda2fb3587322fdcff75bf8f00b30b974,2024-11-21T07:04:48.607000
|
||||
CVE-2022-31595,0,0,e0b4d3e5ac6df257ee26af97ae036efa58b73ca05514a980e91fa2b488a31b8b,2024-11-21T07:04:48.780000
|
||||
CVE-2022-31596,0,1,2ac19a3192189cc90bb09658eec3ee55dec8191918ce1d92efa30f90aa4ece71,2025-04-22T18:15:52.577000
|
||||
CVE-2022-31596,0,0,2ac19a3192189cc90bb09658eec3ee55dec8191918ce1d92efa30f90aa4ece71,2025-04-22T18:15:52.577000
|
||||
CVE-2022-31597,0,0,8b778b05ce5a659652772c8db2f6b7c3aeb324155437bc4685db306d98084125,2024-11-21T07:04:49.053000
|
||||
CVE-2022-31598,0,0,d5cd82c8de9a365bf85b5da0a9918c286c3cd8d1edcdb90609544fee0791823b,2024-11-21T07:04:49.190000
|
||||
CVE-2022-31599,0,0,c02966f6af8e49ace04e28b181865ee07f039c9b6fb618ad88a560a4e56fba09,2024-11-21T07:04:49.327000
|
||||
@ -200761,7 +200761,7 @@ CVE-2022-32586,0,0,f962fa309035de87590f24eb08eb6c1fdc901a48972c2d5584752c9293aa4
|
||||
CVE-2022-32587,0,0,b6cfc4ca570c76a383f0b549f0cd6fa5046f0c022aab618000587bf8434b55c2,2024-11-21T07:06:41.170000
|
||||
CVE-2022-32588,0,0,3122a218568e9573746bae0e8f994a2b440b3ec20190e3268b4f2a02f5120f8e,2024-11-21T07:06:41.303000
|
||||
CVE-2022-32589,0,0,53aef83568e460c057b9553956debaf02309f24e5828cf75fbe795c6a3952d73,2024-11-21T07:06:41.423000
|
||||
CVE-2022-3259,0,0,85e76ecaa98776cde8a31a343f0c239c9146fc2b1cdbe7c86e211d4cd94a77dd,2024-11-21T07:19:09.773000
|
||||
CVE-2022-3259,0,1,948bbd6e34ba830c0348ecc38f25b4958727137ae25b29035b0581d8ca9bef8d,2025-04-22T21:15:43.103000
|
||||
CVE-2022-32590,0,0,418ecb3b69d98433c4f54dfbb2b9271cb1ae8fe2748f0bd9b76b519253878502,2024-11-21T07:06:41.577000
|
||||
CVE-2022-32591,0,0,47e61789f308f8af61bc675d3668b0e441d4b1818f57a093953eb668c144a094,2024-11-21T07:06:41.717000
|
||||
CVE-2022-32592,0,0,6e7400423fbac7c069ed1d4d9b65bbfe5a22486430d8b1134074b5bd694eae0b,2024-11-21T07:06:41.850000
|
||||
@ -202010,7 +202010,7 @@ CVE-2022-34293,0,0,5da23127c9383be588ccd61cda5c9559b5a06fd586ec339f19e32b00f9c4e
|
||||
CVE-2022-34294,0,0,072a85332561ce733ff1cd5b543d1789991e723e82ad5892614c80d4c9bc99de,2024-11-21T07:09:14.400000
|
||||
CVE-2022-34295,0,0,7747b6b57d0759d8ce774ea402797c1a6b6c83a21df02ebb029b239cef46314d,2024-11-21T07:09:14.540000
|
||||
CVE-2022-34296,0,0,89d4b182cd254248906ea75e71623c7b63b72adeba0e70428ced04a946bb5d1f,2024-11-21T07:09:14.677000
|
||||
CVE-2022-34297,0,0,2672713e2bec48c265a1df054128f1d3c5bac004ca5451ce961b36f468b0d62a,2024-11-21T07:09:14.803000
|
||||
CVE-2022-34297,0,1,92454f7647f72eba2470e533cc1d4d51e6058eb7c0b33f1a78435ee3b54e6796,2025-04-22T21:15:42.933000
|
||||
CVE-2022-34298,0,0,76a83539faa83694bfabf908300e133b333591cd115d311231a1d5e9846b3c44,2024-11-21T07:09:14.930000
|
||||
CVE-2022-34299,0,0,c2de9704661bc228f2a8e6d379b9ae5eb7cda9102317dc9cd68c38526ce7f3ad,2024-11-21T07:09:15.063000
|
||||
CVE-2022-3430,0,0,cf6588513e21a2d0e83b2fbe05870c17b08d09730dcca56093727544cbe3dac8,2024-11-21T07:19:29.873000
|
||||
@ -204542,7 +204542,7 @@ CVE-2022-37235,0,0,251cc36b350fd6109aad547b7e03748cea898716d1f278fb274f3199d170c
|
||||
CVE-2022-37237,0,0,f5459b7f496f3b3a944f0c15a79d13d8bc6a9889cfebb60ef14469bba84f217a,2024-11-21T07:14:38.030000
|
||||
CVE-2022-37238,0,0,9766d3d50e3421048e576e23727499f5226100924fa161a4a6976e050332220d,2024-11-21T07:14:38.177000
|
||||
CVE-2022-37239,0,0,70f1a0c94f258c96a8738893f73ddf32690f4c230e0be4038b02e54631382e73,2024-11-21T07:14:38.327000
|
||||
CVE-2022-3724,0,0,c2a10d4120c746d6b9ff7cead4b9ff29586a72c83796a8d7f049c9a9791ff56d,2024-11-21T07:20:06.650000
|
||||
CVE-2022-3724,0,1,ece27d3c8ee55fd2db00417894716942d73406ee77ea808c57cf3cde88343f04,2025-04-22T20:15:21.543000
|
||||
CVE-2022-37240,0,0,29b29fde5af17fca8224baade72abe6b36ef17032e6219ebef1fcfd46b9c47e9,2024-11-21T07:14:38.470000
|
||||
CVE-2022-37241,0,0,8bc8aa2a825b69d324e2c6e823c81d2e4a614148cb950b7ff392c852f22f70d0,2024-11-21T07:14:38.610000
|
||||
CVE-2022-37242,0,0,66e4844af39b38fb2c7765976120b808551558c34bbea2f805d4b41d2df796af,2024-11-21T07:14:38.753000
|
||||
@ -205657,19 +205657,19 @@ CVE-2022-38786,0,0,a8aade3c89dc29774415a62c938214e747bfe74e14d120bfb838c5d9bc964
|
||||
CVE-2022-38787,0,0,8b5666bf4ab01d78c724aacca552a0f6b3b3572b975f6b3fc7eea574563d1692,2024-11-21T07:17:05.220000
|
||||
CVE-2022-38788,0,0,0957dbcb04ecda9b09f72c803711d84e0c771c36d76d4d9b4ba34136c920f4c7,2024-11-21T07:17:05.390000
|
||||
CVE-2022-38789,0,0,7ad3f55e84e255b6eb522952cc5b277ada3596fc6bb64581c3deca90b3bf965b,2024-11-21T07:17:05.560000
|
||||
CVE-2022-3879,0,0,980525909c4ec3c6ca08a773d34fc3f9fa8f7e428bea6aec9daeda92c6b786ef,2024-11-21T07:20:25.460000
|
||||
CVE-2022-3879,0,1,a22aed1af3d1142ae7d21c172498007d107a06623f2588c5ff970e4d6786f126,2025-04-22T20:15:21.787000
|
||||
CVE-2022-38790,0,0,9e665cf32884b8e08021d798290c11eec27f346c5c3406d272da25bd815f61b7,2024-11-21T07:17:05.723000
|
||||
CVE-2022-38791,0,0,07f698f278160565628d5a56ba4ed88047c539e9327a0de265e7b3788e2b6383,2024-11-21T07:17:05.893000
|
||||
CVE-2022-38792,0,0,73cf5f3e20a6e60bc4fb4119c019d2dd83e5b02526f43a0a8bf9ab0026f29ca7,2024-11-21T07:17:06.070000
|
||||
CVE-2022-38794,0,0,9117c9ed3e84c5c420a86b554cabd76d9339d010faee635532d51533458dd610,2024-11-21T07:17:06.253000
|
||||
CVE-2022-38795,0,0,aedf6db13e3a7db821b14d4031eff146b119c132a1f7f1dd85ad255501164cd9,2024-11-21T07:17:06.403000
|
||||
CVE-2022-38796,0,0,623a2b5c4c3bf9b37e2cce7fa16094e0c517d44814aa8330decac4fbb07bdafd,2024-11-21T07:17:06.570000
|
||||
CVE-2022-3880,0,0,7748228c974ccc221cde7c98c9e82bb9c598ffae100ca52e9896b01c4fd20a8e,2024-11-21T07:20:25.590000
|
||||
CVE-2022-3880,0,1,556de2e07da6e21741c45c22921a3ace9474c4978fea07306b42c540bb8ee1d7,2025-04-22T20:15:23.517000
|
||||
CVE-2022-38801,0,0,faa1ee22844bf0c3e653ea5219f81b95627c6d6cedfaa029c70b8a958d86d45c,2024-11-21T07:17:06.720000
|
||||
CVE-2022-38802,0,0,5d707fb6f3331c99848166905ef2ec4205f8f62d9fa8f5cc786a8bcd80d5dcc4,2024-11-21T07:17:06.873000
|
||||
CVE-2022-38803,0,0,1a5f953bce353683b1b14b31dc4c66a05f21bece25285a917e755f817d868ed1,2024-11-21T07:17:07.023000
|
||||
CVE-2022-38808,0,0,c3b715196991d7192d1efd2a16e15d00eeef051af1ec23511269fde9b0c7248a,2024-11-21T07:17:07.180000
|
||||
CVE-2022-3881,0,0,9de03ca9914c7e387ebb5212c94d1741e6405a373a66c59bc89dfd09fe618cbf,2024-11-21T07:20:25.730000
|
||||
CVE-2022-3881,0,1,032bfd5117dc4e2144d8132cfc87af06fada0cb2080c28d32c9a6fdfd511147e,2025-04-22T20:15:23.790000
|
||||
CVE-2022-38812,0,0,eb08289c82cbe02ae53bb556d02873e859f2281d87355f90e5a02b376429623a,2024-11-21T07:17:07.347000
|
||||
CVE-2022-38813,0,0,afe72e99d1b47e1f0c5121eb70aa4c66e249dc23d157362979c3c041c3561fb3,2024-11-21T07:17:07.510000
|
||||
CVE-2022-38814,0,0,fb00e959ad9c11938df30cd18798372a97b425ab2dfa7a7195183f6b28ba9f8f,2024-11-21T07:17:07.670000
|
||||
@ -205847,7 +205847,7 @@ CVE-2022-39056,0,0,b0ac5aadeffae3260ada3d0065e99a99a4bbffbbdca3ddaacf0f9ff3aea91
|
||||
CVE-2022-39057,0,0,f8c455f4f05e12304b3d2108795a316854cabe985c3b02a4eab4dafa408143a3,2024-11-21T07:17:28.227000
|
||||
CVE-2022-39058,0,0,9db9a09b8d6864f11e2703e5f8153b0f74ed6f5da3eac72612536ab226eb77db,2024-11-21T07:17:28.353000
|
||||
CVE-2022-39059,0,0,46907fa694026e5ae3238e287e1f1cb77bcede922cf4b1607009bf32b6bca247,2024-11-21T07:17:28.477000
|
||||
CVE-2022-3906,0,0,196d3cf7b15deacf5ae155f2a384e0975d8b41bb9e7a0ef88b0c9b8b29fd2227,2024-11-21T07:20:30.380000
|
||||
CVE-2022-3906,0,1,1b73c1042db4679a6aef3796e71ab2997d0da83fbc2767afbcd7a12b445b212a,2025-04-22T21:15:43.273000
|
||||
CVE-2022-39060,0,0,1ad79cad9f99f91ee4eb5bba8b6c967f2946a9a570f292bf3253900ced873ff4,2024-11-21T07:17:28.613000
|
||||
CVE-2022-39061,0,0,5b319b63c666d83c1db5d7ffc12fd0773b06c284d7b9f03b861f97ec1ad311ab,2024-11-21T07:17:28.737000
|
||||
CVE-2022-39062,0,0,cfc8f6c98651d0ce5e39bd6330195ad0c7360a2468add6f2a9d8f55827c99a7d,2024-11-21T07:17:28.853000
|
||||
@ -206095,7 +206095,7 @@ CVE-2022-39296,0,0,3783a65ffd9d2cac9cab72e5ab2f1d07c29b57d787b93fb97b70de62f5360
|
||||
CVE-2022-39297,0,0,badb71c85e8db453d479cba56d89d43c5b8a7996d653ee5c6b795a6a813cc208,2024-11-21T07:17:58.893000
|
||||
CVE-2022-39298,0,0,31eb8844001f5ea045bca8ee1509e116cb0c06cd33c06fa7a8c0b153fee64889,2024-11-21T07:17:59.003000
|
||||
CVE-2022-39299,0,0,5671a68c5a48f8964a0c69426108af87ce58112fb1903e962dbc2f559ecde47a,2024-11-21T07:17:59.113000
|
||||
CVE-2022-3930,0,1,5790708953d9c9ffffdb2b62833a0b0dd640a7171554358235de42727214f948,2025-04-22T18:15:57.287000
|
||||
CVE-2022-3930,0,0,5790708953d9c9ffffdb2b62833a0b0dd640a7171554358235de42727214f948,2025-04-22T18:15:57.287000
|
||||
CVE-2022-39300,0,0,5b618ab9a0f9c06559a1a842feb49ca3c3e6cf5585243aab10c0d3bbdeb0f177,2024-11-21T07:17:59.237000
|
||||
CVE-2022-39301,0,0,df8525d16219b1e5e5012163ce8afe0b575839c19e6bca4a2a1d64489e246a5a,2024-11-21T07:17:59.357000
|
||||
CVE-2022-39302,0,0,e0f19a0f417de4bc0d603aa28873ed7d02b94efcad94581ed30a95758b1d6c29,2024-11-21T07:17:59.477000
|
||||
@ -206232,7 +206232,7 @@ CVE-2022-39429,0,0,e8920945479dc9dc3abc7c75449e57b59112dffa60102a122d992e4e52bbe
|
||||
CVE-2022-3943,0,0,c6a031ab5daa36a8a57885730b19c5fb6363ea001759beadfd390da099c2fd96,2024-11-21T07:20:34.693000
|
||||
CVE-2022-3944,0,0,2b9853ccd47902190848f88a95812c694fbbf21951edd58ca3fedf266f08ab33,2024-11-21T07:20:34.833000
|
||||
CVE-2022-3945,0,0,26e69a315e7117e46986b54e044c5ee05f5d853b256d40ee5be004975f80dc04,2024-11-21T07:20:34.967000
|
||||
CVE-2022-3946,0,0,64800a8af899fc02465b4ec453e17e3cc94a68ca244a8e874bf3851be00bc14a,2025-02-20T18:34:50.990000
|
||||
CVE-2022-3946,0,1,57b5f78689e9229b85c9f99651366e932e2a55c2599f85863f8caa53dfcfcd05,2025-04-22T20:15:25.150000
|
||||
CVE-2022-3947,0,0,681cb64e004d29032d143d18284e73a8d5442ae3ab58a1d674c0562fe20fb641,2024-11-21T07:20:35.210000
|
||||
CVE-2022-3948,0,0,5290841fb098f9b190aa34f411715a0ccd3843a05ce1a26bdeffc8d5b115cf2f,2024-11-21T07:20:35.340000
|
||||
CVE-2022-3949,0,0,7c6f8512a8abfa4b01f78316eae9ac430961091829c0cb65b6a7ea7ba8f4f1a2,2024-11-21T07:20:35.470000
|
||||
@ -206517,7 +206517,7 @@ CVE-2022-40093,0,0,8aefefda17f68ce22e217a33111857ace2f128cae26c73d5952440280e317
|
||||
CVE-2022-40097,0,0,4047b68cbd179972be642c26956c45686948ab4ce68950d9e80ec36fb8611dd4,2024-11-21T07:20:50.757000
|
||||
CVE-2022-40098,0,0,40eb259fb12e518fda46d199f9f17b69f0e439f32be8490699a6c6ecb1eddf09,2024-11-21T07:20:50.910000
|
||||
CVE-2022-40099,0,0,3e0f29ea79e431e29b9068450fa6437c2a765f8a734927de307c5789ed503afa,2024-11-21T07:20:51.070000
|
||||
CVE-2022-4010,0,1,f723cd1c1087ba2dca6e73de7a88f6fa3286511986550f2f93ed4f50ea386c5f,2025-04-22T18:15:57.803000
|
||||
CVE-2022-4010,0,0,f723cd1c1087ba2dca6e73de7a88f6fa3286511986550f2f93ed4f50ea386c5f,2025-04-22T18:15:57.803000
|
||||
CVE-2022-40100,0,0,d90b9ecb3cef5e210aaa0921101c33ed5c207cb0e00b80ccfd3764129b4a5605,2024-11-21T07:20:51.227000
|
||||
CVE-2022-40101,0,0,61da0b3c971be27f6fac1abd692f9bf77ef9ff9878ac73127b65dfa04f994542,2024-11-21T07:20:51.380000
|
||||
CVE-2022-40102,0,0,458c32c9f2d1637319048e360b4eaa156df89428682eee82042b97c0f4a25306,2024-11-21T07:20:51.527000
|
||||
@ -207189,7 +207189,7 @@ CVE-2022-40932,0,0,284f6302d363b607c54075b59046717f23c9c75940587bc41bdc33ed64c92
|
||||
CVE-2022-40933,0,0,7cc3a0b458775e96dcaceb91a5267d6ff0d91bdf1679c55fcd08a756825275f8,2024-11-21T07:22:16.460000
|
||||
CVE-2022-40934,0,0,9c7e88afd5c651bb4c8c18e4fb7dbf9f342c3b57f93c18e72e8465be7be137df,2024-11-21T07:22:16.610000
|
||||
CVE-2022-40935,0,0,c2d4784b5e2e9ad1ac6067575e9ecd6f901fb635d19843a61c1a26dfbd263631,2024-11-21T07:22:16.750000
|
||||
CVE-2022-40939,0,0,dba2f259d9a84251c72c01ff475b02b366f73cb4715aae9f4c47641771ba54e0,2024-11-21T07:22:16.900000
|
||||
CVE-2022-40939,0,1,6e1ccaf8024eda05ec95b333e94368c9e8349cce401e979f75e9651a261c0675,2025-04-22T21:15:43.420000
|
||||
CVE-2022-40942,0,0,7b291ca016d3664acfaa687583c918329696f86856aba25a1c0c44b07bb6143a,2024-11-21T07:22:17.040000
|
||||
CVE-2022-40943,0,0,97f304c0b30a77cbebe24818cabdb898cd4053d8b64255315a8291fb44898fb5,2024-11-21T07:22:17.197000
|
||||
CVE-2022-40944,0,0,58a4ad43d0d10f01629a367e8a03c70dbdb401591c7e0a5c53db0edc4871deed,2024-11-21T07:22:17.360000
|
||||
@ -207453,7 +207453,7 @@ CVE-2022-41215,0,0,bdf81938c60a96433ed05a55127191aec8fd4a5b41684808ca769d8d25e4d
|
||||
CVE-2022-41216,0,0,b12a6e54560042154b5b556b0fddcb38378ecfab3090b85871b557126c985511,2025-03-20T17:01:12.887000
|
||||
CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb69e2,2024-11-21T07:22:51.097000
|
||||
CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000
|
||||
CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000
|
||||
CVE-2022-4122,0,1,287963c552d9163506f1ae9a4a45c2f2a23995abef9ed39d2ec37b7d5322eb30,2025-04-22T21:15:44.473000
|
||||
CVE-2022-41220,0,0,831f882332be54757e3abc036976b84e93fe4f9a12cf52e0aaf2b820f918bd4a,2025-04-09T19:15:44.890000
|
||||
CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000
|
||||
CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000
|
||||
@ -207464,7 +207464,7 @@ CVE-2022-41226,0,0,65dbe44267b246aec11207d2d6019f4ad805131f8662e439190287595d17f
|
||||
CVE-2022-41227,0,0,b19c8917478b8042b86ab383cdf613fe51a509c66bf621f84333632178c3af9d,2024-11-21T07:22:52.400000
|
||||
CVE-2022-41228,0,0,8dabf0a2289c837fcb3259e3ce82d2aa2ed3e04211ee6308df03b2d1aa33df67,2024-11-21T07:22:52.523000
|
||||
CVE-2022-41229,0,0,9bf5fc496820ec90cd78318988971c3a73fb67f3b3063f00be3ffe8bc06f31e3,2024-11-21T07:22:52.640000
|
||||
CVE-2022-4123,0,0,4276cad1ce5afc9d833e16e090619d320971e034062392e2f50e5ec93c24ae95,2024-11-21T07:34:37.330000
|
||||
CVE-2022-4123,0,1,94867b91eeee75c6d7c70d0fa7c518b60e0b021891b6cc91e0ed1f8a1c81f97e,2025-04-22T21:15:44.657000
|
||||
CVE-2022-41230,0,0,bcf772a7276d1b470e3ec9dc8cdbfc0d25894a6e193f019c074ae56eefe2e82f,2024-11-21T07:22:52.760000
|
||||
CVE-2022-41231,0,0,906f79ea2ed78312978562cf8e83e82f4a527a46918b6dab13a5c61a5621060e,2024-11-21T07:22:52.873000
|
||||
CVE-2022-41232,0,0,3d7486aee54cae40030773ec0c5909cc233c8a727332608f1864d6e980e6e7f3,2024-11-21T07:22:52.987000
|
||||
@ -207721,7 +207721,7 @@ CVE-2022-41554,0,0,403d2293a449215f5419917e3fa2dfc961038231264905d929d2d20eb0312
|
||||
CVE-2022-41555,0,0,dcc45366714f50e34da445217c329775dde88029115394752a6e1f4814ad6918,2024-11-21T07:23:23.207000
|
||||
CVE-2022-41556,0,0,2edfb1aee1b095a86f2880c5ba197b25e416f6a37ee017278b1d31667c0c2e31,2024-11-21T07:23:23.323000
|
||||
CVE-2022-41558,0,0,8597b36762e79ee3ea2f6ed202351a58b2eb17d1a11c6854bfa4d7bdbc0aca2f,2024-11-21T07:23:23.477000
|
||||
CVE-2022-41559,0,0,2d236f7b8bf1d14330e2f079117bfcaf0c0b94d8bf4a67d32b9a29f687595ccb,2024-11-21T07:23:23.633000
|
||||
CVE-2022-41559,0,1,4b84a53ec9ea0f451d3fb3778974bfbb72128a099742d286282cb3f6a8307d8f,2025-04-22T21:15:43.580000
|
||||
CVE-2022-4156,0,0,cb04e2f52def22ef2d291f3167d278087062f214f3a15368a3ed8e3cbdcdf1f2,2025-04-14T15:15:22.737000
|
||||
CVE-2022-41560,0,0,436d1214c18862b81bf15dd8b6a702f25157660b531d90d8e8e0d731993456c5,2024-11-21T07:23:23.747000
|
||||
CVE-2022-41561,0,0,def5c97e16c8c154be52e949f6428816c53f670ddacab2c9072968cd00951bfe,2024-11-21T07:23:23.867000
|
||||
@ -209734,7 +209734,7 @@ CVE-2022-44028,0,0,e31c6336d3957b47dea92066826afcf0374933f4b80ce13857c34aeb81596
|
||||
CVE-2022-44029,0,0,21c91681f2b9cb0aea5cc42f1c0c9e17a8d497ac172510d8b196dba1c0854e71,2025-03-28T19:15:16.463000
|
||||
CVE-2022-4403,0,0,3d57e0a9771733e4a777012d6108d6f0b1ba452d36793176f206a52cc18d5fe7,2024-11-21T07:35:12.517000
|
||||
CVE-2022-44030,0,0,9ca8da6f5575924021029477be062af87f3baade1c5e6797a4b4658545e00abd,2024-11-21T07:27:34.180000
|
||||
CVE-2022-44031,0,0,744bb3ea82216231c40180023c45f206fb44119aa7c7059e2ad41d032909b445,2024-11-21T07:27:34.327000
|
||||
CVE-2022-44031,0,1,d867b9c27db71b0e7a022d8805731092ed21a845ca46b9bc3de0bf604d7352cd,2025-04-22T21:15:43.730000
|
||||
CVE-2022-44032,0,0,67a4707c3189e9dbc6ecad623f592aedd751302dc5c0f602c5a8e668c92c861b,2024-11-21T07:27:34.457000
|
||||
CVE-2022-44033,0,0,8bb570327f0eeef60e2ca10da50437c061fce3a3452b20ef166c4d546706cc46,2024-11-21T07:27:34.690000
|
||||
CVE-2022-44034,0,0,25d60ecd3c8156e5f829ae989bed5ee1dd527fa47058ef06ab1c7270a99aeb14,2024-11-21T07:27:34.847000
|
||||
@ -209821,7 +209821,7 @@ CVE-2022-44204,0,0,968a0ed7c6fb879979bec65a76cbcc897aa40c57f5c5c25489c059f9e2df2
|
||||
CVE-2022-4421,0,0,805b2d0499816258e8b83aa7debba6c78459f94d28cb0b24797dd20e11e51b9a,2024-11-21T07:35:14.110000
|
||||
CVE-2022-44211,0,0,4694e1657822152e206589f198c10697ad8292117d4428e093cb3922589a428c,2024-11-21T07:27:45.213000
|
||||
CVE-2022-44212,0,0,9418c2f7e53e0a6e6d0f8fafec86e5a1776bc025c7f73a49e3c62b894df6474d,2024-11-21T07:27:45.390000
|
||||
CVE-2022-44213,0,0,527d7872f95c2ceba9131c1dbd6b395deb9e8b32716e16ceff854f0f9020b15f,2024-11-21T07:27:45.533000
|
||||
CVE-2022-44213,0,1,f1043686caf0846d503db78a29095d272155e2f0b34ef33429ea4001bb54292b,2025-04-22T21:15:43.883000
|
||||
CVE-2022-44215,0,0,97b29df04b49081a933ac7e168d7e0f2dd3f42ba0ed62273b63800cc8082d135,2024-11-21T07:27:45.680000
|
||||
CVE-2022-44216,0,0,f109d57d47e66d4d38cb3ef4a876cafb1608bf70c055308a4341d236211069a4,2025-03-18T16:15:13.567000
|
||||
CVE-2022-4422,0,0,2f8897b91daada41f8b072d24143cbc42853693e583b0a624e8340e20d416244,2024-11-21T07:35:14.237000
|
||||
@ -210318,7 +210318,7 @@ CVE-2022-45039,0,0,8d247e2dbe5a174bf700c14e14bd0ac17a8055c933299de463994d0cfae98
|
||||
CVE-2022-4504,0,0,b27eff37d4e7abb720eed93fbe05e69d563cdca4548519b6b195855e489cbdf5,2024-11-21T07:35:23.717000
|
||||
CVE-2022-45040,0,0,7f873037a4786798898c146da01c230a02bee3ed298acbb4a79b18a72b6c5e6a,2024-11-21T07:28:39.550000
|
||||
CVE-2022-45041,0,0,ef1949d1460233572fdfb2716287baf4a2f8389968f29ef424eb0bc8fc8e4d4c,2025-04-17T15:15:50.250000
|
||||
CVE-2022-45043,0,0,733f48237f269d4d7809d5dfd9b028bd3cf8c1aebe895df45a72bf7428aaa2fe,2024-11-21T07:28:39.833000
|
||||
CVE-2022-45043,0,1,ac882d269905f73b62bf35a98382b22838daf661f0a5193bea18c8462ca7fa6e,2025-04-22T20:15:25.490000
|
||||
CVE-2022-45044,0,0,d8f9472e9417b70caae34cc756800e14625bdcd45f0866e663decb76d4c1825a,2024-11-21T07:28:39.987000
|
||||
CVE-2022-45045,0,0,fa1138deea95f80bd7ab086cb329bf613ccf3268dca0e85de5e3280673b9bc50,2024-11-21T07:28:40.217000
|
||||
CVE-2022-45046,0,0,1de35eb14a19f7f6f23d1643119c63f0a7099d4349f88737629fa34915974228,2023-11-07T03:54:29.393000
|
||||
@ -210828,11 +210828,11 @@ CVE-2022-4574,0,0,c4bd7a68d6d40a00a34e01f201fe51a749afe08d86dfe9f6145f0a62aab3c9
|
||||
CVE-2022-45748,0,0,319146955c18f609cbe1e1cbfc91f09b4abfd5a79d40c4cfabb931acfdfa16de,2025-04-03T16:15:27.733000
|
||||
CVE-2022-4575,0,0,2494868062ea1c95e6a24de6c72a00220a36af07e9b57b433a420138f38e56c2,2024-11-21T07:35:31.517000
|
||||
CVE-2022-45755,0,0,60eab1a66f1c82cb2f3f9270fde59c88843dda3b98ba09f0fed89262eea611a4,2025-03-25T15:15:16.070000
|
||||
CVE-2022-45756,0,0,392d8004fe631427910cd1e1118e9b7cdd671c22cebe314b8f1286bf7c798d10,2024-11-21T07:29:40.157000
|
||||
CVE-2022-45756,0,1,749217f4ef925c79a28c26bceaf9833935978184529cf1f430bd57d644b3897d,2025-04-22T20:15:25.697000
|
||||
CVE-2022-45758,0,0,5f523c8ebf40d082c69a0ec93e9cd8200d1c5b26ba93af52df709150f4a4f695,2024-11-21T07:29:40.303000
|
||||
CVE-2022-45759,0,0,d984f85882c76ba6d202c2c33f552317079373f33e40cc4bdfee8fcd5d4f1c73,2024-11-21T07:29:40.443000
|
||||
CVE-2022-45759,0,1,03a0a7314eab77436332b9183a44ce108803426e37542f1def7f63cb999953e7,2025-04-22T20:15:25.870000
|
||||
CVE-2022-4576,0,0,4eb8c139fa08e8ccffe1c8d93a6910eaf6dd97f1fd23fc2be693b2954671e467,2025-04-02T16:15:25.780000
|
||||
CVE-2022-45760,0,0,0d1a8eb90e8eb8d3f74e550a85785935ddd25217edeabe6882dc4db9e32c1d01,2024-11-21T07:29:40.587000
|
||||
CVE-2022-45760,0,1,86a556ad048d8bc06b4c9fba5d878e134040e2c98c4aa5f5e0e13af2453aeb36,2025-04-22T20:15:26.040000
|
||||
CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc85cf,2025-03-24T18:15:16.197000
|
||||
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
|
||||
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
|
||||
@ -210961,7 +210961,7 @@ CVE-2022-45907,0,0,6e9d516b5e43b2e1627e6ec56aa6c854a29ec1ba3d18358c344f60495559e
|
||||
CVE-2022-45908,0,0,f66bf3c57fd89a02e6324f98e8c7564501d3fba0621e27512aa88dc8ba707e3b,2024-11-21T07:29:55.573000
|
||||
CVE-2022-45909,0,0,27a06a8d21568788ff9b70fcfd6461ac226caa7ec640de29e3a72b630407cc1a,2024-11-21T07:29:55.730000
|
||||
CVE-2022-4591,0,0,52954a1e139a227fa4682fffa4fcfd63772796362cb288e151b58b063d73e9bc,2024-11-21T07:35:33.323000
|
||||
CVE-2022-45910,0,0,ef7fdafb8922111ef31977805bb66630fe95a702f016db27dff5e82aa0160fdb,2024-11-21T07:29:55.880000
|
||||
CVE-2022-45910,0,1,8c605ca8af65242b43ce6fe8994afd62272a693e808fa7afbd4b5c27613e55b6,2025-04-22T21:15:44.050000
|
||||
CVE-2022-45911,0,0,999d9d2c1810c5b42e767b18ca4661967ccd90513d92cb7feba03ef631306655,2025-04-09T21:15:42.780000
|
||||
CVE-2022-45912,0,0,9123be23c45d6384dea28982a883732d92523e4e3b5d17e3788776aa6e9dde54,2024-11-21T07:29:56.210000
|
||||
CVE-2022-45913,0,0,c0af5336605ed9819626e161565910ce0c716f3deae70cec43dedb44f878ef81,2025-04-09T21:15:43.030000
|
||||
@ -210996,27 +210996,27 @@ CVE-2022-45939,0,0,9f2d0eb61d012e0718ca37900aa590dca21df4c3a352cefbd70dd79686821
|
||||
CVE-2022-4594,0,0,1ded1ffb5f24f4fd9602ac76d2af6019f3b9406e1610dbf1b4d9339d35ac8850,2024-11-21T07:35:33.683000
|
||||
CVE-2022-45942,0,0,a718cdda7b73433bdf500bb401174f39caafecc8055ba94280a42b0294802f0e,2025-04-17T14:15:22.090000
|
||||
CVE-2022-4595,0,0,645b0789fddde7dbf888bbd16bf87e81c21ffd9bc28d1d13b9c0dcc18ec745ef,2024-11-21T07:35:33.850000
|
||||
CVE-2022-45956,0,0,8e9f5c00ceef59acec81137e7bc64348869dd735f814cce0c7487a3483ea6bfa,2024-11-21T07:30:00.703000
|
||||
CVE-2022-45957,0,0,83d82ac3c27398aa12e2a84c70565621193c5d8e50f5d7191ff980e9e9a49a9e,2024-11-21T07:30:00.860000
|
||||
CVE-2022-45956,0,1,18a12b5e2e3e074010a799267bfeb941dfa1bcf2beb6ca23219bc822c9652c58,2025-04-22T20:15:26.207000
|
||||
CVE-2022-45957,0,1,dc046915491955f0d424b54d39bb6b6e51620c0c9896ef6760338a7d832a9d47,2025-04-22T20:15:26.387000
|
||||
CVE-2022-4596,0,0,2facbbb5033343acd7d130ddd502d8e3502507f42b123e910904af2d70ae7792,2024-11-21T07:35:34
|
||||
CVE-2022-45962,0,0,9e317c143a8dd1af1df7a4add121500559514484f16aa4c4255a83fa62ec060c,2025-03-21T19:15:40.127000
|
||||
CVE-2022-45963,0,0,27a3744e362a9000ed52828cd2470c6cc0a249be92e5f5a6e4d064c42e4b3582,2025-04-11T19:15:40.527000
|
||||
CVE-2022-45966,0,0,def978772b456fcfdc0e7f78ec6a73deee23f4aba01f14cd8ddc1e932811d7d1,2025-04-15T15:16:04.967000
|
||||
CVE-2022-45968,0,0,2f19e4c0b4c444860c43a696ebbdf6899ce0abc3a3d3db408c80d23ba348af0a,2024-11-21T07:30:01.600000
|
||||
CVE-2022-45968,0,1,85918c69a8ed2a11b1c20a267d5a5a69e495048c69637ffcf23c60030c5232ec,2025-04-22T21:15:44.230000
|
||||
CVE-2022-45969,0,0,87015d0eccc1b4efa8b28c242d353a21daeab495389e98ed086df4bd898c5aad,2025-04-21T15:15:55.320000
|
||||
CVE-2022-4597,0,0,41fae254f39db6f4db8365f7556f566309a989865bc51f32e8d825fd51d0d9e8,2024-11-21T07:35:34.117000
|
||||
CVE-2022-45970,0,1,076387fa5138e448280dbe664dfd12a6525903fdb82ec3c3290dc79c800060b1,2025-04-22T19:15:50.057000
|
||||
CVE-2022-45977,0,1,06ce57e0bbd4c8f43db1dee78e3a608107889177a6e0c09bdadd5d25d0f47b2c,2025-04-22T19:15:50.247000
|
||||
CVE-2022-45979,0,1,e58b39b5bb2912b4c7f56a3a547ae45ee6cac64c89f827d8fa218e47437038fc,2025-04-22T19:15:50.423000
|
||||
CVE-2022-45970,0,0,076387fa5138e448280dbe664dfd12a6525903fdb82ec3c3290dc79c800060b1,2025-04-22T19:15:50.057000
|
||||
CVE-2022-45977,0,0,06ce57e0bbd4c8f43db1dee78e3a608107889177a6e0c09bdadd5d25d0f47b2c,2025-04-22T19:15:50.247000
|
||||
CVE-2022-45979,0,0,e58b39b5bb2912b4c7f56a3a547ae45ee6cac64c89f827d8fa218e47437038fc,2025-04-22T19:15:50.423000
|
||||
CVE-2022-4598,0,0,30d850eb20a135185c5b68aafbac5f46e3329159b950dd7a2f19dce2def78ed3,2024-11-21T07:35:34.227000
|
||||
CVE-2022-45980,0,1,a819eefced2f9ab58faaa16d31044f1cf4711f25c705b4a7471a691db40e74b9,2025-04-22T19:15:50.603000
|
||||
CVE-2022-45980,0,0,a819eefced2f9ab58faaa16d31044f1cf4711f25c705b4a7471a691db40e74b9,2025-04-22T19:15:50.603000
|
||||
CVE-2022-45982,0,0,8f067f2fd5a978242e58303d6111658c393270e3e771d645b2b90239b9ed0c72,2025-03-25T14:15:18.753000
|
||||
CVE-2022-45988,0,0,2191f8bbbf8d239ddf30397145fdd13d40e62fec70edb8e22034a0f41c071432,2025-03-07T17:15:14.773000
|
||||
CVE-2022-4599,0,0,b1c692040b7873a7c4127dfde8a6f89c63a5d457054525c409da9357855b74b5,2024-11-21T07:35:34.343000
|
||||
CVE-2022-45990,0,0,49f36bdcf1672f4737437f303412dd6da7b773fc548eb726d92ff24d951e8986,2024-11-21T07:30:02.960000
|
||||
CVE-2022-45995,0,0,aa2b95a6f2cfa50bb94684ef1213301727cd20dfc035fab1b4c2c06ca0212cee,2025-04-10T15:15:54.910000
|
||||
CVE-2022-45996,0,1,5000303a0723f08f53e5fd3d9b702eea98d267deb67ece1d4483459cbab2f33f,2025-04-22T19:15:50.783000
|
||||
CVE-2022-45997,0,1,8e0b10d254a61c18c673fcf3137a65974a9d49409063e78533199ed5d46b3718,2025-04-22T19:15:50.967000
|
||||
CVE-2022-45996,0,0,5000303a0723f08f53e5fd3d9b702eea98d267deb67ece1d4483459cbab2f33f,2025-04-22T19:15:50.783000
|
||||
CVE-2022-45997,0,0,8e0b10d254a61c18c673fcf3137a65974a9d49409063e78533199ed5d46b3718,2025-04-22T19:15:50.967000
|
||||
CVE-2022-4600,0,0,f87320d86892641cf066544e58ceea65fbd753484a0d9292859d9010d922933e,2024-11-21T07:35:34.457000
|
||||
CVE-2022-4601,0,0,f089e381b7899be6421b7ec38b819948e316e0b782e8afd7e01319c7c5e0638e,2024-11-21T07:35:34.560000
|
||||
CVE-2022-4602,0,0,87207cf91ad56ef288904fdf3120f4ec800df92d4d7ce34661a8eb13dc6caa6b,2024-11-21T07:35:34.677000
|
||||
@ -211701,10 +211701,10 @@ CVE-2022-4690,0,0,82c75246ac0062d626a0635a6888f2687233ca18799727599510288cd4ab25
|
||||
CVE-2022-46900,0,0,2fdd67766dbd5b1d998ad49ac40e857bc103515fd25fa60cc7d1c1b7107b31d4,2024-11-21T07:31:16.370000
|
||||
CVE-2022-46901,0,0,ffdca66da5edd699a3302fdb8932ddc0dd1d7e344501cf937650f6f2b8ae8db1,2024-11-21T07:31:16.630000
|
||||
CVE-2022-46902,0,0,e4df85a640b5ecce9ed744cbc779d0b0573086dfdfd7b378f4f0ff3737e3436a,2024-11-21T07:31:16.797000
|
||||
CVE-2022-46903,0,1,68641b9027ef87766f77d491b27684bb649d5a3a504914e1ecbb7c31feb06603,2025-04-22T19:15:51.200000
|
||||
CVE-2022-46904,0,1,2417ea2331304d7c2184ef21eea0f093807b0ca0d0c5b3dcc1fee7d194753e4e,2025-04-22T19:15:51.387000
|
||||
CVE-2022-46905,0,1,857f970056d968eb9e3ef9c88a0b9f1f0ca5c04dba54b6eb0725597f2746cd89,2025-04-22T18:15:57.613000
|
||||
CVE-2022-46906,0,0,598ae2fd567c503904d9d212d3464fee905abd64ce83fff0816467f15ea7d203,2024-11-21T07:31:17.517000
|
||||
CVE-2022-46903,0,0,68641b9027ef87766f77d491b27684bb649d5a3a504914e1ecbb7c31feb06603,2025-04-22T19:15:51.200000
|
||||
CVE-2022-46904,0,0,2417ea2331304d7c2184ef21eea0f093807b0ca0d0c5b3dcc1fee7d194753e4e,2025-04-22T19:15:51.387000
|
||||
CVE-2022-46905,0,0,857f970056d968eb9e3ef9c88a0b9f1f0ca5c04dba54b6eb0725597f2746cd89,2025-04-22T18:15:57.613000
|
||||
CVE-2022-46906,0,1,603c9476beec7eae4586d7e95ff08fcd8df51e8f796dc11233bc23a81a040a3b,2025-04-22T20:15:26.570000
|
||||
CVE-2022-46907,0,0,7b12c0a53b252ece09b4da524de85c2e818ef730ff061dc17f97460932a59406,2025-02-13T17:15:48.760000
|
||||
CVE-2022-46908,0,0,d1fdb40195f1e5952c742c620875b9899576b34c92bfa0f05b7190d0c73f00a6,2024-11-21T07:31:17.790000
|
||||
CVE-2022-4691,0,0,bd053ff0971d72f324a73a50ddb8c1e96c40adcb45f16c112b352f3ec4559d64,2024-11-21T07:35:44.620000
|
||||
@ -233912,7 +233912,7 @@ CVE-2023-42366,0,0,65dcc4173f13150e581108c0c9566b44a19e34af7c1293ecabe288ee31a0b
|
||||
CVE-2023-4237,0,0,bea249b3b2b7e7e3fa43789e7ab5be6bfb0b7100a578ae555ed0b2e5716129dd,2024-11-21T08:34:41.347000
|
||||
CVE-2023-42371,0,0,ea9b63c593fa8f680091ec347870d4be9db9e16faae223fa2d14109e15ac537d,2024-11-21T08:22:29.050000
|
||||
CVE-2023-42374,0,0,ed8d26ae1819e284d1ccfc0e8747cae39d404f0248fefb7b743bb53224256914,2024-11-21T08:22:29.200000
|
||||
CVE-2023-4238,0,0,9bb46f0b2b53a60e7d95f25fdabc8cb8d4184c33c02aeb3c76873a3f9c6e9057,2024-11-21T08:34:41.490000
|
||||
CVE-2023-4238,0,1,048026cbea513b46e3ae97969d5a7d38213a89914df03be115a63327b1c87eec,2025-04-22T20:15:26.770000
|
||||
CVE-2023-42387,0,0,a7eaacf0a8de6fc3b503e22dc7f356d9311b645806829b96bceee8a17a983599,2024-11-21T08:22:29.463000
|
||||
CVE-2023-4239,0,0,2b6dfe83a46d7ad7f2e4a2a1f80c3490df80dbfafce7df69a7e9e11e2c4be6ac,2024-11-21T08:34:41.600000
|
||||
CVE-2023-42398,0,0,c0f1ef329f47937f6ac99259e1d989bb273f98f723724d4aad4ef1d7d794906a,2024-11-21T08:22:29.610000
|
||||
@ -234006,7 +234006,7 @@ CVE-2023-42506,0,0,d508286d8d36552fe9e854515ba2d8ca9c53a4ad88c155e383c764e9361a1
|
||||
CVE-2023-42507,0,0,95f7a442861b72d1544ea11fd2f010b80be26f85fc4ee471e711ebf0c522461a,2024-11-21T08:22:41.587000
|
||||
CVE-2023-42508,0,0,bbab358f9374ff4c93e4d5a1fa139f2b77986fa251894acc45ef49de283b22c4,2024-11-21T08:22:41.710000
|
||||
CVE-2023-42509,0,0,5ced9b7234fca261dc98d41188e3ce40d29a94b9caf3ed86217200e154242c7e,2025-03-11T16:57:11.073000
|
||||
CVE-2023-4251,0,0,034a7b92d2b37c92649fc5aca046c5ee579347dfc80fc8e43d0fbe60fc0e4888,2024-11-21T08:34:43.783000
|
||||
CVE-2023-4251,0,1,b74f9accc4e8658da8cd352e5bc4727e759580c36965b9ec878158ce86452bf0,2025-04-22T20:15:26.950000
|
||||
CVE-2023-4252,0,0,241d0ed23bbed15be4caa83e96cb94794db8837cd6045145c5f3eeffcba80b19,2024-11-21T08:34:43.910000
|
||||
CVE-2023-42520,0,0,0f7e649e5abe2bcf81466af32f0e75ed8e91444f7c9b03366f081f463c015076,2024-11-21T08:22:42
|
||||
CVE-2023-42521,0,0,5e501d65b1c0a77c9ed7fe2c83378aee326c2a8ca5985a4523847793860179b3,2024-11-21T08:22:42.167000
|
||||
@ -234637,7 +234637,7 @@ CVE-2023-43374,0,0,0c842289fef368e43b13c7d2f4ec3eb92957e0b93c01c50ae59316f3fa1ca
|
||||
CVE-2023-43375,0,0,551f70b5d9732668443d10a30be93e7635620b0779988646f8a81acf5a214454,2024-11-21T08:24:04.703000
|
||||
CVE-2023-43376,0,0,5ebeae756eae1d85a8351eb563837ecbcef85c4231aff7741d7c977b2cb8a935,2024-11-21T08:24:04.927000
|
||||
CVE-2023-43377,0,0,19dc73160cabb327a711e5c011f7c1e526874635b01c3a5d503305ecbcf6a9da,2024-11-21T08:24:05.147000
|
||||
CVE-2023-43378,1,1,877265d11eb5e5209bd7692dff42f43a19ef974df4516aa870bfb7af47794804,2025-04-22T18:15:57.970000
|
||||
CVE-2023-43378,0,0,877265d11eb5e5209bd7692dff42f43a19ef974df4516aa870bfb7af47794804,2025-04-22T18:15:57.970000
|
||||
CVE-2023-4338,0,0,cee5046b7ac52062433be4c9139b1a9d60a88e8fae93b2c4e4a38b2b74f84a00,2024-11-21T08:34:53.023000
|
||||
CVE-2023-43381,0,0,caff75d2c8b0724ff43a55930a127601bc01da93a88366c43658e0bffaf0ab43,2024-11-21T08:24:05.373000
|
||||
CVE-2023-43382,0,0,357110693599f305ce7e9e3e55315947533bffde288b19d6124b2760ca931a37,2024-11-21T08:24:05.523000
|
||||
@ -235039,7 +235039,7 @@ CVE-2023-43952,0,0,1fac01b4d632fcf245389417a415b93c15f142d99d4eba2fdefc1a41589c5
|
||||
CVE-2023-43953,0,0,41ac0d93d81247e0f3724c56f0df0a686faa46acebfbb120a153c13432ff7e53,2024-11-21T08:25:00.607000
|
||||
CVE-2023-43955,0,0,5eaf65016d039c9f1b605e161870cb16caab80cd8a644ede8989eb6496683fef,2024-11-21T08:25:00.790000
|
||||
CVE-2023-43956,0,0,287c16836b7f2388aafb63c0e9b6832690d16233ba3cdc6bea2100ffdf34047a,2024-01-19T20:15:11.727000
|
||||
CVE-2023-43958,1,1,c3e73afdd59985123fdece8fd1caecd2f2f3a0de2716c56dd50ef50b396ae565,2025-04-22T18:15:58.107000
|
||||
CVE-2023-43958,0,0,c3e73afdd59985123fdece8fd1caecd2f2f3a0de2716c56dd50ef50b396ae565,2025-04-22T18:15:58.107000
|
||||
CVE-2023-43959,0,0,83c13aec946e69662beede37eb4228952b206c148c530260e4f264992d519f45,2024-11-21T08:25:00.993000
|
||||
CVE-2023-43960,0,0,cb9f587c2076d2cc3e6b162d728882e2ca0cc4f582aa12cc86c2ff36accbe2c9,2024-11-21T08:25:01.170000
|
||||
CVE-2023-43961,0,0,b0da0c9c90e56ee0fb0ab58c3be4a325af3611079aebc3edf7e7e4214416d9b2,2024-11-21T08:25:01.343000
|
||||
@ -235538,9 +235538,9 @@ CVE-2023-4472,0,0,a5cb2ce1626879a7402ab5dcead5d9e0ab009eaa2d5e702642fd0170bc2660
|
||||
CVE-2023-4473,0,0,af01d832dcbbc1b65797d97326e3d5722bec5e1a691fefb99b4faa5e1c6fa443,2024-11-21T08:35:14.490000
|
||||
CVE-2023-4474,0,0,d4799a0dcb39156734a25b4a28a5bb799b18044cdd0ae6f04e22995d42ec8eef,2024-11-21T08:35:14.640000
|
||||
CVE-2023-4475,0,0,47d15833d3ca73c79ddd2d5025af5599df0f7e6c16d19dfe77959aa4b1c5b183,2024-11-21T08:35:14.783000
|
||||
CVE-2023-44752,1,1,ceb9dc5a44492844cb0dc4cbfa61b08c63079a170556e6217b7cfa2f6bede943,2025-04-22T18:15:58.240000
|
||||
CVE-2023-44753,1,1,f5361e4e223c426a5159113d245c3ffaa27b94d2d3c1de5403f8f5220a5cd822,2025-04-22T18:15:58.357000
|
||||
CVE-2023-44755,1,1,b986ba6575fbd5515278051e15c4a2db127309642fc5aff1e411907c7127ef12,2025-04-22T18:15:58.483000
|
||||
CVE-2023-44752,0,0,ceb9dc5a44492844cb0dc4cbfa61b08c63079a170556e6217b7cfa2f6bede943,2025-04-22T18:15:58.240000
|
||||
CVE-2023-44753,0,0,f5361e4e223c426a5159113d245c3ffaa27b94d2d3c1de5403f8f5220a5cd822,2025-04-22T18:15:58.357000
|
||||
CVE-2023-44755,0,0,b986ba6575fbd5515278051e15c4a2db127309642fc5aff1e411907c7127ef12,2025-04-22T18:15:58.483000
|
||||
CVE-2023-44758,0,0,e729895caf9bb37b37c8201b6a85dd648d3aa9d89e2cb2d0d6a653b2301b177c,2024-11-21T08:26:00.480000
|
||||
CVE-2023-4476,0,0,f7f0e1f95fb98b8d5b853274734687164f4765a1365b07b70592d44d448f4c49,2024-11-21T08:35:14.940000
|
||||
CVE-2023-44760,0,0,8a6af57f009c485579afa393ac6a3871eb0427a7d2f884cbbc517eacf7222787,2024-11-21T08:26:00.630000
|
||||
@ -240203,11 +240203,11 @@ CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8
|
||||
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
|
||||
CVE-2023-51293,0,0,3c76c94a0e2967fcac9b3c862594c9c4a8f759fd72413ca039da9d23fed70445,2025-04-18T01:44:14.033000
|
||||
CVE-2023-51296,0,0,96dcb376a548bdbe4b16730fc9b0b99218052e66bcf85ff9307c4d18ea383d78,2025-04-18T01:43:36.923000
|
||||
CVE-2023-51297,0,0,8b6431dbb281340d572f561b1cfd29c8929e15e162a411dccca7eaeaf4df3986,2025-02-19T20:15:34.770000
|
||||
CVE-2023-51298,0,0,252f435e89ae54812bd7e9cd15010b84094c9216cc8042599f6272624d909d3b,2025-02-20T15:15:10.473000
|
||||
CVE-2023-51299,0,1,0281cbb21766cea199bf7f8ed14b555b3cdab9109feaa3f2e582c63595f6e0a5,2025-04-22T19:59:50.427000
|
||||
CVE-2023-51297,0,1,6d62aa833b16c9e6c09d49a316b14871cf20df5ffa8351a16f4511cdedadd8a8,2025-04-22T20:03:27.050000
|
||||
CVE-2023-51298,0,1,bdd8551eaee066d8096d085abf998df42dde41a4f2b13122e7e2ba1730da2afc,2025-04-22T20:01:27.340000
|
||||
CVE-2023-51299,0,0,0281cbb21766cea199bf7f8ed14b555b3cdab9109feaa3f2e582c63595f6e0a5,2025-04-22T19:59:50.427000
|
||||
CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000
|
||||
CVE-2023-51300,0,1,98fcc33a09deefcb16158d6f38fb0b70e77754bf2d90d4bf0bca9b38b2370d3b,2025-04-22T19:57:43.537000
|
||||
CVE-2023-51300,0,0,98fcc33a09deefcb16158d6f38fb0b70e77754bf2d90d4bf0bca9b38b2370d3b,2025-04-22T19:57:43.537000
|
||||
CVE-2023-51301,0,0,d20a89e3ea53afe2546e03109982ca13c721bf163dcc6ab02f5cdeefa8515209,2025-02-20T15:15:10.993000
|
||||
CVE-2023-51302,0,0,39b2580abf364cd2e6e909905ca9a93ffd7916f10a4bf30a7915d4aa7a8ed961,2025-02-20T15:15:11.173000
|
||||
CVE-2023-51303,0,0,066c118d3b4af77642ed339cd720e726024ec9e191c369c33a8110876976207e,2025-02-20T15:15:11.333000
|
||||
@ -240860,7 +240860,7 @@ CVE-2023-52106,0,0,e8802e24241dc67b84259b70f6c51ee96a75100e5c4096b9624b3b60d20e8
|
||||
CVE-2023-52107,0,0,addf041f67f0cdb01b1c6affc5d36e8feec509b00c3beee2aae6521029c6b58e,2024-11-21T08:39:11.407000
|
||||
CVE-2023-52108,0,0,72252082cb5edfb1255819f2a660467eea08c598263b1385d16ef6ae541223cb,2024-11-21T08:39:11.593000
|
||||
CVE-2023-52109,0,0,698d89cc70aa621c71f4de7351e5ce2104d950cf337751c01f471f3f321e860a,2024-11-21T08:39:11.710000
|
||||
CVE-2023-5211,0,0,7095dee50fc2840f327d3a95ee0eeca3e85a8680e6eb524e1bb2ab3798ed7d3f,2024-11-21T08:41:18.437000
|
||||
CVE-2023-5211,0,1,a7726a9592a35ca2070424728b1c4fc20f2662a36b6cd962c5562e0affce9ea0,2025-04-22T20:15:27.130000
|
||||
CVE-2023-52110,0,0,2181eabe608b714d12d6ab5c7f40bd3e4db1a2fe811b1a47f6c0024064ed25a6,2024-11-21T08:39:11.833000
|
||||
CVE-2023-52111,0,0,72d16cf8afff6ccaa63b8299a48296990dae531e2ae6a047351a985d84275735,2024-11-21T08:39:11.953000
|
||||
CVE-2023-52112,0,0,227e27d86a9c9316298e239eaf0139dd29a24be0b462b0e617bcb2267b094bb7,2024-11-21T08:39:12.083000
|
||||
@ -241090,7 +241090,7 @@ CVE-2023-52366,0,0,2836d3e1a8b37b12d3effd8cec7c72d72564482a59f99965e89b617f8b649
|
||||
CVE-2023-52367,0,0,bdc7fb3fb365803806ae948bd6ab347c965f8e139d82c1f13880d00209c54f65,2025-03-13T14:48:47.327000
|
||||
CVE-2023-52368,0,0,b2193cb1a6a03cc5e3583fbbf799267cc15aaa1568ea83ef903e7b0cc52cfc1f,2025-03-13T14:48:57.377000
|
||||
CVE-2023-52369,0,0,e7a5a2cd83e12b5df5f68b586c9f29d4335681ad965df0436ddd85072c611657,2025-03-25T19:15:41.850000
|
||||
CVE-2023-5237,0,0,bf8b863edcb3c5dbd4e829c0548224833a285d1d6a3f96c65fa64c47ca318a53,2024-11-21T08:41:21.087000
|
||||
CVE-2023-5237,0,1,281fe90588949083c3aedfdb73486804771a10d00c6e1efb9d3e0fb16e770daa,2025-04-22T20:15:27.300000
|
||||
CVE-2023-52370,0,0,94fc14502a4d082ed0023df02f476a1a9de326e52ea2553a92d94d30b52b29ce,2025-03-13T14:49:10.850000
|
||||
CVE-2023-52371,0,0,7531a56783aeb5263b0586630fda68511b4faa53430d233bc0eb23a33226c58c,2025-03-07T15:43:42.530000
|
||||
CVE-2023-52372,0,0,200d9d0ce452463a2949081bc20e21a2e11f1eb6431715b24267f517e2f492ca,2025-03-13T14:49:30.230000
|
||||
@ -241101,7 +241101,7 @@ CVE-2023-52376,0,0,468bf51b3f2afd752595d6c4bec28b1aa22ac2920b422019f22cf051f9676
|
||||
CVE-2023-52377,0,0,728525c86747fc37a18d3932c541a320f570e79ad862722157aabcbed9734abf,2025-03-13T14:50:02.060000
|
||||
CVE-2023-52378,0,0,ee200e7d745b98e9834fab6e113f2364129b1e9584afc81b6691e5acc5c6fd93,2025-03-29T00:15:16.320000
|
||||
CVE-2023-52379,0,0,89d4a8a9976cfe4bd46aebfd5f75ae2afd4cebcd756be3f9c0131f715f865723,2025-03-18T21:15:23.413000
|
||||
CVE-2023-5238,0,0,807977fc52d43d4b2d6903903fcb9fad96cc921f84e7018a9ea85ba7ed384cf4,2024-11-21T08:41:21.197000
|
||||
CVE-2023-5238,0,1,b7a1a2b488fb32ad1c7f2969bf2788c20b257278b44af102be12edae366cbdf8,2025-04-22T20:15:27.470000
|
||||
CVE-2023-52380,0,0,a11ce5b259ad7292bcfe8fa6bfb80e5644b177c13546c191132d0ecfd620e34e,2025-03-13T14:50:31.150000
|
||||
CVE-2023-52381,0,0,d608923a6562d5715875cb3060a3cb3ade0e3a6b0e626155ec0f37d05c41594f,2025-03-13T14:50:36.263000
|
||||
CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89feb1f,2024-04-17T07:15:07.860000
|
||||
@ -241779,7 +241779,7 @@ CVE-2023-53034,0,0,3f53ee7ea0580d503788178f1db556768ae174e9810ce61775f9b97fe4791
|
||||
CVE-2023-5304,0,0,0c927516ecfa012da696090d08f4ca4cc85e3e04790de8eb26a492ef0f0f359a,2024-11-21T08:41:29.560000
|
||||
CVE-2023-5305,0,0,a8016335a5ce7a2f26964ae5271ac31340d697aa75d3cef2db4225bce24964b6,2024-11-21T08:41:29.717000
|
||||
CVE-2023-5306,0,0,476b3821b61b469afa7b1ea84617d24f0cc2f50c242f49afe4eefd5e4bb959a9,2024-01-02T16:15:12.483000
|
||||
CVE-2023-5307,0,0,b484b5a2f0c82074f5e4af0f6d60af568bbee3175f2a41e8184c36a39a6518af,2024-11-21T08:41:29.873000
|
||||
CVE-2023-5307,0,1,70a4fc05a1df6708953207043220ebb67fef6ec8321baaf1b6598056b0b6fb42,2025-04-22T20:15:27.617000
|
||||
CVE-2023-5308,0,0,0bd63704a33840f9fb34c63561ae1f507086e98dd3ffbc3f3cc7a50083075ed0,2024-11-21T08:41:29.990000
|
||||
CVE-2023-5309,0,0,7ff36b51673413d4b93370e967f36f985fc56ef7bc3162c9c1596fd8da79b8c1,2024-11-21T08:41:30.110000
|
||||
CVE-2023-5310,0,0,ae19de1a22d7f22d6fd9acfd5ee40221bbaa3312e010ce020b441062ea91c97f,2024-11-21T08:41:30.240000
|
||||
@ -249016,7 +249016,7 @@ CVE-2024-20001,0,0,d81da864138aef2e916a535e1176ba42648319249c46618e65ca5de06493b
|
||||
CVE-2024-20002,0,0,55a994447631f5951a6e1275f63c34e7fa418e413ae7221c0028baa239663e52,2024-11-21T08:51:46.143000
|
||||
CVE-2024-20003,0,0,79362f7e34cccc0afd3abe9f4ba7baa825f3eb45bc504c607750ca92392388fb,2024-11-21T08:51:46.293000
|
||||
CVE-2024-20004,0,0,6d2734a2709aa2a549c91b390b1e6acaa344bb76ff5c26f95d989fa3421a95e4,2024-11-21T08:51:46.530000
|
||||
CVE-2024-20005,0,0,81864e6b98bccdaf19cf86faa064f989d3abe91d785c41a769f319bee2d0415a,2024-11-21T08:51:46.763000
|
||||
CVE-2024-20005,0,1,4f39843e6bd6bd21fe808524fbc243f31d0803af04fb2c2ec4b27452926ad2fe,2025-04-22T20:36:03.550000
|
||||
CVE-2024-20006,0,0,123690fda6d54b98716f1dcc2adbe49f785d535a185fe9b4159c2360ed88a9ac,2024-11-21T08:51:46.967000
|
||||
CVE-2024-20007,0,0,ab19a2494b1d096e2862ed93f193d718b58535b709bff75d63ca0c55cebc750e,2024-11-21T08:51:47.180000
|
||||
CVE-2024-20009,0,0,4a58a52b68097964e7e1bcf696d9da3d868e5ffe4b53e991be80fb6a46e280b2,2024-11-21T08:51:47.310000
|
||||
@ -249028,28 +249028,28 @@ CVE-2024-20013,0,0,aa6383699ae95ba1779043fefd85395a485e40788b6ef64d08f3b84398e34
|
||||
CVE-2024-20015,0,0,d0bf84e9154beb2a0ca615524eb7d5a5c8af3f84d315bb5b3b9fc9a5e887ec1e,2024-11-21T08:51:47.987000
|
||||
CVE-2024-20016,0,0,333b42e108610218ddf2c76157ea0b6043a24679be8cf0416b50493ecc89a87a,2024-11-21T08:51:48.240000
|
||||
CVE-2024-20017,0,0,143cf72499435b0ccdd90f084ca0e975d712eb29509f49566d73ef818212c27e,2024-11-21T08:51:48.483000
|
||||
CVE-2024-20018,0,0,84b8cf92aa5e3a11e0563029efea6c60e660c37063d19ec07611f5620b829c75,2025-03-27T15:15:49.113000
|
||||
CVE-2024-20018,0,1,10b23874f58fe9896adee53f01a628429edd91bf1075832dbad8b96dda757fd5,2025-04-22T20:36:34.053000
|
||||
CVE-2024-20019,0,0,0a2ae787333b53137fceb2b1132f066a8a6d0264380966acb5f440a0dead19c2,2024-11-21T08:51:48.877000
|
||||
CVE-2024-2002,0,0,6190d86055177aafba4288f19403b2d388d4abff6ccf1fd872867fb9a53822b2,2025-04-09T15:36:37.840000
|
||||
CVE-2024-20020,0,0,95eda6ad7909bd99568c191992c0691b09f5f3fd875b18986a3dc9a442abed96,2025-03-28T20:15:20.563000
|
||||
CVE-2024-20021,0,0,63afd4220ffeff0a0d12b5d0e054876129d39d10656a9ff99dbe643098f3cedb,2024-11-21T08:51:49.180000
|
||||
CVE-2024-20022,0,0,01a2db6d4aafd69f0efa252a65aa35156a563d7d965778195a865596c7d42d12,2025-03-13T14:15:20.120000
|
||||
CVE-2024-20023,0,0,09d6edcbccc95f5d43f4f0911970b5de3733ac0546fe0434f5cc8aa81a35f194,2024-11-21T08:51:49.530000
|
||||
CVE-2024-20024,0,0,a558ad6b23645a453221eaf9a9b06c62acf918a03b53e68d526e257656acd7ff,2024-11-21T08:51:49.733000
|
||||
CVE-2024-20025,0,0,3f7a148dd5eb41a7b7c21ede316da08d271973cdda3bca18ea657a87c1e5c1bd,2024-11-21T08:51:49.927000
|
||||
CVE-2024-20026,0,0,888ab9c34ad66549f6edc7d52f9311cc08067115f2c641f198304a380b962619,2024-11-21T08:51:50.183000
|
||||
CVE-2024-20027,0,0,c7344907f20a838ee6a988d8c1823a7f9fafd663154e7dadc19ec87691c9dacc,2024-11-21T08:51:50.370000
|
||||
CVE-2024-20028,0,0,d81eb30e0247d91a3edb10f8b4814e8115ccc746ce0d7f3645e13db2c05ceb6c,2024-11-21T08:51:50.560000
|
||||
CVE-2024-20029,0,1,a0689d41c6061641719ec8c511bc0a873e2afbe49c0b1fd1110bfffb0e0b4ea7,2025-04-22T19:53:12.210000
|
||||
CVE-2024-20023,0,1,988663c225d16e059e20a4bc0eee6073fa1d14fd8b3a70dbcb3f8fc17926bc8a,2025-04-22T20:36:44.290000
|
||||
CVE-2024-20024,0,1,c6f62e462d1df514d4807d600f4a8970eedf222edb61a49a98145c087a42676c,2025-04-22T20:36:49.887000
|
||||
CVE-2024-20025,0,1,952aa14ecf77b6b0fc3c1b0279b5993871ceb4f0b8b8b3f2635fc825c56fda3a,2025-04-22T20:36:54.670000
|
||||
CVE-2024-20026,0,1,42699a0237ba3f6321cb6b153d345bb0f9b70974422211fe4efab4f5fcbcc77b,2025-04-22T20:36:59.587000
|
||||
CVE-2024-20027,0,1,07bda69bfb980940cc517f527e4012f1b8781cc6c465ba998534182e33666ea5,2025-04-22T20:37:03.920000
|
||||
CVE-2024-20028,0,1,b66cb6e2a929e157d9361cdf3936a42719f04c5050ea16a4e7d35503e3759ef8,2025-04-22T20:37:08.280000
|
||||
CVE-2024-20029,0,0,a0689d41c6061641719ec8c511bc0a873e2afbe49c0b1fd1110bfffb0e0b4ea7,2025-04-22T19:53:12.210000
|
||||
CVE-2024-2003,0,0,775e1949b74edd4d5fe135dd726d198dcb9418603371f8ca96481a47a8434fbc,2024-11-21T09:08:47.273000
|
||||
CVE-2024-20030,0,1,408426c31f015241ab3251c5a536ec6cbaeb59d13de981796e2ccf8065b6b3cf,2025-04-22T19:54:09.547000
|
||||
CVE-2024-20031,0,0,58d5bef62d94d1d53ca3eef063b6a3cdfd49f29000396cdda434d2619169a5d1,2024-11-21T08:51:51.167000
|
||||
CVE-2024-20032,0,0,bba00a5fd9ccbaab108caed164f5598cfa855a4efcff2d554905754a727df31b,2024-11-21T08:51:51.373000
|
||||
CVE-2024-20033,0,0,d0a5c719638e1d2034bceb7e751b62ec2e0248a2e58e9923563a9582339f0a41,2024-11-21T08:51:51.587000
|
||||
CVE-2024-20034,0,0,ea13fe7679d8a745d5630ee5759a722bd681d4fde35550fbad78084bff2a2b0c,2024-11-21T08:51:51.773000
|
||||
CVE-2024-20036,0,0,e5aba01f1cf08794bea0c0245ea7260a653d40656878c3332f38b76b437196fa,2025-03-20T19:15:27.843000
|
||||
CVE-2024-20037,0,0,3e0455015ea2766f4c4d4428104a9bd3381b755c62ac17d9617b8c76e6e21bc6,2024-11-21T08:51:52.160000
|
||||
CVE-2024-20038,0,0,65da747c3f7585db9ad477391c6806598d1e3774fbcbae6ae8c69c3ac74e4b25,2024-11-21T08:51:52.357000
|
||||
CVE-2024-20030,0,0,408426c31f015241ab3251c5a536ec6cbaeb59d13de981796e2ccf8065b6b3cf,2025-04-22T19:54:09.547000
|
||||
CVE-2024-20031,0,1,e2bbc0ef1ce591260c2262a0f2df108eafd8a077da5bc5452bdfeaa75abd00d1,2025-04-22T20:37:13.747000
|
||||
CVE-2024-20032,0,1,e6ef048d3ec5adc2f3b97f4bbc603a6210dffe5d1cbad90681a4265866f84b34,2025-04-22T20:14:41.540000
|
||||
CVE-2024-20033,0,1,d515dca7a394928a6163eda6345be16f2770c567ff2223817d408e2bd702e812,2025-04-22T20:18:33.123000
|
||||
CVE-2024-20034,0,1,440a5d880e72a4a130a2740b4688e06f48b4dddb4ef688a3f6304440f8fc762d,2025-04-22T20:23:07.077000
|
||||
CVE-2024-20036,0,1,b87b27bba4cfe2acf7835a2bf8987834be536d058521416978c151b2858d9442,2025-04-22T20:23:27.683000
|
||||
CVE-2024-20037,0,1,e7b178c549d4cd86a4202b75c845a2c22d28461d11c1ff1ab238bfa1193db799,2025-04-22T20:23:37.533000
|
||||
CVE-2024-20038,0,1,320e20128ab827942c4e08552672d6bf5df0526d990fa2c844af70e48bedd346,2025-04-22T20:23:48.507000
|
||||
CVE-2024-20039,0,0,2b0fdb71275f49aeadf986dee4d38a4bf4c596bec19be53f8dd6bb9e1145f672,2024-11-21T08:51:52.523000
|
||||
CVE-2024-2004,0,0,2d2f51ef4843b41303e56f625b5a4f303946c3ef3964ff0e65dbf64107ba9890,2024-11-21T09:08:47.413000
|
||||
CVE-2024-20040,0,0,2b0df4102159dc806669dffea9653d232da676751cf47e5c76e16ac064668c53,2025-03-13T19:15:41.530000
|
||||
@ -259429,7 +259429,7 @@ CVE-2024-33445,0,0,d1c5becbdea6861d953d94b436842c0aaca61a7e83a189acb72e6f8109719
|
||||
CVE-2024-33449,0,0,1b669aecff15eb872ea68246ff39315428a6b194bb949133a07b013352c7f062,2024-11-21T09:16:59.307000
|
||||
CVE-2024-3345,0,0,3d54cec392d8195e579d4b0fb5a3c357983b9e7c55ca4cc462235ef9fd60b9fc,2024-11-21T09:29:25.450000
|
||||
CVE-2024-33450,0,0,1418aaf75173df9be33072457a468f795cd93ec058422fdb75f5dc6bb0aabc6f,2025-03-25T18:15:32.743000
|
||||
CVE-2024-33452,0,0,0dd60e6760b8953a2481f8391492f6950e700c041fb7edc5230c3dc955b4c534,2025-04-22T16:15:44.200000
|
||||
CVE-2024-33452,0,1,a3bc6870985eaec1664a2d59d3c2ec37649f35eeca5c17f019a67324b9438696,2025-04-22T20:15:27.787000
|
||||
CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c372,2024-10-18T19:35:03.713000
|
||||
CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000
|
||||
CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000
|
||||
@ -264869,7 +264869,7 @@ CVE-2024-4044,0,0,01aada30b695e7d560576a60975ec8e82150fda0d77225fe8e43f6b57e0df3
|
||||
CVE-2024-40441,0,0,9c641a9199d7b49691eb0d0ccc6b07376d4badef46335bcb9698dfcaf7f96c2e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-40442,0,0,2f4e5d396d491f4f4f7019855f484e167cf80b7edaec8e55b61d220cacfb6bc0,2024-09-26T13:32:55.343000
|
||||
CVE-2024-40443,0,0,6b2e292f0a4bc06bc5ac32664ca3d52dbbfb1340d75ba0655f0a35cbb69b4b35,2025-04-16T15:06:12.843000
|
||||
CVE-2024-40445,0,0,f1e972aae36e5a7546a2a35c5eddda46271cfa0ac20d37cb248c43b309fe8ba5,2025-04-22T14:15:24.173000
|
||||
CVE-2024-40445,0,1,0e7037e90f9ec711bb48808ec55a39e4ed4f1ae5d4ed2cfae950d290dc88a480,2025-04-22T20:15:27.957000
|
||||
CVE-2024-40446,0,0,4fa9f6d18e4a702acff2c6c787cf8c2dd88752f4db149b18209ac7b5f906fe34,2025-04-22T14:15:24.327000
|
||||
CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000
|
||||
CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000
|
||||
@ -270868,7 +270868,7 @@ CVE-2024-48346,0,0,137121b06c9d03025a14db47b13e30e3704002468bdea02ff387b29ce7f68
|
||||
CVE-2024-4835,0,0,e5afebda31e3d00337280146c689aefe524c3c5fc6e420e48bcb5298cdef38fb,2024-12-16T15:10:13.577000
|
||||
CVE-2024-48352,0,0,0630b5d0648f49e8f5e7ffc77997954c036846dfd8121959ae1ed5204e6959c4,2024-11-05T21:35:31.063000
|
||||
CVE-2024-48353,0,0,34e9ff7673ed1bf12aecd5dc4105de10e84686e2a42ad35030b059ca0e7a87bf,2025-03-07T21:15:17.203000
|
||||
CVE-2024-48356,0,0,eac70a56b90ec2a9ea89c90d1bd0f8f40240711b9bd71861f168af2fe20e0990,2024-10-30T17:35:12.420000
|
||||
CVE-2024-48356,0,1,ef2aef1550a0afc64a7022138c1ff4fd08adf4ccc7c1306118c8152e5bc66023,2025-04-22T20:24:36.477000
|
||||
CVE-2024-48357,0,0,527b3b47a9bd0dd8ea52972a7f5f8d29e64f5ed4fa898b301343b4beb9da31cd,2024-10-30T17:35:13.203000
|
||||
CVE-2024-48359,0,0,4472fa600139ff2a5cc83feda30936e4a1215195f020cdd7c52b43f6905e8f7b,2024-11-01T21:35:04.220000
|
||||
CVE-2024-4836,0,0,b46eb66373ee9c7205dc4e47a376290cfcc14a21eeef8a54f2457394680abb16,2024-11-21T09:43:42.437000
|
||||
@ -270947,8 +270947,8 @@ CVE-2024-4856,0,0,ab83ca2de67666e97f721fc039d2c0e5b9e81fd2cfd28d981ae7cd089299b5
|
||||
CVE-2024-48569,0,0,4ff65d720d006254873403eb1a3b2827ba3b4b77b43e676191ed38dcbe8e8517,2024-11-01T12:57:03.417000
|
||||
CVE-2024-4857,0,0,1425fe617505078c95c036dd0caef66eaa5a7e090209dfa3eacdc5e62618466c,2025-03-28T20:15:25.270000
|
||||
CVE-2024-48570,0,0,3435b97fed6be571814415d23490ac0110cb83030a16079bb75dc360800ff593,2024-10-25T18:59:22.033000
|
||||
CVE-2024-48572,0,0,a2419def6a4b35324744964b657a3254ded961d94c75623896498b036be6401b,2025-03-14T17:15:47.973000
|
||||
CVE-2024-48573,0,0,efc3a59c14a3f07b5948acb7aa9394fbc0790a5ca5d2537f814eb4b744b1b587,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48572,0,1,0d68a2eb25452dc45666ea8d65bbb9f12ace14a92ec2498a71bb211b2984ecdd,2025-04-22T20:23:23.893000
|
||||
CVE-2024-48573,0,1,3af9c13b56239290a2b5821681083571a4f7c4a72740948b70e5d400edaab425,2025-04-22T20:17:44.560000
|
||||
CVE-2024-48579,0,0,dee7c78d0702c64a8f39cc4036ed6080e70421fd088c94b956bf94e50f9f0a08,2024-10-28T13:58:09.230000
|
||||
CVE-2024-4858,0,0,1548d35291b51ac1157133f3a9dd324ad3bf46f6b71adfad39b5e88bc9095fb0,2025-04-04T16:55:05.810000
|
||||
CVE-2024-48580,0,0,e540b5d156a186615d240d0f099de52f053b3a0dab4d95b774286d8b7357b132,2024-10-28T13:58:09.230000
|
||||
@ -272766,7 +272766,7 @@ CVE-2024-5073,0,0,8f9666a5d3a8eb23f45b7a6a371b532fc485ca12ecc00275ad0b6ca4b8ff4f
|
||||
CVE-2024-5074,0,0,300fb8a2ae76071163fb30d885721444a084ca820de7e72b30304998ec6beaa3,2024-11-21T09:46:54.600000
|
||||
CVE-2024-5075,0,0,c82cee15f5595db5c0526fc43338a3ff626ae52b2d5be5de40d2fc2c435a85d1,2024-11-21T09:46:54.773000
|
||||
CVE-2024-5076,0,0,284618adb04db008f22e271ae9a9f2760662684738af47c0a5e9fac65d18374c,2024-11-21T09:46:54.940000
|
||||
CVE-2024-50766,0,1,fbacc2334fae851c6323019b12ddba4459044a14a6d77749e31303b87c7a8c77,2025-04-22T19:30:32.917000
|
||||
CVE-2024-50766,0,0,fbacc2334fae851c6323019b12ddba4459044a14a6d77749e31303b87c7a8c77,2025-04-22T19:30:32.917000
|
||||
CVE-2024-5077,0,0,0eb243c5d90dafb2e4a950d3023e98af0d86ebf86c40294f31801c1f0fc8736b,2024-11-21T09:46:55.110000
|
||||
CVE-2024-5079,0,0,b1e5a3007e787fe4036ac3e32fce30f8b6365dc3ceab4381e80bbe6b06f2c625,2024-11-21T09:46:55.287000
|
||||
CVE-2024-5080,0,0,e947aa9e19d47b06b2a9dc2e8f3b7d991c3d44331c31195568d4a11e9dc799c0,2024-11-21T09:46:55.457000
|
||||
@ -272843,7 +272843,7 @@ CVE-2024-50954,0,0,02068458dd8d6a2ffb99f46bf4d0a02d5a8b6d37dbba06978db764a483c08
|
||||
CVE-2024-50955,0,0,d286c5359e65ec4107e3297ae49fde58b3efeb0287b5581ad11b8684b68fae9a,2025-03-13T19:15:48.793000
|
||||
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
|
||||
CVE-2024-5096,0,0,158df124ac63cd0f2f1e57be7cd9d0373dc2a0ceea7bd2bb10f556aa3af44df8,2024-11-21T09:46:57.483000
|
||||
CVE-2024-50960,0,1,3588629b8935c5ac93d1a88fd59b84635f01bfa1bb459f918da74e06f0fef2ad,2025-04-22T18:00:52.937000
|
||||
CVE-2024-50960,0,0,3588629b8935c5ac93d1a88fd59b84635f01bfa1bb459f918da74e06f0fef2ad,2025-04-22T18:00:52.937000
|
||||
CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000
|
||||
CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50967,0,0,a510a0bc53da9b8204db12045069c14674f172a420837c75cd83c80e3a09cc7a,2025-02-04T16:15:37.863000
|
||||
@ -272860,21 +272860,21 @@ CVE-2024-50989,0,0,3ea16f2258939ba7699d8ffffb9e162a7c1074b1287d37a29649ff27af039
|
||||
CVE-2024-5099,0,0,bda83cfdd75817e519e801952603024ae976922692eea776b8a4faa211c011eb,2025-02-10T14:27:10.093000
|
||||
CVE-2024-50990,0,0,bfd5aba686c1c3649f0b59341f8357525fe80b6226d5b955d61d8fd1797fcacf,2025-03-27T17:34:08.310000
|
||||
CVE-2024-50991,0,0,8122b668e68e7ff2631d7f870d24a0601fc388e38742210e13c58b7d6694c059,2025-04-04T20:00:24.057000
|
||||
CVE-2024-50993,0,1,45c7499f43a514ad709ec77267045299bf6c27e2c53a4be735be70acccb7767f,2025-04-22T18:09:32.990000
|
||||
CVE-2024-50994,0,1,07634b30aeaed5bbea21628a66cda719abeadecbd44ef6bc664304359fa32278,2025-04-22T18:11:27.543000
|
||||
CVE-2024-50995,0,1,ff4da6830dfe2233c73a1743ee79568bc8fc78868949b08c062690d46086ed8c,2025-04-22T18:11:51.507000
|
||||
CVE-2024-50993,0,0,45c7499f43a514ad709ec77267045299bf6c27e2c53a4be735be70acccb7767f,2025-04-22T18:09:32.990000
|
||||
CVE-2024-50994,0,0,07634b30aeaed5bbea21628a66cda719abeadecbd44ef6bc664304359fa32278,2025-04-22T18:11:27.543000
|
||||
CVE-2024-50995,0,0,ff4da6830dfe2233c73a1743ee79568bc8fc78868949b08c062690d46086ed8c,2025-04-22T18:11:51.507000
|
||||
CVE-2024-50996,0,0,cbf7781c819b6353609bcd83218636fae64d07d86c74b70bb492414bfe5b675b,2024-11-05T17:35:21.940000
|
||||
CVE-2024-50997,0,0,9fefd5da6d0e463a593186d3875e24fe92e182261c0a68153856fbf701b31020,2024-11-05T17:35:22.727000
|
||||
CVE-2024-50998,0,1,131106f189d33d06381b3f5e5ad0c5f50ff2409a4ea03dc3c6f695e44d1e14ab,2025-04-22T18:12:56.867000
|
||||
CVE-2024-50999,0,1,6fff8d5ab7a41b0bb1f77b7d0bf186eabb0f814576f950b3e851d3a85caab338,2025-04-22T18:13:30.633000
|
||||
CVE-2024-50998,0,0,131106f189d33d06381b3f5e5ad0c5f50ff2409a4ea03dc3c6f695e44d1e14ab,2025-04-22T18:12:56.867000
|
||||
CVE-2024-50999,0,0,6fff8d5ab7a41b0bb1f77b7d0bf186eabb0f814576f950b3e851d3a85caab338,2025-04-22T18:13:30.633000
|
||||
CVE-2024-5100,0,0,c1dc57708cd24a7fb6ffd96dd6b5a2ef484b8819be25ec95c2f19687d36b3e27,2025-02-10T14:26:40.580000
|
||||
CVE-2024-51000,0,1,fd6d45a56fbe5e42cc381c89cddaeaafca1daf9570ceb81fe0a7ee9a3e001042,2025-04-22T18:13:56.557000
|
||||
CVE-2024-51001,0,1,ce5ec821a14006daab0a706d032cbf4204d912d28d411bb98f938567551ece16,2025-04-22T18:14:23.380000
|
||||
CVE-2024-51000,0,0,fd6d45a56fbe5e42cc381c89cddaeaafca1daf9570ceb81fe0a7ee9a3e001042,2025-04-22T18:13:56.557000
|
||||
CVE-2024-51001,0,0,ce5ec821a14006daab0a706d032cbf4204d912d28d411bb98f938567551ece16,2025-04-22T18:14:23.380000
|
||||
CVE-2024-51002,0,0,27b9575d2141dad8ac7f5fa1df74017e7a79800adad78b1d62a47a8f5d39bbc5,2024-11-05T16:35:18.260000
|
||||
CVE-2024-51003,0,0,0a36b3e1891d4af85f1fc2111eb2210a7f86439046267058a850f0c2210ed2b2,2024-11-05T16:35:19.093000
|
||||
CVE-2024-51004,0,0,afbbcf587a85d07252e41f488e77db80d03f5dde0d9158b613d2fe3e7187e902,2024-11-05T16:35:19.883000
|
||||
CVE-2024-51005,0,0,ec92940f361fa054262de7863ffe8d0c2c33455494c3d47dd5d4a7ac5baf7a63,2024-11-05T16:35:20.680000
|
||||
CVE-2024-51006,0,1,e3bd9c916a2bf37c85eb9aa0e28298c8c6e92e13b48f5b3b2fd9b260bd28b914,2025-04-22T18:16:00.370000
|
||||
CVE-2024-51006,0,0,e3bd9c916a2bf37c85eb9aa0e28298c8c6e92e13b48f5b3b2fd9b260bd28b914,2025-04-22T18:16:00.370000
|
||||
CVE-2024-51007,0,0,00ca7f426e94ff82cd08efdeeabac29d12d535baa779e20990bb23ac90fc71d5,2024-11-05T16:35:22.247000
|
||||
CVE-2024-51008,0,0,ea2fc2999154b2ac779718f4f439fd6cf243261b88d0d809d99bb3a37a55f669,2024-11-05T16:35:23.023000
|
||||
CVE-2024-51009,0,0,34a4c0de81abfc30835af6cad7eb5a6c089fa88a87987b00609d65e0a1b256e6,2024-11-05T16:35:24.040000
|
||||
@ -274668,8 +274668,8 @@ CVE-2024-53561,0,0,2db461bdeb8c4864c64c56a2e6e236ca165dc13a0d537fffcd4f9ab4438e4
|
||||
CVE-2024-53563,0,0,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf549,2025-01-16T18:15:24.573000
|
||||
CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000
|
||||
CVE-2024-53566,0,0,5169befd7db7ebb5725344c6b1622ae4de4cab71c37cd96a53ae5495bb145b4d,2025-02-06T02:15:10.167000
|
||||
CVE-2024-53568,1,1,11775be9bfc79d59f29cf8146ec41abfbf51ffc82d75739097515772f1c31922,2025-04-22T19:15:51.583000
|
||||
CVE-2024-53569,1,1,4e45a5cc17db12fe0e868419e1d439c1bce142d242cab892eb8aa83f0b02af16,2025-04-22T19:15:51.703000
|
||||
CVE-2024-53568,0,0,11775be9bfc79d59f29cf8146ec41abfbf51ffc82d75739097515772f1c31922,2025-04-22T19:15:51.583000
|
||||
CVE-2024-53569,0,1,5eb7969439e9f004fa665d254816fdfe6f8a4971cbc143c6058c52cf57d892f4,2025-04-22T21:15:44.850000
|
||||
CVE-2024-5357,0,0,6b143c42b66b249c10cf8060085531a38dd8ab251749df6a73e8b8c9b5bd7537,2025-02-21T19:48:37.280000
|
||||
CVE-2024-53573,0,0,028eaae0a775d9ec5d3196a4f5a5c4e099d77e7a9f1bd1c5fb85526a64df3487,2025-04-07T18:44:05.887000
|
||||
CVE-2024-5358,0,0,6d33ba8bbcb714232ba00a0ab155f47abf8c1c38a71cb020e5efc05fb9de6ae3,2025-02-21T19:47:18.300000
|
||||
@ -275587,8 +275587,8 @@ CVE-2024-54792,0,0,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345ba
|
||||
CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
|
||||
CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
|
||||
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
||||
CVE-2024-54802,0,1,01b64fdd691e4455740dd0004af29c739b0b007e9ba60acd282b32b683b2e808,2025-04-22T18:17:11.743000
|
||||
CVE-2024-54803,0,1,da53382668febe8460bf7216780f09814376510be7d014b0630ccbe3046828c4,2025-04-22T18:16:52.410000
|
||||
CVE-2024-54802,0,0,01b64fdd691e4455740dd0004af29c739b0b007e9ba60acd282b32b683b2e808,2025-04-22T18:17:11.743000
|
||||
CVE-2024-54803,0,0,da53382668febe8460bf7216780f09814376510be7d014b0630ccbe3046828c4,2025-04-22T18:16:52.410000
|
||||
CVE-2024-54804,0,0,c2f7dddff0d9ace943f4046ed847e179afde6ccfd2d76256db6557d35c4844ce,2025-04-17T13:05:10.540000
|
||||
CVE-2024-54805,0,0,6c2c97da38cae53e48d442bad67c7dfb312eab16e6f636263f5bde6a494696de,2025-04-17T13:04:30.327000
|
||||
CVE-2024-54806,0,0,771b52fd86f1cefd62260c183037bbd0e8800e3f5ae91cb4b184773b6460e623,2025-04-17T13:03:58.260000
|
||||
@ -276919,7 +276919,7 @@ CVE-2024-57241,0,0,ae7227a512a71f6b204342fedc4cc7e5a2bc404c832be6c57d09f231338e2
|
||||
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
|
||||
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
|
||||
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
|
||||
CVE-2024-57252,0,1,07075ca8aec17bf8980e2691da74fce87daae049f22d9efeeb2e9313a2c33ede,2025-04-22T19:38:49.933000
|
||||
CVE-2024-57252,0,0,07075ca8aec17bf8980e2691da74fce87daae049f22d9efeeb2e9313a2c33ede,2025-04-22T19:38:49.933000
|
||||
CVE-2024-57254,0,0,eea33dbd2c80f7afd4ee3e6a980d1e79b272d42463c2d40572a61fc95d710671,2025-02-19T00:15:10.243000
|
||||
CVE-2024-57255,0,0,7a1a53ec6ce86e1e31ef8d5d2d95b146ede675fcc19a329b5a735cc6fe827c0e,2025-02-19T00:15:10.397000
|
||||
CVE-2024-57256,0,0,64d72c589db31a5765766aca3517df74be93ecb3f9e19f121511450144997310,2025-02-19T00:15:10.550000
|
||||
@ -277015,8 +277015,8 @@ CVE-2024-57514,0,0,dcad93c7b1ee740d3cfee690d5bf9ebaac5164de17811f6d5f3bf41b99f89
|
||||
CVE-2024-57519,0,0,28bb3f9e1112c2a897bfc2cb51022a1a3a66c1d7255ac53f8ebdcadd1909fd1a,2025-03-25T14:15:26.557000
|
||||
CVE-2024-5752,0,0,4279b49c1e8f69df93439002f6af091c9949f569d62ed33209701a1ff6b32e44,2025-03-20T10:15:32.733000
|
||||
CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000
|
||||
CVE-2024-57522,0,0,2b5ea53cc9f03dcd4176381c6af58429fd53941037b5107dcc3f71ab8ffc5853,2025-02-03T19:15:13.513000
|
||||
CVE-2024-57523,0,0,c2aa16623249298cf2dcaf2abefca3317fb5f857f267cf74a214519dd70a3913,2025-02-06T20:15:40.050000
|
||||
CVE-2024-57522,0,1,18e711bef02ec93aea7b480aff73784056d9c41ed01c1af04200010cd11c145d,2025-04-22T20:08:29.483000
|
||||
CVE-2024-57523,0,1,9fd5b8b30d9788fd284244369559ac2fca5a537a05cecae34a4e95bce1786a29,2025-04-22T20:06:16.133000
|
||||
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
|
||||
CVE-2024-57536,0,0,691bbe45b6c8dec1b3fb6ba4e32723d879ed3feb0eb9208588f95b190d231a22,2025-04-22T14:11:56.087000
|
||||
CVE-2024-57537,0,0,2907e2eda64c6ec8a608ebd4f389b1d60cc8d7e07d9c5be63960d897e0e4a121,2025-04-22T14:11:50.577000
|
||||
@ -281689,10 +281689,10 @@ CVE-2025-0528,0,0,9a5ff48ddd9d71956228edb95dc0cb0945dc75209025b5720233df418ad510
|
||||
CVE-2025-0529,0,0,2491e50ad07ed539d39ff7934a263957f131237fe31e5c871567cbe6fea67816,2025-03-03T17:42:45.550000
|
||||
CVE-2025-0530,0,0,5bef9ce6a5663aea285b0b122ce9c1e1f3cd9b64083308edb0f43e4b03826c17,2025-03-03T16:21:37.213000
|
||||
CVE-2025-0531,0,0,b458669d14808bdec31efc3f382985af1394398c2e10978a923491e4ad576f4e,2025-03-03T17:41:04.760000
|
||||
CVE-2025-0532,0,1,2c01660564658a62d2901301d3a6f84be23be7f03be7362c52fecf19047156f4,2025-04-22T19:53:47.040000
|
||||
CVE-2025-0532,0,0,2c01660564658a62d2901301d3a6f84be23be7f03be7362c52fecf19047156f4,2025-04-22T19:53:47.040000
|
||||
CVE-2025-0533,0,0,c9eaf681312616e888aae3d822e61ac239c2de7e47dac37c75fef4b4ac89300c,2025-01-17T21:15:10.487000
|
||||
CVE-2025-0534,0,0,e90b47d84165ca4ff9843bf6b8251a15a8974eef4a581c03b4d0d4e43640d1a4,2025-01-17T21:15:10.650000
|
||||
CVE-2025-0535,0,1,f52b0c5cd5b43ed3070b2305c4b99c429780b4d456052dbb3e1f09ea3253204f,2025-04-22T19:45:10.037000
|
||||
CVE-2025-0535,0,0,f52b0c5cd5b43ed3070b2305c4b99c429780b4d456052dbb3e1f09ea3253204f,2025-04-22T19:45:10.037000
|
||||
CVE-2025-0536,0,0,412cd2683e58a1de99579b236649cb4bd6b2182db9918e53a30fe5cc8242b56b,2025-02-25T22:25:04.860000
|
||||
CVE-2025-0537,0,0,ac18629f3505fc8d01ed75e493b563a9195f7e930c5c5595394a818b3f1d8d86,2025-02-21T21:32:41.437000
|
||||
CVE-2025-0538,0,0,23a74353ce4d38faae66783e1cf58936a188bf24527270171417447ac3a1997e,2025-02-21T21:22:54.457000
|
||||
@ -281713,7 +281713,7 @@ CVE-2025-0561,0,0,81a2491629ae94e4b707ac0970f53748abdc22f1c835d24efa4465f738b2a8
|
||||
CVE-2025-0562,0,0,1c0fafb05ecae6394ef6a0e4fb0b422cdb8b2ca821c5a5ddd4bbf86a69ca583f,2025-02-28T02:12:08.413000
|
||||
CVE-2025-0563,0,0,ce19cfe591eacee39d9c17ca788d02617941e0e97c228549131ce1b9ce6e1091,2025-02-28T02:06:27.387000
|
||||
CVE-2025-0564,0,0,28e3449a30bbb0b3646534d3cbe292dd1b3c66b7692bd42455f3dd28232f3910,2025-02-28T02:03:49.020000
|
||||
CVE-2025-0565,0,1,2e2a9c95369fda7cea648c893d457a14e7b0445729fca1a0fb19b9a3bc56ceb5,2025-04-22T19:37:16.983000
|
||||
CVE-2025-0565,0,0,2e2a9c95369fda7cea648c893d457a14e7b0445729fca1a0fb19b9a3bc56ceb5,2025-04-22T19:37:16.983000
|
||||
CVE-2025-0566,0,0,808e427d5dfa75ce24b9429955751e5a7b1a6add78a4d8ed4301a4b936fc0263,2025-01-19T07:15:06.407000
|
||||
CVE-2025-0567,0,0,a8f372e2f0a0b4ae1fb29c2eb1fabf40206359280df9e07355a250752b5333dd,2025-01-19T08:15:06.637000
|
||||
CVE-2025-0568,0,0,f011faf0ca2787e42914785a4d76c3cb888a2ca310ad9fafdd69cd7c06a9cd39,2025-02-19T19:28:44.330000
|
||||
@ -284874,7 +284874,7 @@ CVE-2025-23249,0,0,94633147d14d036d2e7187c840b9a0d823be11a9db4ddcfd41d81379bcc5b
|
||||
CVE-2025-2325,0,0,a1c3de12528dbf5a65aaa14f3483a3c6066344fd24d21f90a63ab60e2ee305ce,2025-03-25T20:07:03.383000
|
||||
CVE-2025-23250,0,0,053d0bfd751ab6c1035b465d78abf51a8f5f8a53fe6b2ef561aa76a014379771,2025-04-22T16:15:44.740000
|
||||
CVE-2025-23251,0,0,7303c548786ed2f7e6a97d9a0ddfa6815886df6ab2c3ae58a32f79b6056af249,2025-04-22T16:15:44.870000
|
||||
CVE-2025-23253,1,1,4063503f767a77188725b6b0ddaa451657c4db53c1da98399f822266b831a77c,2025-04-22T19:15:51.827000
|
||||
CVE-2025-23253,0,0,4063503f767a77188725b6b0ddaa451657c4db53c1da98399f822266b831a77c,2025-04-22T19:15:51.827000
|
||||
CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000
|
||||
CVE-2025-2328,0,0,432be9c7b77876c37841232148e3f6774268d50f769033c9c60a49c79bb54e41,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2331,0,0,ba6a506c04c459bf4d4f1d883b767008a848176622abe4526fa84600ec186015,2025-03-22T12:15:26.833000
|
||||
@ -286253,8 +286253,8 @@ CVE-2025-2493,0,0,676bfb3fae988b7f59f84e2d119ffc2e2dbb296d8377ca555044ab18d56339
|
||||
CVE-2025-2494,0,0,bcaebcb1515af09f885a274b8c37bce4332f814c62227922c0b3b3b40ff36ddd,2025-03-18T12:15:16.090000
|
||||
CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000
|
||||
CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000
|
||||
CVE-2025-24948,0,1,b75d3c00e7af8af8501f16e8e3d1b87bb3c53b96df17a1c4c51a8fde8a95caf2,2025-04-22T18:41:34.110000
|
||||
CVE-2025-24949,0,1,ad2eeff94c288cdec872d1cf095c92764b17560c4378e15d7b89134bbe09e899,2025-04-22T18:39:42.840000
|
||||
CVE-2025-24948,0,0,b75d3c00e7af8af8501f16e8e3d1b87bb3c53b96df17a1c4c51a8fde8a95caf2,2025-04-22T18:41:34.110000
|
||||
CVE-2025-24949,0,0,ad2eeff94c288cdec872d1cf095c92764b17560c4378e15d7b89134bbe09e899,2025-04-22T18:39:42.840000
|
||||
CVE-2025-2495,0,0,e45b713c39e19a1ca1a75215099f4bc50e791fc79824ab87f82f4b1c8c27f512,2025-03-18T12:15:16.227000
|
||||
CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eafcd8,2025-02-11T11:15:17.273000
|
||||
CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000
|
||||
@ -286846,6 +286846,7 @@ CVE-2025-26153,0,0,2f65e8ad1ba183bd76c6c089bc4e780341238fc7dfb310f51bd4ad842cc2e
|
||||
CVE-2025-26156,0,0,962eae3fa0ac2ee7ef9345ac9060a4193d262807409fdde8171c1e14753b4430,2025-04-02T18:49:33.170000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26159,1,1,c1a144fa03344037ad44bdaa8eed937820ad553b684779ebdc582edf0695682d,2025-04-22T21:15:44.987000
|
||||
CVE-2025-2616,0,0,2f2b88794fbbb9efdd58fa5d5c325450c0adad88bc639add77ab6b1ee88ac735,2025-03-22T10:15:16.533000
|
||||
CVE-2025-26163,0,0,4ffd8c87a5a86411342dba92069be8d16487d70a2e7d1aa79a834090be3e95d6,2025-04-03T16:18:02.457000
|
||||
CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000
|
||||
@ -286873,7 +286874,7 @@ CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a17192
|
||||
CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
|
||||
CVE-2025-26265,0,0,dc6169524b361ca35185d09a9fee076e263bc06d923c2410d4d58b5ca82c49d7,2025-04-11T17:24:17.313000
|
||||
CVE-2025-26268,0,0,b69d77bcd6efe59842f055b3d981d7373f7fb33d7074337807a32b11e4094f2f,2025-04-17T20:21:05.203000
|
||||
CVE-2025-26269,0,1,afff961c51e100763372d7c90addfbd33c5c1e9c6e7bc6f1de24c3b5de18db85,2025-04-22T18:15:58.627000
|
||||
CVE-2025-26269,0,0,afff961c51e100763372d7c90addfbd33c5c1e9c6e7bc6f1de24c3b5de18db85,2025-04-22T18:15:58.627000
|
||||
CVE-2025-2627,0,0,2f3ad81f65de29cf1c1820e848f840cadf0a85c3d953dd25546251d732981bcd,2025-04-02T15:46:50.193000
|
||||
CVE-2025-2628,0,0,05d1547b9a4ba25743b9dcb0b6bd681f5330882c7d106990b2f631bde4178f60,2025-04-02T15:44:41.567000
|
||||
CVE-2025-2629,0,0,92526d6802f82a60577f499f7428e085c5c9a3dc350eda35a33c257d8ff3ba9b,2025-04-09T20:02:41.860000
|
||||
@ -287986,20 +287987,20 @@ CVE-2025-28010,0,0,716afcbc5cebfe3c684dbf7aa12e99a30e3cb54526d7e93ef8e97f615752b
|
||||
CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000
|
||||
CVE-2025-28015,0,0,631137508e8a20a86b77040d3a1f398272eddb26c2d8f5274ce598561c73146c,2025-03-28T19:49:16.520000
|
||||
CVE-2025-28024,0,0,133ac73f2d6b0e59d18dd7b50b2dd583275960c43efb0364b7bd5e4448da3fbe,2025-04-22T16:15:44.997000
|
||||
CVE-2025-28026,1,1,e5315f1d6c378a98e325df322a05dd164df8bdabbfcb8f39e0333bd6eaac94ef,2025-04-22T18:15:58.803000
|
||||
CVE-2025-28027,1,1,75e05e17378eac35402d8cae193b33d3e56a8fe3bc18079fd9b5fa9fcdc24cd7,2025-04-22T18:15:58.910000
|
||||
CVE-2025-28029,1,1,67802fb05d30a3cdb0154dc37a4c4d7aa174702121e57b334b726172bc476759,2025-04-22T18:15:59.037000
|
||||
CVE-2025-28026,0,0,e5315f1d6c378a98e325df322a05dd164df8bdabbfcb8f39e0333bd6eaac94ef,2025-04-22T18:15:58.803000
|
||||
CVE-2025-28027,0,0,75e05e17378eac35402d8cae193b33d3e56a8fe3bc18079fd9b5fa9fcdc24cd7,2025-04-22T18:15:58.910000
|
||||
CVE-2025-28029,0,0,67802fb05d30a3cdb0154dc37a4c4d7aa174702121e57b334b726172bc476759,2025-04-22T18:15:59.037000
|
||||
CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000
|
||||
CVE-2025-28030,0,0,b0499939dbe7a7a05e3fc37ed1e6ccde522b98839076b01baf8fa71a215586e2,2025-04-22T16:15:45.123000
|
||||
CVE-2025-28031,0,0,31abd3c620e560f32223c43ca63fa712d12ec8aea2e44d54b80783ba1fe11431,2025-04-22T16:15:45.250000
|
||||
CVE-2025-28031,0,1,f64dec12f3ac40d2d438568b4e76dbcaff20dc913570c68af598c1ea02e0a43e,2025-04-22T20:15:28.253000
|
||||
CVE-2025-28032,0,0,4ca94134f0b82e11e1a2aaca33c11b6c40f2dc9ba44126fcfeb6e62db730081d,2025-04-22T14:15:25.017000
|
||||
CVE-2025-28033,0,0,798e86e951abdef9a0d55f6764a5ec9e68a1229668840e4129e69b1ed6d59cc1,2025-04-22T14:15:25.150000
|
||||
CVE-2025-28034,0,0,810629de37a4da2ef7d4a69f7ba0d54d26a2c6f13dc48dff83602355f5bb7eaa,2025-04-22T14:15:25.263000
|
||||
CVE-2025-28035,1,1,840d81080b9f4a57f352487fd87ee10a6a7bd6df83b144e49f72ecbca2007422,2025-04-22T18:15:59.160000
|
||||
CVE-2025-28036,1,1,aeef5e48b36fcf6b6db9f59a054d1deb05a0704bf0e28ad2ca990e9e38536b0c,2025-04-22T18:15:59.260000
|
||||
CVE-2025-28035,0,0,840d81080b9f4a57f352487fd87ee10a6a7bd6df83b144e49f72ecbca2007422,2025-04-22T18:15:59.160000
|
||||
CVE-2025-28036,0,0,aeef5e48b36fcf6b6db9f59a054d1deb05a0704bf0e28ad2ca990e9e38536b0c,2025-04-22T18:15:59.260000
|
||||
CVE-2025-28037,0,0,dc82d8c969abef6f3f8c526f00209a277d2f581944385fbb31b50bb76b5d85e6,2025-04-22T16:15:45.370000
|
||||
CVE-2025-28038,1,1,1221b139f825a5d7e64e8c9157f45646c7cf939abf4fb17c9dfcd2eee0bce8e8,2025-04-22T19:15:51.977000
|
||||
CVE-2025-28039,1,1,c816d0975ef1aa4c58e7d48ec693b961437237233dfedd9e689a1b04b083b853,2025-04-22T19:15:52.143000
|
||||
CVE-2025-28038,0,0,1221b139f825a5d7e64e8c9157f45646c7cf939abf4fb17c9dfcd2eee0bce8e8,2025-04-22T19:15:51.977000
|
||||
CVE-2025-28039,0,0,c816d0975ef1aa4c58e7d48ec693b961437237233dfedd9e689a1b04b083b853,2025-04-22T19:15:52.143000
|
||||
CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa0244,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000
|
||||
CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000
|
||||
@ -288038,7 +288039,7 @@ CVE-2025-28146,0,0,32c9b208c84d9df041320792b106820cf214078a35a3cb79372374645d187
|
||||
CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28197,0,0,6014e266f4224c57ab1bd75f113da4696d8d67e68cf26ea7681631f15433ac64,2025-04-22T14:15:25.370000
|
||||
CVE-2025-28198,0,1,73ff852cc2b9fbbbd6178c29b242eef1218bd0b40968701e88342b96e8ec1dbe,2025-04-22T18:24:06.670000
|
||||
CVE-2025-28198,0,0,73ff852cc2b9fbbbd6178c29b242eef1218bd0b40968701e88342b96e8ec1dbe,2025-04-22T18:24:06.670000
|
||||
CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28219,0,0,ec028a36263bbd1ae74e67661a16435fa8f188c14a8af517a9060f482a1d7fc7,2025-04-21T19:15:19.700000
|
||||
CVE-2025-28220,0,0,8ea849100de99eadf0f1f692eee281fe3ae88b76d5aa3b6cb7e191d33a52a747,2025-04-21T19:15:19.847000
|
||||
@ -288318,7 +288319,7 @@ CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2
|
||||
CVE-2025-29389,0,0,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000
|
||||
CVE-2025-29390,0,0,2af3ceeb0b0e4ec487468d0265cf4f9bf7105f9f26e650a3615e67390bc16783,2025-04-22T17:06:50.490000
|
||||
CVE-2025-29391,0,0,3957a6f12658ba0f8a64a4509b31e9cff0f721c7269083a2c5583c8497158773,2025-04-22T17:02:50.427000
|
||||
CVE-2025-29394,0,0,47d194e0b2475c8a52b28900fb9c553c14414f8fc7d04f64ad764d8fd034311a,2025-04-18T18:15:47.750000
|
||||
CVE-2025-29394,0,1,4090687a0b04adebceb5be059956dcab0a952bc601580bcce43cec2c0d6a13ba,2025-04-22T21:15:45.123000
|
||||
CVE-2025-29401,0,0,58e28d32bb8e9d05a099b3459d8a1f2140d9f050ebab60871b5c42621e6014f9,2025-03-25T16:15:25.543000
|
||||
CVE-2025-29405,0,0,b0b5dc47fefba80ac6689c1790abcddffbf12cf547b54f457820a149edabea55,2025-03-24T15:15:16.377000
|
||||
CVE-2025-2941,0,0,2a30ba06bce9faeb159e65a42eddbce7a23fc7e73f8564bd02faf3032a157758,2025-04-07T14:17:50.220000
|
||||
@ -288379,7 +288380,7 @@ CVE-2025-29513,0,0,515ae61a28c85140fea26d0dda962e2370ad1908366e341bda6f4872187d1
|
||||
CVE-2025-2952,0,0,8e511f60053de6e98a0a0d7d1bc3adcad4b08b5c7d212898526204e3a8631438,2025-04-15T17:46:20.793000
|
||||
CVE-2025-2953,0,0,63a058316a94f1860205db8db60c337f53057708ffe30b70ffabdee4df9a2fc5,2025-04-22T12:15:16.043000
|
||||
CVE-2025-2954,0,0,0672b048d9a1bc1b6cab4c4533c01031021ece5eaf46619f3aa405740d82e196,2025-04-15T17:57:44.213000
|
||||
CVE-2025-29547,0,0,6ca64a333009c467d83b71bfefc116cd2448c593b57d6e192bbd51171b932b43,2025-04-22T15:16:12.447000
|
||||
CVE-2025-29547,0,1,e6a82f42ef36b70f6ebae1125243a6e993a86f4c541d862aad8439a9efa82f29,2025-04-22T20:15:28.430000
|
||||
CVE-2025-2955,0,0,f457e82bc0e34816f82e9412a70796d5f7c872fa43e3171fc313f275eba39469,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258af7,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000
|
||||
@ -288389,7 +288390,7 @@ CVE-2025-2959,0,0,57439d37e721214da77398b2206968b1ad6df0cab306317270d7e0fd15a79d
|
||||
CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2960,0,0,48a895c8f54538f74cec3a9e11744bb422ef858e72d370441685f9bd785c394d,2025-04-15T18:28:01.283000
|
||||
CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29621,1,1,dd5483c18084f7eecab86e2dfad2b18b2da68a17306a5825a2bc185369c2469a,2025-04-22T19:15:52.300000
|
||||
CVE-2025-29621,0,1,ad906d2a40cdb99981951638b0a32137c124950cbe21325a1431dd9f4ad0a10a,2025-04-22T21:15:45.253000
|
||||
CVE-2025-29625,0,0,2789fe2f295f29006a288634af4b6a71684caac6787ee8b3e162e68148e9e87a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000
|
||||
CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f36a,2025-04-03T17:35:51.163000
|
||||
@ -288424,6 +288425,7 @@ CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b197
|
||||
CVE-2025-29722,0,0,c2715cdff8196b11c43847127c4be89ba492eca4d967a24c8f42239f2bf1bb9b,2025-04-17T20:21:05.203000
|
||||
CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000
|
||||
CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29743,1,1,fd88ac56ec279c04ba2ecf9660098a7ca99bd04251467912201a3cf1046b0ed7,2025-04-22T21:15:45.377000
|
||||
CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29766,0,0,d0d6c01c0aacc0172ff6cf10187bd4c58c9fb5a0b02e4e65dffc9f50e759cbe7,2025-04-01T20:26:22.890000
|
||||
@ -288703,10 +288705,10 @@ CVE-2025-30302,0,0,1f0821bf3db87f2e29aba98e8a21a65f00a9d06771dd8d94a7fd1957a407a
|
||||
CVE-2025-30303,0,0,37e41d6254a28709247792ec0435da284269977acc6baaa97cc1d38e4d389404,2025-04-11T13:07:32.547000
|
||||
CVE-2025-30304,0,0,5e1ccf97ac7b3627f1ce1ca05dedc6a032250253471a15afaad460e7426cfe2c,2025-04-11T13:07:27.190000
|
||||
CVE-2025-30305,0,0,030709280528173f51445234186741a6726494c1da3563e4d21740f81c197654,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30306,0,0,405803588c9e4a3ac9810eb4557134d476b704c4656e3fe123a51f81e02eda0d,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30307,0,0,26d5fbc75a103a1f6d08b87b9ae25170e152e46fa7044c01ff471c35d300ed70,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30308,0,0,e9a6fb7ee56043955d3edec7c0f1ce81f3665d653ed24fe4ca8b9226f354a15a,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30309,0,0,f8a5d1fe9cf73d5348dc894e9eccd84352353b2368dd54101c4a360e55b88933,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30306,0,1,ae4d5443df6b73dca0ab86a282db782ffe9d4fae115ac23a5a033d5bc5cd628c,2025-04-22T21:01:49.820000
|
||||
CVE-2025-30307,0,1,7830d7e21d62155bddc8802f094102c58a373b5f03838f6898f3e117b89eadb1,2025-04-22T21:00:48.530000
|
||||
CVE-2025-30308,0,1,c92d8023b3a04eb715f8eaa1b903bb6a800ec17c7c85ef2c351a7bd124c4f540,2025-04-22T21:00:10.810000
|
||||
CVE-2025-30309,0,1,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f73479945006c,2025-04-22T20:59:52.953000
|
||||
CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000
|
||||
CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000
|
||||
CVE-2025-3033,0,0,8def21998c2b2d3712dcfd8c779587a6dd338f31829b8436a6e15945baec01a3,2025-04-07T13:30:59.570000
|
||||
@ -289342,8 +289344,8 @@ CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27
|
||||
CVE-2025-3129,0,0,9ce9125356a6ba22d5c34f89147622c417a2440c2d1cce155406586438a1f6de,2025-04-15T15:16:09.733000
|
||||
CVE-2025-3130,0,0,2abf43bb001196273147b6a27c742bbd16b675243051ab2ef36e53893d26e0d3,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000
|
||||
CVE-2025-31327,1,1,5e2aa9f7b016b2992280f0efccf8c3d4e295945356f5750bd80acbef42d0515c,2025-04-22T19:15:52.420000
|
||||
CVE-2025-31328,1,1,1edf86ca9da646818b7f7f0df16fd8087dfeb4dccbb80f38159574affc4cfeb4,2025-04-22T19:15:52.570000
|
||||
CVE-2025-31327,0,0,5e2aa9f7b016b2992280f0efccf8c3d4e295945356f5750bd80acbef42d0515c,2025-04-22T19:15:52.420000
|
||||
CVE-2025-31328,0,0,1edf86ca9da646818b7f7f0df16fd8087dfeb4dccbb80f38159574affc4cfeb4,2025-04-22T19:15:52.570000
|
||||
CVE-2025-31330,0,0,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000
|
||||
CVE-2025-31331,0,0,48d6dcadbd283a08a1842391c0c9e47ce4c05f71de3f97bfd6b5e3101a4dda56,2025-04-08T18:13:53.347000
|
||||
CVE-2025-31332,0,0,3f108a9ac0319835d7c708da67bba48806ba6d1b5dc051eae9a5717ffd8b5266,2025-04-08T18:13:53.347000
|
||||
@ -290448,7 +290450,7 @@ CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1
|
||||
CVE-2025-32783,0,0,bc81c9de8402595febed39580cafb2667c56e41acbc3949fbfc1e4ff236670ed,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32787,0,0,0a2bd17619aed75112a50899477e42b7243972261fce166a2bc61513c4dc463d,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32788,1,1,45712582cf010f273e56bc925395cf51330e9da38ca066d22fade21e2810efd0,2025-04-22T18:15:59.630000
|
||||
CVE-2025-32788,0,0,45712582cf010f273e56bc925395cf51330e9da38ca066d22fade21e2810efd0,2025-04-22T18:15:59.630000
|
||||
CVE-2025-32789,0,0,2952171685fb5c2d3074478674ee27ef5c899b291b8ac46afb990284dbcbf1c9,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32790,0,0,d2afc4f20ddfe023e3c63f095880e030d3d9c60e7e6faa272a6018a16335e1d4,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32791,0,0,3e0fc58b653e9190a6f9caa237bd24767f5e47a0c987ac6c95d523951bbf37c1,2025-04-17T20:21:48.243000
|
||||
@ -290551,19 +290553,20 @@ CVE-2025-32947,0,0,7828728a338f6a5f0cd189b82f6c259598953d60a62c2ae393c218b24121e
|
||||
CVE-2025-32948,0,0,a96d86a4baf17a4ca162d7e5c669f325c2709d1929c09e18f959ed02e63890dc,2025-04-15T18:39:27.967000
|
||||
CVE-2025-32949,0,0,0222e90c2d9c0c527d7d2b4498ac4ab163dcc83fea67b69555f6b95c6916eee3,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3295,0,0,44684c8bbc4412f03baaaa00fb2b92baf541a4f8b5c29be1c475ac00329be00a,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32950,1,1,c5175c7ffcbde39c9195b8b79c0f180924ba0255c07660815a00ff748735b11a,2025-04-22T18:15:59.793000
|
||||
CVE-2025-32951,1,1,6af2ff44f55dc166132c80c48be04155411c2dbaf6f31911f0ad65decc9f8c00,2025-04-22T18:15:59.940000
|
||||
CVE-2025-32952,1,1,bb6d132ce9dd5325343c5c6afa891c64b9bee80e6f879af9cf6baa4a9bf0b329,2025-04-22T18:16:00.097000
|
||||
CVE-2025-32950,0,0,c5175c7ffcbde39c9195b8b79c0f180924ba0255c07660815a00ff748735b11a,2025-04-22T18:15:59.793000
|
||||
CVE-2025-32951,0,0,6af2ff44f55dc166132c80c48be04155411c2dbaf6f31911f0ad65decc9f8c00,2025-04-22T18:15:59.940000
|
||||
CVE-2025-32952,0,0,bb6d132ce9dd5325343c5c6afa891c64b9bee80e6f879af9cf6baa4a9bf0b329,2025-04-22T18:16:00.097000
|
||||
CVE-2025-32953,0,0,ee16bd22ecedf555e1015476c745971620128ebd4f8644190c86157fee5dd275,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32955,0,0,543e76041bd0710b8d09f18aaff6248473af5da951e22e36b639a77971c19932,2025-04-21T21:15:20.507000
|
||||
CVE-2025-32956,0,0,b18f057be19df8abf4a2ae63deabbac855e48282ae67f6961b3e87ac5dd909e1,2025-04-21T21:15:20.647000
|
||||
CVE-2025-32958,0,0,3044c0fff5837b0b100778a4f2043609cf25eeb2d02262388169473916f0f545,2025-04-21T21:15:20.780000
|
||||
CVE-2025-32959,1,1,885fb30060f916d6b59ea5e52e1aca6e05e18022fc67ca4f2329268187c9b6ff,2025-04-22T18:16:00.233000
|
||||
CVE-2025-32959,0,0,885fb30060f916d6b59ea5e52e1aca6e05e18022fc67ca4f2329268187c9b6ff,2025-04-22T18:16:00.233000
|
||||
CVE-2025-3296,0,0,54198f41d4e8cd1d251b2953d5a8024b88dcb2d38059cfa4e1e881de098e6e29,2025-04-08T16:49:21.037000
|
||||
CVE-2025-32960,1,1,67df623115a9330ffa869a79def2ead8b6aa9030be930d5f0da8ec02c41f040d,2025-04-22T18:16:00.380000
|
||||
CVE-2025-32961,1,1,b4b25147629446f8d9149f23555982a259165d34cbbed03b17d5e7499583f52d,2025-04-22T18:16:00.557000
|
||||
CVE-2025-32963,1,1,2fb654f5cf21e288fe64dfc7dbdb60b528118c3a8939cd53ed291fc9afca1a62,2025-04-22T18:16:00.710000
|
||||
CVE-2025-32964,1,1,610e9dfc4e710981d2be0d88ed6b99d6524b58917d8bf55ce24c8144a2abcd84,2025-04-22T18:16:00.847000
|
||||
CVE-2025-32960,0,0,67df623115a9330ffa869a79def2ead8b6aa9030be930d5f0da8ec02c41f040d,2025-04-22T18:16:00.380000
|
||||
CVE-2025-32961,0,0,b4b25147629446f8d9149f23555982a259165d34cbbed03b17d5e7499583f52d,2025-04-22T18:16:00.557000
|
||||
CVE-2025-32963,0,0,2fb654f5cf21e288fe64dfc7dbdb60b528118c3a8939cd53ed291fc9afca1a62,2025-04-22T18:16:00.710000
|
||||
CVE-2025-32964,0,0,610e9dfc4e710981d2be0d88ed6b99d6524b58917d8bf55ce24c8144a2abcd84,2025-04-22T18:16:00.847000
|
||||
CVE-2025-32965,1,1,d829b72a03a7e5f7d32b3eef65a9d9fac509a3d07cb2ffd244fd10694cf15e1a,2025-04-22T21:15:45.503000
|
||||
CVE-2025-3297,0,0,f3faf1e3ad604dfa1f7c47fce9497b7cd8333099ba83659c1904627c06ced289,2025-04-08T16:49:12.910000
|
||||
CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000
|
||||
CVE-2025-32987,0,0,22fee82644638daf52e45d25879682a7b8e6315d4283004fcb29ee09fc3f6bc1,2025-04-15T18:39:27.967000
|
||||
@ -290657,7 +290660,7 @@ CVE-2025-3398,0,0,819dc858f22f99096dfba4356b31ee59577b479c8ca03b51afbbbb0eac5c54
|
||||
CVE-2025-3399,0,0,feb74b6fb2a662d19abda10e01b3f11229d415dbdf4afe9748979f241aa09bf4,2025-04-09T14:14:00.427000
|
||||
CVE-2025-3400,0,0,cf8d2677c113eaba5cb7e83bc217fa3a16d8d96bb1f2d78546954dbd49132a47,2025-04-09T14:12:34.767000
|
||||
CVE-2025-3401,0,0,631e8a4259cdba906c225d1eb0133c66fa3c13f4e78b0d1bc5178acd11ac745f,2025-04-09T14:11:52.510000
|
||||
CVE-2025-3402,0,1,84d31b0a5aa5444678ef48824fd7a5d76057e15f22b858934256d08ba685e52e,2025-04-22T19:17:48.387000
|
||||
CVE-2025-3402,0,0,84d31b0a5aa5444678ef48824fd7a5d76057e15f22b858934256d08ba685e52e,2025-04-22T19:17:48.387000
|
||||
CVE-2025-34028,0,0,596740645ceb2273179750250cf6cd1ce6a46b5062c3ceb45a0c77665b52c278,2025-04-22T17:16:48.027000
|
||||
CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000
|
||||
CVE-2025-3404,0,0,d65d484def959ea284a0a94ace35d07ee5f9cd0d7bbdcb1abe5fdf5deea4317f,2025-04-21T14:23:45.950000
|
||||
@ -290812,6 +290815,7 @@ CVE-2025-3694,0,0,1269c09fef48fe02471385032c7206f0a0dd6c5c3c66dd5e4ca39fb34a0197
|
||||
CVE-2025-3696,0,0,32f2de58ed96b74775e2c60a486478c10d70019522c35cc3e9b072109db54b10,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3697,0,0,efc24626d60f226a7c8893f741d68acfce7ef4171b33da45528fa7fe06636210,2025-04-17T20:22:16.240000
|
||||
CVE-2025-3698,0,0,e16a05cc847cdbb9f29d781eb2e805da9b2d59762ca9b6e78e76572f2603e46d,2025-04-16T14:15:29.060000
|
||||
CVE-2025-37087,1,1,30f26552528309208a9ab74974666e81ba0fb9ec550afaf2c49d0e117a2d6e00,2025-04-22T21:15:45.650000
|
||||
CVE-2025-3723,0,0,b4760de84ab5ad290fe476e11df508c34a5e1ece7a524dc9b4dda1f2e95b557b,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3724,0,0,3604e5f95b0ccc5cf202d1d68d9ef517bcacb52e6bf4b156e6577be4c7c5f23e,2025-04-17T20:21:48.243000
|
||||
CVE-2025-3725,0,0,8ec71cb32939874b59fcf524cd8a7503311a419a9177764ff9a7d08a2f806b20,2025-04-17T20:21:48.243000
|
||||
@ -291067,13 +291071,13 @@ CVE-2025-43921,0,0,798d8b6c8eb0d7c9040162915ce26c146fd6dfacf2f7e2aafb2e83d008ba8
|
||||
CVE-2025-43922,0,0,516feb36455a0e1a2efa35ad7737f78a9bef9f727b0e9864d88747403a9ad2bf,2025-04-21T17:15:24.477000
|
||||
CVE-2025-43928,0,0,b7794970a7fba2c780763b79d9721286996df7833aaa44dab03799762dad71a2,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43929,0,0,e0076663fee82917b88ca6036343191b89bf0552232e6455fc1d01bd7dda069c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43946,1,1,fab8fae31f8938ebb8e788c2425d515862a522ff2210b5de051287bab2c33a64,2025-04-22T18:16:01.047000
|
||||
CVE-2025-43947,1,1,2188c3a07e9e00eedc333efeda85508f2f2454e46fe0dd5f319904c1a38cf880,2025-04-22T18:16:01.170000
|
||||
CVE-2025-43948,1,1,b2a066617d87957adce1fe2fa9b6cdd7fd88ec4e21255f28dd5e95e1eb2c6c3f,2025-04-22T18:16:01.277000
|
||||
CVE-2025-43949,1,1,be1b0794d6581da79a53630351adcb58c0e44f5b35aaf9a8d97940fc1c5a884d,2025-04-22T18:16:01.410000
|
||||
CVE-2025-43950,1,1,d0dbeb06fa01b79a931dc65d3266cfc84ae5dbf82a255be4e8130e8532ac2060,2025-04-22T18:16:01.517000
|
||||
CVE-2025-43951,1,1,18250258d8de954c8985cb9caeb8fb5415e20890ec31b977c03ff1f375ef25dd,2025-04-22T18:16:01.650000
|
||||
CVE-2025-43952,1,1,b9302ce3338dcb0a377bdd29b0daedc84fc24a066468f7c40516a8b284eca6b8,2025-04-22T18:16:01.773000
|
||||
CVE-2025-43946,0,0,fab8fae31f8938ebb8e788c2425d515862a522ff2210b5de051287bab2c33a64,2025-04-22T18:16:01.047000
|
||||
CVE-2025-43947,0,1,7948fd24644199d0197fb7632e221a99ff815f9ca313c2d891788e6b8fab5cb2,2025-04-22T21:15:45.750000
|
||||
CVE-2025-43948,0,1,2fc00f15b99b1cb95cc49e2b36377dfa21682bc434b85ded00d8f2c03e6d9e60,2025-04-22T21:15:45.887000
|
||||
CVE-2025-43949,0,0,be1b0794d6581da79a53630351adcb58c0e44f5b35aaf9a8d97940fc1c5a884d,2025-04-22T18:16:01.410000
|
||||
CVE-2025-43950,0,0,d0dbeb06fa01b79a931dc65d3266cfc84ae5dbf82a255be4e8130e8532ac2060,2025-04-22T18:16:01.517000
|
||||
CVE-2025-43951,0,0,18250258d8de954c8985cb9caeb8fb5415e20890ec31b977c03ff1f375ef25dd,2025-04-22T18:16:01.650000
|
||||
CVE-2025-43952,0,1,47911db6fc7107140a508e0c009dfcb13c313e48e850a900768d25e7ca4a2928,2025-04-22T21:15:46.017000
|
||||
CVE-2025-43954,0,0,b3104df5c7f361c68b90e4402b49fd04df6de2910ea8ad25e373c2346ed8890f,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43955,0,0,0ddacbd63e8808c6a5986d2d841519980ddaac82430d89d40d0727da574ee048,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43961,0,0,4b5f75971905d36dc0fec9884c8e3b473122197de61e89dd458186f08fbfec1e,2025-04-21T14:23:45.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user