mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-19T17:00:54.292989+00:00
This commit is contained in:
parent
69f5366a91
commit
808aa8c1f5
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2020-15945",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-24T21:15:34.553",
|
||||
"lastModified": "2024-11-21T05:06:30.630",
|
||||
"lastModified": "2025-02-19T15:15:10.830",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function."
|
||||
"value": "Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -113,6 +113,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.lua.org/bugs.html#5.4.0-8",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://lua-users.org/lists/lua-l/2020-07/msg00123.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-8889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-28T21:15:10.070",
|
||||
"lastModified": "2024-11-21T05:39:38.247",
|
||||
"lastModified": "2025-02-19T16:15:34.377",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2022-41545",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:13.450",
|
||||
"lastModified": "2025-02-18T18:15:13.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:11.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La interfaz web administrativa de NetGear C7800 router con la versi\u00f3n de firmware 6.01.07 (y posiblemente otras) autentica a los usuarios mediante autenticaci\u00f3n b\u00e1sica, con un encabezado HTTP que contiene un valor base64 del nombre de usuario y la contrase\u00f1a en texto plano. Debido a que el servidor web tampoco utiliza seguridad de transporte de manera predeterminada, esto hace que las credenciales administrativas sean vulnerables a escuchas clandestinas por parte de un adversario durante cada solicitud autenticada que realiza un cliente al router a trav\u00e9s de una red inal\u00e1mbrica (WLAN) o una red local (LAN), en caso de que el adversario pueda realizar un ataque de intermediario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Feb/12",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42447",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-04-02T21:15:08.120",
|
||||
"lastModified": "2024-11-21T07:24:59.133",
|
||||
"lastModified": "2025-02-19T16:15:35.533",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
16
CVE-2022/CVE-2022-462xx/CVE-2022-46283.json
Normal file
16
CVE-2022/CVE-2022-462xx/CVE-2022-46283.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2022-46283",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2025-02-19T15:15:12.163",
|
||||
"lastModified": "2025-02-19T15:15:12.163",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ""
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0272",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-27T16:15:07.937",
|
||||
"lastModified": "2024-11-21T07:36:52.310",
|
||||
"lastModified": "2025-02-19T16:15:35.833",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0395",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-27T16:15:08.133",
|
||||
"lastModified": "2024-11-21T07:37:06.467",
|
||||
"lastModified": "2025-02-19T15:15:12.247",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1087",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-27T16:15:09.610",
|
||||
"lastModified": "2024-11-21T07:38:26.007",
|
||||
"lastModified": "2025-02-19T16:15:35.997",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24308",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-28T21:15:10.710",
|
||||
"lastModified": "2024-11-27T20:11:45.410",
|
||||
"lastModified": "2025-02-19T16:15:36.167",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25261",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-27T21:15:11.053",
|
||||
"lastModified": "2024-11-21T07:49:21.750",
|
||||
"lastModified": "2025-02-19T16:15:36.610",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26071",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-28T20:15:13.343",
|
||||
"lastModified": "2024-11-21T07:50:43.147",
|
||||
"lastModified": "2025-02-19T16:15:37.047",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26549",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-03-27T22:15:21.910",
|
||||
"lastModified": "2024-11-21T07:51:43.687",
|
||||
"lastModified": "2025-02-19T16:15:37.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-233"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28597",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-03-27T21:15:12.260",
|
||||
"lastModified": "2024-11-21T07:55:38.240",
|
||||
"lastModified": "2025-02-19T16:15:37.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-501"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37977",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-07-27T15:15:11.207",
|
||||
"lastModified": "2024-11-21T08:12:37.607",
|
||||
"lastModified": "2025-02-19T16:29:43.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:coderex:wpfunnels:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:getwpfunnels:wpfunnels:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.17",
|
||||
"matchCriteriaId": "E568BF8E-23ED-4DDF-98C2-A57775D37F6F"
|
||||
"matchCriteriaId": "A9735C08-825F-4268-BE7B-33410F454A2C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12547",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-02-11T20:15:33.400",
|
||||
"lastModified": "2025-02-11T20:15:33.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T15:24:27.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1.1.2",
|
||||
"matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1681/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12548",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-02-11T20:15:33.537",
|
||||
"lastModified": "2025-02-11T20:15:33.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T15:24:20.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1.1.2",
|
||||
"matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1680/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12549",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2025-02-11T20:15:33.673",
|
||||
"lastModified": "2025-02-11T20:15:33.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T15:24:10.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1.1.2",
|
||||
"matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1679/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21685",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-06-18T17:15:51.243",
|
||||
"lastModified": "2024-11-21T08:54:51.630",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T16:00:53.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@atlassian.com",
|
||||
@ -39,22 +61,95 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.4.0",
|
||||
"versionEndExcluding": "9.4.21",
|
||||
"matchCriteriaId": "56BDAD3F-90AB-4008-A532-279EEA57B973"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.12.0",
|
||||
"versionEndExcluding": "9.12.8",
|
||||
"matchCriteriaId": "CFE49300-FB5D-4861-B287-D5656E3883DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.15.0",
|
||||
"versionEndExcluding": "9.16.0",
|
||||
"matchCriteriaId": "012C2A6D-F82F-4089-AC47-5D8E65BC6CCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.4.0",
|
||||
"versionEndExcluding": "9.4.21",
|
||||
"matchCriteriaId": "8D642873-2293-434C-94E2-488A95AB2770"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.12.0",
|
||||
"versionEndExcluding": "9.12.8",
|
||||
"matchCriteriaId": "DBC7CD6E-6B35-4DFB-B55A-69761C38C369"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211",
|
||||
"source": "security@atlassian.com"
|
||||
"source": "security@atlassian.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/JRASERVER-77713",
|
||||
"source": "security@atlassian.com"
|
||||
"source": "security@atlassian.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1409286211",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/JRASERVER-77713",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-287xx/CVE-2024-28776.json
Normal file
56
CVE-2024/CVE-2024-287xx/CVE-2024-28776.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-28776",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T16:15:38.870",
|
||||
"lastModified": "2025-02-19T16:15:38.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-287xx/CVE-2024-28777.json
Normal file
56
CVE-2024/CVE-2024-287xx/CVE-2024-28777.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-28777",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T16:15:39.363",
|
||||
"lastModified": "2025-02-19T16:15:39.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\nis vulnerable to unrestricted deserialization. This vulnerability allows users to execute arbitrary code, escalate privileges, or cause denial of service attacks by exploiting the unrestricted deserialization of types in the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-287xx/CVE-2024-28780.json
Normal file
56
CVE-2024/CVE-2024-287xx/CVE-2024-28780.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-28780",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T16:15:39.510",
|
||||
"lastModified": "2025-02-19T16:15:39.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 Rich Client\u00a0\n\n\n\n\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3564",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-01T04:15:08.743",
|
||||
"lastModified": "2024-11-21T09:29:53.153",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T16:09:31.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.1",
|
||||
"matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a0b8fe-d284-4780-84b5-2e97fa96c99a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5a0b8fe-d284-4780-84b5-2e97fa96c99a?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3565",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-01T04:15:09.000",
|
||||
"lastModified": "2024-11-21T09:29:53.280",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T16:08:35.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.1",
|
||||
"matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-post-widget/trunk/shortcode.php#L62",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=#file6",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16d8eab2-953a-46bf-a0f6-296bcea86305?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-post-widget/trunk/shortcode.php#L62",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078739%40custom-post-widget&new=3078739%40custom-post-widget&sfp_email=&sfph_mail=#file6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16d8eab2-953a-46bf-a0f6-296bcea86305?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43128",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T11:15:18.450",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T15:41:37.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wcproducttable:woocommerce_product_table:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "3.8.6",
|
||||
"matchCriteriaId": "FAF71D22-830B-404E-A7BA-AD2DE98D9F13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wc-product-table-lite/wordpress-woocommerce-product-table-lite-plugin-3-5-1-arbitrary-code-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-450xx/CVE-2024-45081.json
Normal file
56
CVE-2024/CVE-2024-450xx/CVE-2024-45081.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45081",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T16:15:39.740",
|
||||
"lastModified": "2025-02-19T16:15:39.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\ncould allow an authenticated user to modify restricted content due to incorrect authorization checks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-450xx/CVE-2024-45084.json
Normal file
56
CVE-2024/CVE-2024-450xx/CVE-2024-45084.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45084",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T16:15:39.900",
|
||||
"lastModified": "2025-02-19T16:15:39.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\ncould allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:25.667",
|
||||
"lastModified": "2025-02-18T18:15:25.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:13.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_metrics_ng() at prom_rw_prot.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Fluent Bit 3.1.9. Cuando el complemento de entrada de escritura remota de Prometheus se ejecuta y escucha en una direcci\u00f3n IP y un puerto, uno puede enviar un paquete con contenido-longitud: 0 y bloquea el servidor. La gesti\u00f3n inadecuada del caso cuando la longitud de contenido es 0 permite que un usuario (con acceso a el endpoint) realice un ataque remoto de denegaci\u00f3n de servicio. El bloqueo ocurre debido a una deserferencia de puntero nulo cuando 0 (desde la longitud del contenido) se pasa a la funci\u00f3n CFL_SDS_LEN, que a su vez intenta lanzar un puntero nulo en Struct CFL_SDS. Esto est\u00e1 relacionado con process_payload_metrics_ng () en PROM_RW_PROT.C."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluentbit.io/announcements/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50609",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:25.833",
|
||||
"lastModified": "2025-02-18T18:15:25.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:14.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Fluent Bit 3.1.9. Cuando el complemento de entrada OperTelemetry se ejecuta y escucha en una direcci\u00f3n IP y un puerto, uno puede enviar un paquete con contenido-longitud: 0 y bloquea el servidor. La gesti\u00f3n inadecuada del caso cuando la longitud de contenido es 0 permite que un usuario (con acceso a el endpoint) realice un ataque remoto de denegaci\u00f3n de servicio. El bloqueo ocurre debido a una deserferencia de puntero nulo cuando 0 (desde la longitud del contenido) se pasa a la funci\u00f3n CFL_SDS_LEN, que a su vez intenta lanzar un puntero nulo en Struct CFL_SDS. Esto est\u00e1 relacionado con process_payload_traces_proto_ng () en opentelemetry_prot.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluentbit.io/announcements/",
|
||||
|
56
CVE-2024/CVE-2024-529xx/CVE-2024-52902.json
Normal file
56
CVE-2024/CVE-2024-529xx/CVE-2024-52902.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52902",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-19T15:15:14.660",
|
||||
"lastModified": "2025-02-19T15:15:14.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183597",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53704",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2025-01-09T07:15:27.203",
|
||||
"lastModified": "2025-02-19T02:00:02.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T15:33:49.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +75,181 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.1-7040",
|
||||
"versionEndIncluding": "7.1.1-7058",
|
||||
"matchCriteriaId": "065DD610-7821-4A0E-9CC8-1255F1729126"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:7.1.2-7019:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0131B5D1-47FF-4A35-8983-7C08E021F7A4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sonicwall:sonicos:8.0.0-8035:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "495254B3-5733-467E-AAA0-A9D385328C8E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "129CC10F-E822-4BF7-9EB5-0D702020CB0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003",
|
||||
"source": "PSIRT@sonicwall.com"
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-55460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T17:15:19.013",
|
||||
"lastModified": "2025-02-18T17:15:19.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:14.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n SQL basada en the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una entrada manipulada espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ap0k4L1p5/CVE-research/tree/master/CVE-2024-55460",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-56882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:26.830",
|
||||
"lastModified": "2025-02-18T18:15:26.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:14.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sage DPW antes de 2024_12_000 es vulnerable a Cross Site Scripting (XSS). Los usuarios de SAGE de bajo privilegio con permisos de roles de empleados pueden almacenar permanentemente el c\u00f3digo JavaScript en los campos de entrada Kurstitel y Kurzinfo. El payload inyectado se ejecuta para cada usuario autenticado que ve e interact\u00faa con los elementos de datos modificados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cves.at/posts/cve-cve-2024-56882/writeup/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-56883",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T18:15:27.287",
|
||||
"lastModified": "2025-02-18T18:15:27.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:15.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SAGE DPW antes de 2024_12_001 es vulnerable al control de acceso incorrecto. Los controles de acceso basados ??en roles implementados no siempre se aplican en el lado del servidor. Los usuarios de SAGE de bajo privilegio con permisos de roles de empleados pueden crear cursos externos para otros empleados, a pesar de que no tienen la opci\u00f3n de hacerlo en la interfaz de usuario. Para hacer esto, una solicitud v\u00e1lida para crear un curso simplemente debe modificarse, de modo que la ID de usuario actual en el par\u00e1metro \"ID\" se reemplace con la ID de otro usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cves.at/posts/cve-cve-2024-56883/writeup/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.677",
|
||||
"lastModified": "2025-02-18T15:15:16.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T16:15:40.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el D-Link DIR-859 router con la versi\u00f3n de firmware A3 1.05 y antes permite a las personas no autorizadas evitar la autenticaci\u00f3n. Un atacante puede obtener un nombre de usuario y contrase\u00f1a forjando una solicitud de publicaci\u00f3n a la p\u00e1gina / getcfg.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/D-Link/DIR-859/ACL%20bypass%20Vulnerability%20in%20D-Link%20DIR-859.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57049",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.890",
|
||||
"lastModified": "2025-02-18T15:15:16.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:15.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el TP-Link Archer C20 router con la versi\u00f3n de firmware V6.6_230412 y antes permite a las personas no autorizadas evitar la autenticaci\u00f3n de algunas interfaces bajo el directorio /CGI. Al agregar referente: http://tplinkwifi.net a la solicitud, se reconocer\u00e1 que pasa la autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57050",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.977",
|
||||
"lastModified": "2025-02-18T15:15:16.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:15.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el TP-Link WR840N V6 router con el firmware Versi\u00f3n 0.9.1 4.16 y antes permite a las personas no autorizadas omitir la autenticaci\u00f3n de algunas interfaces en el directorio/CGI. Cuando agregue el referente: http://tplinkwifi.netnet. a la solicitud, se reconocer\u00e1 como aprobar la autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6458",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-27T09:15:02.123",
|
||||
"lastModified": "2024-11-21T09:49:41.607",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T15:38:25.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,32 +49,78 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wcproducttable:woocommerce_product_table:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "3.8.6",
|
||||
"matchCriteriaId": "FAF71D22-830B-404E-A7BA-AD2DE98D9F13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/presets/presets.php#L120",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3125858%40wc-product-table-lite&new=3125858%40wc-product-table-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e06fb465-4c72-49a8-af35-ff6d629ff9a0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/presets/presets.php#L120",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3125858%40wc-product-table-lite&new=3125858%40wc-product-table-lite&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e06fb465-4c72-49a8-af35-ff6d629ff9a0?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0108",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-02-12T21:15:16.290",
|
||||
"lastModified": "2025-02-19T02:00:02.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T15:33:43.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-18",
|
||||
@ -75,12 +97,287 @@
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.1.0",
|
||||
"versionEndExcluding": "10.1.14",
|
||||
"matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2.0",
|
||||
"versionEndExcluding": "10.2.7",
|
||||
"matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2.10",
|
||||
"versionEndExcluding": "10.2.12",
|
||||
"matchCriteriaId": "F9BD5E2D-61D2-4872-ACD1-D5B442CC809D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndExcluding": "11.1.6",
|
||||
"matchCriteriaId": "855047CA-ABFA-4F3D-AF98-245D14B75798"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.4",
|
||||
"matchCriteriaId": "7E4D3A51-0A40-4B19-AAFC-A2484B1CF5D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B41A7115-A370-49E1-B162-24803E6DD2CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65949A49-03A7-491C-B327-127F050AC4F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8ACB147-B4C1-4964-B538-EAA117CC6DC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6643574D-C024-440C-9392-004B7FA4498F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7422F37D-7ABA-4BEC-8448-45A8F585D6F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA91A4E9-CE1E-4CB8-B717-4B0E314C0171"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1311961A-0EF6-488E-B0C2-EDBD508587C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C889402F-138A-45B9-BBCF-91FD18A0B810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCC2A6DA-EB48-42CD-9234-A80C3F6AEFAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "046874F8-7DA7-4E2A-99BF-509424E6CCBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D33A0FB-7538-42BF-84E8-7CCD7EEF9355"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB95D77F-1263-4D47-A0BB-94A6DA937115"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EA4C2A7-18CD-4232-B08C-99BEFE497A57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357B747E-F960-4AA9-8696-B3BD89933630"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FDB3D90-6656-49C5-9852-1F987BAEF0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B871A6-0636-42A0-9573-6F693D7753AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FC63B8-B8D9-4EC1-85CA-2E12B38ACD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60CE628F-C4CB-4342-8D71-DE61A089B612"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52C50A07-F4D8-4F1F-BA61-3429BB1721BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01AD190-F3C2-4349-A063-8C5C78B725B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30F4CD1C-6862-4279-8D2D-40B4D164222F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A52B7A7A-483A-4075-B1E9-5C14B66F7FC3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0108",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0995",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-15T02:15:09.127",
|
||||
"lastModified": "2025-02-18T17:15:19.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:16.073",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0996",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-15T02:15:09.260",
|
||||
"lastModified": "2025-02-18T18:15:29.130",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:16.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +49,6 @@
|
||||
"value": "CWE-1007"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1007"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0997",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-15T02:15:09.377",
|
||||
"lastModified": "2025-02-18T18:15:29.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:16.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0998",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-15T02:15:09.483",
|
||||
"lastModified": "2025-02-18T18:15:29.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T15:15:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
141
CVE-2025/CVE-2025-14xx/CVE-2025-1465.json
Normal file
141
CVE-2025/CVE-2025-14xx/CVE-2025-1465.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-1465",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-19T16:15:40.667",
|
||||
"lastModified": "2025-02-19T16:15:40.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.2,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NeoVuln/CVE/issues/6",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.296238",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.296238",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.496877",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-201xx/CVE-2025-20153.json
Normal file
56
CVE-2025/CVE-2025-201xx/CVE-2025-20153.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-20153",
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2025-02-19T16:15:40.860",
|
||||
"lastModified": "2025-02-19T16:15:40.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device. \r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-mailpol-bypass-5nVcJZMw",
|
||||
"source": "psirt@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-201xx/CVE-2025-20158.json
Normal file
56
CVE-2025/CVE-2025-201xx/CVE-2025-20158.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-20158",
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2025-02-19T16:15:41.017",
|
||||
"lastModified": "2025-02-19T16:15:41.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-info-disc-YyxsWStK",
|
||||
"source": "psirt@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-202xx/CVE-2025-20211.json
Normal file
56
CVE-2025/CVE-2025-202xx/CVE-2025-20211.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-20211",
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2025-02-19T16:15:41.163",
|
||||
"lastModified": "2025-02-19T16:15:41.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-GDPgJ58P",
|
||||
"source": "psirt@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21387",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:37.337",
|
||||
"lastModified": "2025-02-11T18:15:37.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T16:55:39.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,111 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
|
||||
"matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
|
||||
"matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "CD88F667-6773-4DB7-B6C3-9C7B769C0808"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "B342EF98-B414-44D0-BAFB-FCA24294EECE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
|
||||
"matchCriteriaId": "1AC0C23F-FC55-4DA1-8527-EB4432038FB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
|
||||
"matchCriteriaId": "A719B461-7869-46D0-9300-D0A348DC26A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*",
|
||||
"matchCriteriaId": "0DF36AFA-B48C-4423-AD1C-78EEFF85EF2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:*",
|
||||
"matchCriteriaId": "19F65776-446D-404C-A830-990D4232791A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:*",
|
||||
"matchCriteriaId": "017875F7-5396-4069-9F9F-0BDA05143A25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:macos:*:*",
|
||||
"matchCriteriaId": "873BD998-9D5A-4C09-A3B3-4DB12ABB6F72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.0.10416.20058",
|
||||
"matchCriteriaId": "47336A7E-B09A-4CEA-B327-504598D63AD1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21387",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-22921",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.040",
|
||||
"lastModified": "2025-02-18T22:15:18.040",
|
||||
"lastModified": "2025-02-19T15:15:17.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg git-master,N-113007-g8d24a28d06 was discovered to contain a segmentation violation via the component /libavcodec/jpeg2000dec.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que FFMPEG GIT-Master, N-113007-G8D24A28D06 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente /LibavCodec/JPEG2000DEC.C."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/11393",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24373",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-04T19:15:33.680",
|
||||
"lastModified": "2025-02-04T19:15:33.680",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-19T15:45:13.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,28 +59,84 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpovernight:woocommerce_pdf_invoices\\&_packing_slips:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.0.0",
|
||||
"matchCriteriaId": "27C9E483-44CC-4B60-BF9F-E36BC382AD4B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wpovernight/woocommerce-pdf-invoices-packing-slips/commit/6daeff87f8a7f941f0f7cf4637f41d22c4428c30",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wpovernight/woocommerce-pdf-invoices-packing-slips/security/advisories/GHSA-3j9m-cp35-94fr",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25343",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-12T19:15:22.003",
|
||||
"lastModified": "2025-02-12T19:15:22.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-19T16:41:43.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,79 @@
|
||||
"value": "El firmware Tenda AC6 V15.03.05.16 tiene una vulnerabilidad de desbordamiento de b\u00fafer en la funci\u00f3n formexeCommand."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F60AFD7-74AF-4CA2-8232-2858D5AD023A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wy876/cve/issues/4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25467",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.373",
|
||||
"lastModified": "2025-02-18T22:15:18.373",
|
||||
"lastModified": "2025-02-19T15:15:17.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient tracking and releasing of allocated used memory in libx264 git master allows attackers to execute arbitrary code via creating a crafted AAC file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El seguimiento y la liberaci\u00f3n insuficientes de la memoria utilizada asignada en Libx264 Git Master permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la creaci\u00f3n de un archivo manipulado AAC."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code.videolan.org/videolan/x264/-/issues/75",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.477",
|
||||
"lastModified": "2025-02-18T22:15:18.477",
|
||||
"lastModified": "2025-02-19T15:15:17.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg git-master before commit d5873b was discovered to contain a memory leak in the component libavutil/mem.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que FFMPEG Git-Master antes de commit D5873B conten\u00eda una fuga de memoria en el componente Libavutil/Mem.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/d5873be583ada9e1fb887e2fe8dcfd4b12e0efcd",
|
||||
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.693",
|
||||
"lastModified": "2025-02-18T22:15:18.693",
|
||||
"lastModified": "2025-02-19T16:15:41.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01, activado por los par\u00e1metros de destino, m\u00e1scara de red y puerta de enlace. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_4.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25892",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.803",
|
||||
"lastModified": "2025-02-18T22:15:18.803",
|
||||
"lastModified": "2025-02-19T16:15:41.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the sstartip, sendip, dstartip, and dendip parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros SSTARTIP, SendIP, DSTARTIP y DENDIP. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link%20DSL-3782_3.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25893",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:18.920",
|
||||
"lastModified": "2025-02-18T22:15:18.920",
|
||||
"lastModified": "2025-02-19T16:15:41.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inIP, insPort, inePort, exsPort, exePort, and protocol parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros INIP, INSPORT, Informe, Export, Exeport y Protocol. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_2_en.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25894",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:19.040",
|
||||
"lastModified": "2025-02-18T22:15:19.040",
|
||||
"lastModified": "2025-02-19T16:15:41.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the samba_wg and samba_nbn parameters. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros Samba_WG y Samba_NBN. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_1_en.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:19.163",
|
||||
"lastModified": "2025-02-18T22:15:19.163",
|
||||
"lastModified": "2025-02-19T16:15:42.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the public_type parameter. This vulnerability allows attackers to execute arbitrary operating system (OS) commands via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comando OS en D-Link DSL-3782 V1.01 a trav\u00e9s del par\u00e1metro public_type. Esta vulnerabilidad permite a los atacantes ejecutar los comandos de operaci\u00f3n arbitraria sistema (OS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/CJ_in_D-Link_DSL-3782_3_en.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T22:15:19.277",
|
||||
"lastModified": "2025-02-18T22:15:19.277",
|
||||
"lastModified": "2025-02-19T16:15:42.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destination, netmask, and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer en D-Link DSL-3782 V1.01 a trav\u00e9s de los par\u00e1metros de destino, m\u00e1scara de red y puerta de enlace. Esta vulnerabilidad permite a los atacantes causar una denegaci\u00f3n de servicio (DOS) a trav\u00e9s de un paquete manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/BOF_in_D-Link_DSL-3782_5.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-26465",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-18T19:15:29.230",
|
||||
"lastModified": "2025-02-19T05:15:12.440",
|
||||
"lastModified": "2025-02-19T15:15:18.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en OpenSSH cuando la opci\u00f3n VerifyHostKeyDNS est\u00e1 habilitada. Un ataque de m\u00e1quina en el medio puede ser realizado mediante una m\u00e1quina maliciosa que se hace pasar por un servidor leg\u00edtimo. Este problema ocurre debido a c\u00f3mo los c\u00f3digos de error de OpenSSH Mishandles en condiciones espec\u00edficas al verificar la clave del host. Para que un ataque se considere exitoso, el atacante debe lograr agotar el recurso de memoria del cliente primero, lo que gira la complejidad del ataque."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -99,6 +103,10 @@
|
||||
{
|
||||
"url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/oss-sec/2025/q1/144",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-19T15:01:15.588634+00:00
|
||||
2025-02-19T17:00:54.292989+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-19T14:15:30.337000+00:00
|
||||
2025-02-19T16:55:39.487000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281791
|
||||
281802
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2025-1464](CVE-2025/CVE-2025-14xx/CVE-2025-1464.json) (`2025-02-19T14:15:30.337`)
|
||||
- [CVE-2022-46283](CVE-2022/CVE-2022-462xx/CVE-2022-46283.json) (`2025-02-19T15:15:12.163`)
|
||||
- [CVE-2024-28776](CVE-2024/CVE-2024-287xx/CVE-2024-28776.json) (`2025-02-19T16:15:38.870`)
|
||||
- [CVE-2024-28777](CVE-2024/CVE-2024-287xx/CVE-2024-28777.json) (`2025-02-19T16:15:39.363`)
|
||||
- [CVE-2024-28780](CVE-2024/CVE-2024-287xx/CVE-2024-28780.json) (`2025-02-19T16:15:39.510`)
|
||||
- [CVE-2024-45081](CVE-2024/CVE-2024-450xx/CVE-2024-45081.json) (`2025-02-19T16:15:39.740`)
|
||||
- [CVE-2024-45084](CVE-2024/CVE-2024-450xx/CVE-2024-45084.json) (`2025-02-19T16:15:39.900`)
|
||||
- [CVE-2024-52902](CVE-2024/CVE-2024-529xx/CVE-2024-52902.json) (`2025-02-19T15:15:14.660`)
|
||||
- [CVE-2025-1465](CVE-2025/CVE-2025-14xx/CVE-2025-1465.json) (`2025-02-19T16:15:40.667`)
|
||||
- [CVE-2025-20153](CVE-2025/CVE-2025-201xx/CVE-2025-20153.json) (`2025-02-19T16:15:40.860`)
|
||||
- [CVE-2025-20158](CVE-2025/CVE-2025-201xx/CVE-2025-20158.json) (`2025-02-19T16:15:41.017`)
|
||||
- [CVE-2025-20211](CVE-2025/CVE-2025-202xx/CVE-2025-20211.json) (`2025-02-19T16:15:41.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `48`
|
||||
|
||||
- [CVE-2024-13603](CVE-2024/CVE-2024-136xx/CVE-2024-13603.json) (`2025-02-19T14:15:29.070`)
|
||||
- [CVE-2024-55460](CVE-2024/CVE-2024-554xx/CVE-2024-55460.json) (`2025-02-19T15:15:14.810`)
|
||||
- [CVE-2024-56882](CVE-2024/CVE-2024-568xx/CVE-2024-56882.json) (`2025-02-19T15:15:14.970`)
|
||||
- [CVE-2024-56883](CVE-2024/CVE-2024-568xx/CVE-2024-56883.json) (`2025-02-19T15:15:15.140`)
|
||||
- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-19T16:15:40.317`)
|
||||
- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-19T15:15:15.297`)
|
||||
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-19T15:15:15.460`)
|
||||
- [CVE-2024-6458](CVE-2024/CVE-2024-64xx/CVE-2024-6458.json) (`2025-02-19T15:38:25.183`)
|
||||
- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-19T15:33:43.727`)
|
||||
- [CVE-2025-0995](CVE-2025/CVE-2025-09xx/CVE-2025-0995.json) (`2025-02-19T15:15:16.073`)
|
||||
- [CVE-2025-0996](CVE-2025/CVE-2025-09xx/CVE-2025-0996.json) (`2025-02-19T15:15:16.243`)
|
||||
- [CVE-2025-0997](CVE-2025/CVE-2025-09xx/CVE-2025-0997.json) (`2025-02-19T15:15:16.407`)
|
||||
- [CVE-2025-0998](CVE-2025/CVE-2025-09xx/CVE-2025-0998.json) (`2025-02-19T15:15:16.563`)
|
||||
- [CVE-2025-21387](CVE-2025/CVE-2025-213xx/CVE-2025-21387.json) (`2025-02-19T16:55:39.487`)
|
||||
- [CVE-2025-22921](CVE-2025/CVE-2025-229xx/CVE-2025-22921.json) (`2025-02-19T15:15:17.497`)
|
||||
- [CVE-2025-24373](CVE-2025/CVE-2025-243xx/CVE-2025-24373.json) (`2025-02-19T15:45:13.197`)
|
||||
- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-02-19T16:41:43.887`)
|
||||
- [CVE-2025-25467](CVE-2025/CVE-2025-254xx/CVE-2025-25467.json) (`2025-02-19T15:15:17.760`)
|
||||
- [CVE-2025-25468](CVE-2025/CVE-2025-254xx/CVE-2025-25468.json) (`2025-02-19T15:15:17.930`)
|
||||
- [CVE-2025-25891](CVE-2025/CVE-2025-258xx/CVE-2025-25891.json) (`2025-02-19T16:15:41.447`)
|
||||
- [CVE-2025-25892](CVE-2025/CVE-2025-258xx/CVE-2025-25892.json) (`2025-02-19T16:15:41.600`)
|
||||
- [CVE-2025-25893](CVE-2025/CVE-2025-258xx/CVE-2025-25893.json) (`2025-02-19T16:15:41.763`)
|
||||
- [CVE-2025-25894](CVE-2025/CVE-2025-258xx/CVE-2025-25894.json) (`2025-02-19T16:15:41.930`)
|
||||
- [CVE-2025-25895](CVE-2025/CVE-2025-258xx/CVE-2025-25895.json) (`2025-02-19T16:15:42.087`)
|
||||
- [CVE-2025-25896](CVE-2025/CVE-2025-258xx/CVE-2025-25896.json) (`2025-02-19T16:15:42.240`)
|
||||
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-19T15:15:18.090`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
111
_state.csv
111
_state.csv
@ -150864,7 +150864,7 @@ CVE-2020-15941,0,0,316133f07e747270dbe1bcf74640bb1e4539ff86ac91d78b40140d27c7b88
|
||||
CVE-2020-15942,0,0,fd765f4f6fdee3e38c767d5360336c56de7456500d385eae2ccd3c1f13ae94c3,2024-11-21T05:06:30.160000
|
||||
CVE-2020-15943,0,0,1077569aef5b422e28951f70ce74868b45a9b7f0ea189b085043157664a0fb46,2024-11-21T05:06:30.297000
|
||||
CVE-2020-15944,0,0,2647fc36902ab1d128b50a1a03b7d60db7477215b94312f662ff09c97b5258f9,2024-11-21T05:06:30.453000
|
||||
CVE-2020-15945,0,0,d7e915d51c60a38bf74b932b9403e757ab75d685f1e708be3fe6551d2279dd0d,2024-11-21T05:06:30.630000
|
||||
CVE-2020-15945,0,1,9d1c09ec914509fd135b69851ee64d76449773a5eb30f5d04818ec78edab02c6,2025-02-19T15:15:10.830000
|
||||
CVE-2020-15947,0,0,667bfce3a94767a1f1c5f2893b06292fd6889aa7598b29c44f9b9dd44d585646,2024-11-21T05:06:30.793000
|
||||
CVE-2020-15948,0,0,088cf0a2a1c253d994d11a8870cfe02bf02a87f7657536530c5f1507fe162862,2024-11-21T05:06:30.940000
|
||||
CVE-2020-15949,0,0,6cc978f2b3a136a9065ff44d0c6a13de25c4322e7f0330b746dfc9083f7afdf1,2024-11-21T05:06:31.090000
|
||||
@ -163932,7 +163932,7 @@ CVE-2020-8882,0,0,760301fbf1983b445a350f2ee2de69c3f7f4391ec2dd2ff389c5086ed1ba4b
|
||||
CVE-2020-8883,0,0,140fa782b1c2263a234690cdd5e1939d58c1bd17c1d9c69127aaea545b73f3e7,2024-11-21T05:39:37.873000
|
||||
CVE-2020-8884,0,0,62c3d0d5605748bf18cc10a39f4965c42d1cd3232e3e2766291378613f8bacfa,2024-11-21T05:39:37.993000
|
||||
CVE-2020-8887,0,0,3f8976eaa1b0ccbadce9faa5eb643903c040ba1911bed14f12f698edfad33e15,2024-11-21T05:39:38.127000
|
||||
CVE-2020-8889,0,0,2ee94604281535263fcb1d117a9f4dc088ccc728deca4bdc3d771109d80e80c4,2024-11-21T05:39:38.247000
|
||||
CVE-2020-8889,0,1,72d0e240bbd0af9b84b64f987c3a97cbcde0ebfab791b0b1cd1eb5746a8b0b02,2025-02-19T16:15:34.377000
|
||||
CVE-2020-8890,0,0,a46877426bca4d412baefde37339ae29e5fa6fa91fc5e75288d89f5da2f02f5b,2024-11-21T05:39:38.383000
|
||||
CVE-2020-8891,0,0,492549d24e4839b58b1379241fb724c6b6815a7e72e8622ba9276406641efb6a,2024-11-21T05:39:38.517000
|
||||
CVE-2020-8892,0,0,b8a98504cda6b21e33316183827bd43f8aca5a4d422b276a5901ee1dd547e061,2024-11-21T05:39:38.640000
|
||||
@ -207598,7 +207598,7 @@ CVE-2022-41540,0,0,0835f451e4365b2ba89b1d7b967d89d4dd5dc079f33fca09331bff3bc262e
|
||||
CVE-2022-41541,0,0,00e52175bebb5443f9ce3da1abf7765314cf802ecb11e4a93b1fe3d7e8087047,2024-11-21T07:23:21.950000
|
||||
CVE-2022-41542,0,0,8fc7301d48c78688e1f0813f0699c56fa4214aeaacc0eee0cbdaeba78bf09c2b,2024-11-21T07:23:22.110000
|
||||
CVE-2022-41544,0,0,1fe2c736ec60ca94bc01e4d892da5a8b005e452379dc8b2a17138c769a86955a,2024-11-21T07:23:22.273000
|
||||
CVE-2022-41545,0,0,13129666988195e0c1b41db8bb41b2f22e29a6a85c7df4577bb12055b07adb41,2025-02-18T18:15:13.450000
|
||||
CVE-2022-41545,0,1,8a1193452b325e538f725383b3b190b68c18fcf1d0ec9aec7dad4896946d65a1,2025-02-19T15:15:11.890000
|
||||
CVE-2022-41547,0,0,1d064e47065a065d677a23b5cabaadf74eb0a67a027ac98d2d0675b1107c294f,2024-11-21T07:23:22.430000
|
||||
CVE-2022-4155,0,0,2d65b604119b329133f9f2c1484c9bf55ce99c29c3775bcdd528e10d29f39beb,2024-11-21T07:34:41.050000
|
||||
CVE-2022-41550,0,0,3a6240656d5395b782af363482d974d3bf61a1eb38881afd5e24851fdc41727b,2024-11-21T07:23:22.563000
|
||||
@ -208396,7 +208396,7 @@ CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1
|
||||
CVE-2022-42444,0,0,b6a005bbc9248f0ccd336983da93f006a5d7ff4ae1a55f8166d0ea2956c4cdd4,2024-11-21T07:24:58.767000
|
||||
CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000
|
||||
CVE-2022-42446,0,0,42971664056387c462ee497f548a6df2aa4c23ac4c265a4511e389c929317b52,2024-11-21T07:24:59.017000
|
||||
CVE-2022-42447,0,0,f7ef42af5c8cacb5fc0ea44780f55cb655e5af2c0cb4eb0afa493b27973c84d4,2024-11-21T07:24:59.133000
|
||||
CVE-2022-42447,0,1,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33983,2025-02-19T16:15:35.533000
|
||||
CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000
|
||||
CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc438191a,2024-11-21T07:24:59.253000
|
||||
CVE-2022-42452,0,0,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000
|
||||
@ -211079,6 +211079,7 @@ CVE-2022-46279,0,0,c0524a481a84e69897a8224d4241ee3b2fb6035a71327b697a073dc31891e
|
||||
CVE-2022-4628,0,0,af23e6e9e565780759bdf59d3b766a635ad57b4fb21c2728e54741b055019c83,2024-11-21T07:35:37.590000
|
||||
CVE-2022-46280,0,0,abeb67f7e3dd286f90e79c3e35df9e3bf3b9629711af7006bc94b23dc65a2e27,2024-11-21T07:30:18.347000
|
||||
CVE-2022-46282,0,0,9c36d4ca9968a01130382cc6e2a7ddac6b9b823837d34fe0c53147dc3f4f259b,2024-11-21T07:30:18.477000
|
||||
CVE-2022-46283,1,1,fc9cd7fd472108d96bf30f96ddc0a3f6a1df6cbb0d2ebd6ce0baef4506134ca2,2025-02-19T15:15:12.163000
|
||||
CVE-2022-46285,0,0,aa9498ffc3f606f2ebf9c85686190d94cc96fd79334ec854f8b7fb58c6f566c8,2024-11-21T07:30:18.587000
|
||||
CVE-2022-46286,0,0,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000
|
||||
CVE-2022-46287,0,0,797a4cd550a55f760e45973c53ef155fb1f9ed748b322d3cdec94808ffcf1039,2024-11-21T07:30:18.830000
|
||||
@ -213450,7 +213451,7 @@ CVE-2023-0268,0,0,f64be44cc2f1cc4aab5e750e0089c06b552b7b898fea44c492c7e2224b1d92
|
||||
CVE-2023-0269,0,0,a1444d79e87c3f19fbb848742fc9b600d4a4d1c593b1876129c5e0fadfa12980,2023-11-07T04:00:01.967000
|
||||
CVE-2023-0270,0,0,44aab63ef7829127e706952e5b29c0e3a500353ef14558bd4aed6ac87298a3df,2024-11-21T07:36:52.103000
|
||||
CVE-2023-0271,0,0,280857f7e76f082e2308a9504393a6f865c612ddaf8e3f42d53348f7b2e17b48,2024-11-21T07:36:52.207000
|
||||
CVE-2023-0272,0,0,c3fed8d82e83da48a3e216f3b32134e1e4bb1d193d67e653dab8cef4627b3048,2024-11-21T07:36:52.310000
|
||||
CVE-2023-0272,0,1,8cd4e52f99cf8a13645e6c557ee4ad623eb5eb6ffc07148d46993dcb8c7e4d8e,2025-02-19T16:15:35.833000
|
||||
CVE-2023-0273,0,0,553ef5fecb4d12fa8908e7c59734b6003c708dafeededc42fea002576f9be692,2024-11-21T07:36:52.420000
|
||||
CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923b1,2024-11-21T07:36:52.540000
|
||||
CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000
|
||||
@ -213570,7 +213571,7 @@ CVE-2023-0389,0,0,d3a6859917d00580d863b1cc40656754ef4aae3a0ed0d7ace8ca00904f8449
|
||||
CVE-2023-0391,0,0,1501c977f283445a69e6f9019d5860be42bcb8f727bac9d69151b20436d7b38a,2024-11-21T07:37:06.020000
|
||||
CVE-2023-0392,0,0,8a7a998dac312487f8c5dc9b83d0872c5c624db0d1b91b751bbaa7822fdc6d5c,2024-11-21T07:37:06.157000
|
||||
CVE-2023-0394,0,0,8e170d43769bdc6718a413799d76d2e93b3416a224594f7b7909d6519f5a0fd9,2024-11-21T07:37:06.357000
|
||||
CVE-2023-0395,0,0,f125c9f31604af451f899bd7193354b52939b6afd7fc3ace2403e10701ae3aac,2024-11-21T07:37:06.467000
|
||||
CVE-2023-0395,0,1,e433e7fd12f29bb1b0de0990175e4e13bce1ca11a518d400756db9b100437213,2025-02-19T15:15:12.247000
|
||||
CVE-2023-0396,0,0,1be377631e714aa8ef92ed0548b0b781bbd48621034c742f01ad91bc2f7fcec5,2024-11-21T07:37:06.553000
|
||||
CVE-2023-0397,0,0,197e26da31aa22aa78ea48679e09ec7e4621676cd3604c156afc4fc6e8a9016b,2024-11-21T07:37:06.663000
|
||||
CVE-2023-0398,0,0,1bdb79d7f8a1c75d76e45aa839cc0b3441f9c1e80e145655a7239327b2d21196,2024-11-21T07:37:06.783000
|
||||
@ -214230,7 +214231,7 @@ CVE-2023-1082,0,0,8a2e328849f17fd1cbd56866852cd4f83b58a7e1ff9cccc709c4c01e721a13
|
||||
CVE-2023-1083,0,0,6cdb352010bf358cca6b6fd80a82d46cce6e7e3b2e6e7ffbbcb5ff7d5d576245,2024-11-21T07:38:25.657000
|
||||
CVE-2023-1084,0,0,48b58b60e206fa97248d6540f42cceb638a3e9e11db42dcef4234c21004718fa,2024-11-21T07:38:25.783000
|
||||
CVE-2023-1086,0,0,88f958cd195c9bf703efdb1102b9fdb3d47333293a12d131cae45eb1e45d8b66,2024-11-21T07:38:25.900000
|
||||
CVE-2023-1087,0,0,1bf076f603a138cbaeddd3d92ecaafe8fa8f46aed4a304e459e14ba09447cb5d,2024-11-21T07:38:26.007000
|
||||
CVE-2023-1087,0,1,17b8809374a7f3a30453e807acad3567e7cce9051b365c7114024afd5cfd7719,2025-02-19T16:15:35.997000
|
||||
CVE-2023-1088,0,0,5b368a55ce07ac1d06b780775d8740c95a03e48b4833c0cf4d35c043789a6b25,2024-11-21T07:38:26.110000
|
||||
CVE-2023-1089,0,0,aece4f9db6b729d86971ca0a83e6e576e4e8b8198bf1a236076f4e122b97db91,2024-11-21T07:38:26.220000
|
||||
CVE-2023-1090,0,0,25ccd715dcee0b5e820863482b71b2db6e4170920235173f327ff4b5f16e78ed,2025-01-30T15:15:12.147000
|
||||
@ -218747,7 +218748,7 @@ CVE-2023-24294,0,0,3e42f9b86751e812a6b22510e56d8d1be93e046cdaadd881a9a597ba3368c
|
||||
CVE-2023-24295,0,0,ef678c92680f783e4697256b62662f890905cb8a683c3e297ed97c828d80ca05,2024-11-21T07:47:39.600000
|
||||
CVE-2023-2430,0,0,d2de35d69d271af428fae047914fe84dc583fa132e638105a42bb1fe4a236b56,2024-11-21T07:58:36.330000
|
||||
CVE-2023-24304,0,0,cb73a3f62e0e814b15ae752098a3c12af36abb8672c526acd7ddd13d1756a276,2025-02-18T21:15:14.497000
|
||||
CVE-2023-24308,0,0,132607664ad1d23be8c98374207e3ef0b59fdbe4f8068ceedbf32fa29d0e1e8c,2024-11-27T20:11:45.410000
|
||||
CVE-2023-24308,0,1,261a6fc910071de82649c37f9ea8f42bc494f40254f4dd6b2a8f2efe7e72897e,2025-02-19T16:15:36.167000
|
||||
CVE-2023-2431,0,0,939019fa791b41f7ce813012de1be4013166d78534d82797ca097ddd1a2cf895,2024-12-12T16:15:07.937000
|
||||
CVE-2023-24317,0,0,e29969d3a23798cc443209fa7bb8c1eb64c8e7198066188a12f9c9059c1580ca,2024-11-21T07:47:40.047000
|
||||
CVE-2023-24320,0,0,88d18ffd50e18e72b2968c835f76418a06ef2d31bebcf67d9fd951974ecca640,2024-11-21T07:47:40.207000
|
||||
@ -219562,7 +219563,7 @@ CVE-2023-25240,0,0,8f54673119014de0cf874ed053cc6287359d4b3be00312c798c43582a5652
|
||||
CVE-2023-25241,0,0,67b4d369c111bf4f1d66e72210ff14d8c3ad87005bca819dcaa6cf536b263cec,2024-11-21T07:49:21.470000
|
||||
CVE-2023-2526,0,0,83a6e1bd2b311cdea94a91c8eb16d11460c455967c5836d864793aaa675bd321,2024-11-21T07:58:46.693000
|
||||
CVE-2023-25260,0,0,4a614a2e591eec4584ea26d7cd95b48750f2c422b719c4697d00c026f2dd3aa3,2024-11-21T07:49:21.600000
|
||||
CVE-2023-25261,0,0,954be861272aab0103f5b783d5c8ebc888a0ae4de8806b95a78165f75e74581b,2024-11-21T07:49:21.750000
|
||||
CVE-2023-25261,0,1,d0c01fdead219b1a29a1bb92f7c51c59d5ddf06755d9d3a4ec4d5696dc672c95,2025-02-19T16:15:36.610000
|
||||
CVE-2023-25262,0,0,e01c46f1dfe46c641eb2792f44c94a854ea88a5edad1adfdb91ee0f8a079b78a,2024-11-21T07:49:21.887000
|
||||
CVE-2023-25263,0,0,4aad64f11ab2e0d4864dacc1cf8195140394e8e4cde0cfdba908ca1250f80377,2024-11-21T07:49:22.017000
|
||||
CVE-2023-25264,0,0,2610d9b0200f89f1533e61a73d97d3ca4968e7fb5865b80d7dc66d773cd6e133,2024-11-21T07:49:22.163000
|
||||
@ -220245,7 +220246,7 @@ CVE-2023-26068,0,0,96b0474e6b0530af2a94f966df9aa91c8175a9c796b94a701b1ff11ca4de4
|
||||
CVE-2023-26069,0,0,631c8f88f1a4dd1fd2f501bf884ec606e9d6258b115a0f0eb7ca849e33f9224f,2025-02-11T17:15:18.767000
|
||||
CVE-2023-2607,0,0,8a51963de6118faad9fde06680ce4f3059019d6fa4eea1a90d537fe832bc1689,2024-11-21T07:58:55.320000
|
||||
CVE-2023-26070,0,0,c6d3e24b76db782ea5dfbf14a6fa5b089603bcdb26537770fcc7280455853434,2025-02-11T17:15:18.973000
|
||||
CVE-2023-26071,0,0,5154a987dd0852eb70cf9493d6fab4e7e866585d7703915d8a3a71c7ed4dba9c,2024-11-21T07:50:43.147000
|
||||
CVE-2023-26071,0,1,493e7f7c88ca2c6b9a22a9c6fc7a7b93caf675e845d4a80066f817e0fd795ba1,2025-02-19T16:15:37.047000
|
||||
CVE-2023-26072,0,0,9d71983155b48b93297e485003e5f4e2c8c9af23e3b1c25eaac392689190da58,2024-11-21T07:50:43.300000
|
||||
CVE-2023-26073,0,0,09741fb39b8701f0e3ef5d6844c8639a00c99dafca00486c4a66b5d1ea134140,2024-11-21T07:50:43.503000
|
||||
CVE-2023-26074,0,0,092c9a1c1dbd0756517e1ac3fb0f8ee7d519a46f4fb62e08023ac22b64cc30d2,2024-11-21T07:50:43.673000
|
||||
@ -220671,7 +220672,7 @@ CVE-2023-26545,0,0,1d9c5b408545561ebf2e57b9522fb341349c8f213c493e1f45b0d2bef5a27
|
||||
CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000
|
||||
CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000
|
||||
CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000
|
||||
CVE-2023-26549,0,0,5fb573b8f7d9c3c2254d4f606c48e3d110e862f458319abda4e4af6f4fe35c19,2024-11-21T07:51:43.687000
|
||||
CVE-2023-26549,0,1,44aa03ba6acd1f861df698ee700bcec65c6a7d8a8c2873b9daabadf39c03e646,2025-02-19T16:15:37.410000
|
||||
CVE-2023-2655,0,0,cce4b162ab8d62fcc91a619d3bce954e1e0e2f88f574cdb225963bbbae6a32d5,2024-11-21T07:59:00.920000
|
||||
CVE-2023-26550,0,0,eac8becbb971c7f2b1dba085f0bda79896b409e69e5ebb04c35f29e9667e385e,2024-11-21T07:51:43.797000
|
||||
CVE-2023-26551,0,0,19285d4c365de723708be6cbc1e7f79d2014f0d371b05a3a995b101fcc929401,2025-02-11T16:15:35.570000
|
||||
@ -222312,7 +222313,7 @@ CVE-2023-28587,0,0,e5b6282e738e5d19ccb5f55a598e3c32e8faa54e21b42e464fc376fb81298
|
||||
CVE-2023-28588,0,0,5805be962185e961ac970f064c2c708f7d361e7cfde8aa227b01b86afed3718e,2024-11-21T07:55:37.720000
|
||||
CVE-2023-2859,0,0,00dcfdda188e2fef6d8273102c208354e6b1df95224d2a8e536f36196496917d,2024-11-21T07:59:26.250000
|
||||
CVE-2023-28596,0,0,1466d5430089bee402d6ce0293208bfefeacc0572580c63c6c7da590d42ce100,2024-11-21T07:55:38.100000
|
||||
CVE-2023-28597,0,0,069fb17c752de126d5768052f77efb83cccba636aba8c2f9e0a6fd383e4bb4b7,2024-11-21T07:55:38.240000
|
||||
CVE-2023-28597,0,1,de40c72959168abf1573f66d2dc803c0618bea2a43e062bae8b40b669eb60cbc,2025-02-19T16:15:37.990000
|
||||
CVE-2023-28598,0,0,8e5dd64cfbb10f7411c3be92c9a671dc5bbc40963b8b2d07a11e581d7a0644d2,2024-11-21T07:55:38.410000
|
||||
CVE-2023-28599,0,0,93e0bf9600a6811f98f3ebf7b273e893a2192fcf1fd74e06248ea26acc55169d,2024-11-21T07:55:38.560000
|
||||
CVE-2023-2860,0,0,047b636c3b3088a6bdd08b049a712e9bb76b6fb5df3afc13e3562bc4dcd64879,2024-11-21T07:59:26.373000
|
||||
@ -229472,7 +229473,7 @@ CVE-2023-37973,0,0,dc912eda2fa7366e03657492689f686d9ca429a02a5b7f1f6e6619e67122d
|
||||
CVE-2023-37974,0,0,57e7a11b20852d70f01b3808c014a4129b8d969b91a3875101eda4edf725fdaf,2024-11-21T08:12:37.133000
|
||||
CVE-2023-37975,0,0,efd6428ef764b3d9bb132f1da01a46a007f74c2f4b4e76cc10dedab0b070391e,2024-11-21T08:12:37.327000
|
||||
CVE-2023-37976,0,0,d0a8577596e3c197e9d3e33d56f0bd0742c143079455bbc5745cd04e9379dd58,2024-11-21T08:12:37.477000
|
||||
CVE-2023-37977,0,0,5f52abff1f91d70966162dcf1d6293dcc281da286b0d3f1ca075e673cafd95e9,2024-11-21T08:12:37.607000
|
||||
CVE-2023-37977,0,1,1b22373b9b5ab39cda2837a46fe2b6bea1938ef5401fc036c31913cadfd700f9,2025-02-19T16:29:43
|
||||
CVE-2023-37978,0,0,9187ef1b3258b9566cf79d9ce7c6f04078b525976a8ed576b2de707a459eec32,2024-11-21T08:12:37.740000
|
||||
CVE-2023-37979,0,0,de013a5f5d073320981103c8fa4c0b06b202e07c91d1b9fe6c8bd4051b3cb709,2024-11-21T08:12:37.883000
|
||||
CVE-2023-3798,0,0,2ec794b46ed714799295f8657ac09b24fedc9bdfaada4e9d8f049b295b5ec076,2024-11-21T08:18:05.390000
|
||||
@ -245792,9 +245793,9 @@ CVE-2024-12540,0,0,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b889004
|
||||
CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000
|
||||
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
|
||||
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
|
||||
CVE-2024-12547,0,0,bb88e9f94d0a82c6a85ab1a16cc6952eeb8cadefdd4485f7d7f5bf85a0f87674,2025-02-11T20:15:33.400000
|
||||
CVE-2024-12548,0,0,c2001cbc00a18ab0dc77e964badae1d5fbc504ebecede575ea63805378d9f617,2025-02-11T20:15:33.537000
|
||||
CVE-2024-12549,0,0,518df6e3601180c8cb0b3321203c67319e3bc7226b68f1b485d53fa155fb8d5e,2025-02-11T20:15:33.673000
|
||||
CVE-2024-12547,0,1,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000
|
||||
CVE-2024-12548,0,1,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
|
||||
CVE-2024-12549,0,1,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
|
||||
CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000
|
||||
CVE-2024-12550,0,0,ce35987631aeae68370296bb98f0ac6cdc9ccf871b6be5fcf0b50bad33472e95,2025-02-11T20:15:33.800000
|
||||
CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000
|
||||
@ -246694,7 +246695,7 @@ CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf0
|
||||
CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000
|
||||
CVE-2024-13600,0,0,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000
|
||||
CVE-2024-13601,0,0,ce9d6d51221b1f7bfe13b94be0c882b344de68bb5f35f70de286ecadc3834f44,2025-02-18T21:31:43.250000
|
||||
CVE-2024-13603,0,1,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000
|
||||
CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000
|
||||
CVE-2024-13606,0,0,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000
|
||||
CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000
|
||||
CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000
|
||||
@ -248933,7 +248934,7 @@ CVE-2024-2168,0,0,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d
|
||||
CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000
|
||||
CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000
|
||||
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
|
||||
CVE-2024-21685,0,0,50571aa3bb92a821e1540150182cfb9d537ce1d1406edcf43f003cba0675c54b,2024-11-21T08:54:51.630000
|
||||
CVE-2024-21685,0,1,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000
|
||||
CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000
|
||||
CVE-2024-21687,0,0,61dd115c9b058b7191477ed6f478ab4abf9d9c1c2c09f46ba6956bd27091cc8b,2024-11-21T08:54:51.880000
|
||||
CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000
|
||||
@ -254254,8 +254255,11 @@ CVE-2024-28770,0,0,b8811b7fb98e7ac5379aa26a96e0b35f3c550f414784b5c1af5c44bab09d5
|
||||
CVE-2024-28771,0,0,a0137eeff8a509a8fdb4e37fb64616fdf842469ff599fe3f95344835ee73fac4,2025-01-27T02:15:28.553000
|
||||
CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000
|
||||
CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000
|
||||
CVE-2024-28776,1,1,7813f4a598d53c815744e34437e69fa74a5b5070a8a0d6503e4999a527293265,2025-02-19T16:15:38.870000
|
||||
CVE-2024-28777,1,1,df83cef3ed556e980229e04768c97cf95b872a367d90979f3c72eb9990d2d4aa,2025-02-19T16:15:39.363000
|
||||
CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000
|
||||
CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000
|
||||
CVE-2024-28780,1,1,97203d55831f98cb3a22a29777c0bdd757fc3fa17fd1841066cf1cd06b59cd90,2025-02-19T16:15:39.510000
|
||||
CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000
|
||||
CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000
|
||||
CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000
|
||||
@ -259401,7 +259405,7 @@ CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615
|
||||
CVE-2024-35637,0,0,9cb867c19f8006ef50e305ac0fcabaed89e8159eb2e4ffdf558c884c5c38b50c,2024-11-21T09:20:33.200000
|
||||
CVE-2024-35638,0,0,e61de469a2786f9aa846ec4370d46e98924aa27b0a12eb528a1d8281826602ca,2024-11-21T09:20:33.323000
|
||||
CVE-2024-35639,0,0,c1c3140f21137b15d0050023371e3efdce6f35ca6c3876825bc93d445a0b36fc,2024-11-21T09:20:33.450000
|
||||
CVE-2024-3564,0,0,c1eb6cee1e1c5ce656c0dbcf14b712479f3168dd2bf2e48c97d19a902204585f,2024-11-21T09:29:53.153000
|
||||
CVE-2024-3564,0,1,fd59b89021e15ee9414091cc8b4de96e2264c0a1353eefbaaee97f0b2388d683,2025-02-19T16:09:31.300000
|
||||
CVE-2024-35640,0,0,0c90864f477ffe1ba66b00c51a04a27e372eff6a6b02cf6a105a750de1d0b8c1,2024-11-21T09:20:33.573000
|
||||
CVE-2024-35641,0,0,3457fedc6b80777ce0968e010e69f9bd148c14d13719b302b790f3f8bd620832,2024-11-21T09:20:33.703000
|
||||
CVE-2024-35642,0,0,c576a129dcdb2fd620b58c13cdcd6fc75c73e48dbf4cf648db0b11b0174d6781,2024-11-21T09:20:33.840000
|
||||
@ -259410,7 +259414,7 @@ CVE-2024-35645,0,0,1a4fe6dbf283588f6424cc1c82260317da6dd7827170952c599b4f175218c
|
||||
CVE-2024-35646,0,0,5fba6f679908112bc9c3dc4b4d2cca1d68ee5565f7f8be9760b539a5159b4326,2024-11-21T09:20:34.230000
|
||||
CVE-2024-35647,0,0,dfee17ffd98a0207bb2d9e8bf833b18d652d24f34d008cff892fca06d0528e83,2024-11-21T09:20:34.360000
|
||||
CVE-2024-35649,0,0,ea73fb4586c69ffec476186be8f6bf4c9bb27270430f8692b34ada168db146c4,2024-11-21T09:20:34.480000
|
||||
CVE-2024-3565,0,0,b05e02047eb718b5a5d80706cdab856c3be9f4a043ad8365a16a1f8d2be13c6b,2024-11-21T09:29:53.280000
|
||||
CVE-2024-3565,0,1,a5bb7f365858265f7b780928a6fa3986acc757a0256206ef75488604da581c31,2025-02-19T16:08:35.123000
|
||||
CVE-2024-35650,0,0,e15230b78c33719d35f0fd447377d3fb3a48989ab6f1b6ef89a7a5d21df7b997,2024-11-21T09:20:34.633000
|
||||
CVE-2024-35651,0,0,e5d05d661fab16634d324d95db351ad4ae02a3dab9c9c81b3f826ef45321c0ab,2024-11-21T09:20:34.773000
|
||||
CVE-2024-35652,0,0,550577498d4aa6c6e98718bd96d79908cfced34af736df304ac4ede4b362d65e,2024-11-21T09:20:34.910000
|
||||
@ -265188,7 +265192,7 @@ CVE-2024-43124,0,0,87e691970b8bcbfe678960a0eae9c1aa60d7340308bd42dce1d4b95039d0d
|
||||
CVE-2024-43125,0,0,3750a57950db46b41ee59afff69bcf68dd54b677c9e77994379d5ba1ca050de1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43126,0,0,ecee5d13e2dbf283e94aa3f331dfd8b8853b2c925b8433ca5b13f875405cd45e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43127,0,0,2ff32e86cfecbe19f35654c7b2c64ac55864d7c6b6bdbe90d8995363ccef2996,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43128,0,0,d1f1998378bddc897801375f3fbc9a08480ff31cee50926fa9471bc2721c6b06,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43128,0,1,98689769475f7148e6c6b0612632400335248ecaacd3d1c96f958425450b60f5,2025-02-19T15:41:37.420000
|
||||
CVE-2024-43129,0,0,eccfd1f47a2b86bde49817b8084396180f74acd6b6a15987af2613212feff4a2,2024-09-12T21:21:39.970000
|
||||
CVE-2024-4313,0,0,7d942770a1a4dc49c5d51e9696d69566959c4a585714bdbe873813ae04ebf906,2024-11-21T09:42:36.327000
|
||||
CVE-2024-43130,0,0,1e591c9775a6b821f95179556691b7dbf7fca248e7b7a0986bc948da7925664a,2024-08-13T12:58:25.437000
|
||||
@ -266699,7 +266703,9 @@ CVE-2024-45075,0,0,03a325d99e9aaae9ce6cdcda7dc19958a7d4699a1b3c50bb69b2322eb1c7e
|
||||
CVE-2024-45076,0,0,eb3cee64fe130784cdfbc414736fb4f58d6d633f4eb84170ae099934a833c82b,2024-09-06T16:44:52.310000
|
||||
CVE-2024-45077,0,0,488142147518607f635ce7d743802f40a784f5d21ed9a2383706160f63df7b4d,2025-01-24T16:15:36.903000
|
||||
CVE-2024-4508,0,0,7ab716d1977417cf41aa4b0c86b8c6174f947212dc2b37b9a7b838a9393e9bd5,2024-11-21T09:42:58.970000
|
||||
CVE-2024-45081,1,1,a682d09a464b709ca80fea95802ccf1ab8cffd7dbc54f5d00704f2cf0eca378b,2025-02-19T16:15:39.740000
|
||||
CVE-2024-45082,0,0,654e2014bb8a40c3daa06199b4082ee25f295dbbc2190046fcaf39d42d46c651,2025-01-10T19:34:56.253000
|
||||
CVE-2024-45084,1,1,eb48a47e0c0239a27338c18ec617446dd1a07443bd9c24a70d72cb5d92602873,2025-02-19T16:15:39.900000
|
||||
CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16d2d,2024-11-08T15:13:11.307000
|
||||
CVE-2024-45086,0,0,2d2c1612ef6e5a8ce239cd3dcdf490449d1514d9bada7d0d52c5fd5141b8d1fa,2024-11-06T23:04:04.673000
|
||||
CVE-2024-45087,0,0,5a1fbae564cbb4ee2c9e115b9e60e394ba12f02ef5cac53d3fcf17b309556986,2024-11-18T16:34:23.010000
|
||||
@ -270788,8 +270794,8 @@ CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e6
|
||||
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
|
||||
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
|
||||
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
|
||||
CVE-2024-50608,0,0,98f50059369502f936fb7c7405f168ceb50ca6968ac413ec2036a6665071c8d4,2025-02-18T18:15:25.667000
|
||||
CVE-2024-50609,0,0,312ba9272595c84a72c08ed42ec395b0fe46a5a2bc6d217390327c85aeac2b5c,2025-02-18T18:15:25.833000
|
||||
CVE-2024-50608,0,1,51ecf10e9baf01633bbb5e85c324d80569aba0c84ef45dfc95415a77cf18f169,2025-02-19T15:15:13.970000
|
||||
CVE-2024-50609,0,1,13a80120c263e02c26f34abc2d26a7abd63cd9ad83e4a9b5fc5a520f4fc3fb3a,2025-02-19T15:15:14.497000
|
||||
CVE-2024-5061,0,0,9654397355be6aedfaab6f6a3d8afb7e3d2327090cc58e5161ccd13e41cf9460,2024-09-03T15:11:56.787000
|
||||
CVE-2024-50610,0,0,a6949359060222ba84619cd69ce2c024dafba181530f6c2f1bcffd979ed6b752,2024-10-30T19:35:30.033000
|
||||
CVE-2024-50611,0,0,b9620b3c83eac2420d030761399b3b8b0064775db1dd093c666a92cebb22685a,2024-10-30T19:35:30.853000
|
||||
@ -272235,6 +272241,7 @@ CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f
|
||||
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
|
||||
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
|
||||
CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000
|
||||
CVE-2024-52902,1,1,cf8f9dd5f5314aabb5776e487e7a04f7f09b37e927323e64ba1b1424836da94f,2025-02-19T15:15:14.660000
|
||||
CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000
|
||||
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
|
||||
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
|
||||
@ -272718,7 +272725,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f
|
||||
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
|
||||
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
|
||||
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
|
||||
CVE-2024-53704,0,0,5a29d0026803cfefd80daeb2effed8634f8ef892ba81f5bbfbab498237e4d8ea,2025-02-19T02:00:02
|
||||
CVE-2024-53704,0,1,36f7356085f3715ddf1df7f0755c3af21319314d2832bee939a15da113208ade,2025-02-19T15:33:49.643000
|
||||
CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000
|
||||
CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000
|
||||
CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000
|
||||
@ -273686,7 +273693,7 @@ CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec168230
|
||||
CVE-2024-55456,0,0,a3d3f2052af70dd917d8e618e90f97fc45b823a73793a50cabf867252a0b02ec,2025-02-18T19:15:19.267000
|
||||
CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-55460,0,0,3746f2ebcf75c943bb5054e01471ae06a04a5c0757081cbc5b73400e7adfa093,2025-02-18T17:15:19.013000
|
||||
CVE-2024-55460,0,1,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000
|
||||
CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000
|
||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||
CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000
|
||||
@ -274572,8 +274579,8 @@ CVE-2024-5685,0,0,0c1a4251459dbb721b4f03df2fa84a864dbca3ca052d26de3db680c230fc2f
|
||||
CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000
|
||||
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
|
||||
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
|
||||
CVE-2024-56882,0,0,d1019706010c2eaf23762843389a39ba14ab42ed70f2288822a5ad2aab8f9553,2025-02-18T18:15:26.830000
|
||||
CVE-2024-56883,0,0,6c8a2859c5b5b91112d27f5549314ca9f9fe53d9a52ad7bb051cf3ac9629815e,2025-02-18T18:15:27.287000
|
||||
CVE-2024-56882,0,1,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000
|
||||
CVE-2024-56883,0,1,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000
|
||||
CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000
|
||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||
CVE-2024-56898,0,0,707f540df9bad40fd6a0dffff09717bab11cd135fff5e7588c850ba08978f0f0,2025-02-04T16:15:38.523000
|
||||
@ -274655,10 +274662,10 @@ CVE-2024-57035,0,0,805b080b0ce95518facb0b27dbb27140164cbeaab705edc82dca68be5d4b3
|
||||
CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000
|
||||
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
|
||||
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
|
||||
CVE-2024-57045,0,0,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000
|
||||
CVE-2024-57045,0,1,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000
|
||||
CVE-2024-57046,0,0,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000
|
||||
CVE-2024-57049,0,0,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000
|
||||
CVE-2024-57050,0,0,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000
|
||||
CVE-2024-57049,0,1,72e4153e948b22daf264938fc035d68c4ce564ff6470b7a7d4ef6548a1ce31ea,2025-02-19T15:15:15.297000
|
||||
CVE-2024-57050,0,1,bb074b123a74639ce311d395794df55bade21f4ee761fe5d114f6a275d0722e9,2025-02-19T15:15:15.460000
|
||||
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
|
||||
CVE-2024-57055,0,0,19bf70129aa27609c2df10d064bac442213368db8650043292a5cf46558c35e0,2025-02-18T19:15:20.343000
|
||||
CVE-2024-57056,0,0,b9603890c7ff3b1788bfd8d3a7f0aae9ef3f814f4773a55453d5c35b67b57623,2025-02-18T22:15:14.653000
|
||||
@ -275746,7 +275753,7 @@ CVE-2024-6453,0,0,57a9df5f41ae7388668d8ec6040750362fe611e9b50665bc5d80f3861222e5
|
||||
CVE-2024-6455,0,0,ee8244df84a11847eb1bf1028e566aa28523bbaf30c0278a51b37678378b4bf9,2025-01-16T15:06:56.973000
|
||||
CVE-2024-6456,0,0,b01715bddc5940978540d9848d20c3e52a2d359587b604967ff013be610ed6e1,2024-08-19T13:00:23.117000
|
||||
CVE-2024-6457,0,0,9fd7207180c09f39d2da8b48b95fa822cfa4ef21e4a0f2e04ef9fa9c667cf66b,2024-11-21T09:49:41.470000
|
||||
CVE-2024-6458,0,0,f80166fb500b5c662512a813b28a88f7629f6910f20d85606ff8fc4f9f842d22,2024-11-21T09:49:41.607000
|
||||
CVE-2024-6458,0,1,8a3ebaefc03a7a26d636a3edb16257b0785e2c2c28887ce21cc208c5bdae5646,2025-02-19T15:38:25.183000
|
||||
CVE-2024-6459,0,0,cb27c4eea4018b8b04b2fde4bc91aba6c1054949f5b07e05557b1533c2ff9cd3,2024-09-06T17:35:18.880000
|
||||
CVE-2024-6460,0,0,63861aecadef5cdffd3766d8f1f2c1741328b3e12a69d4364f017e469adf9a4c,2024-08-29T21:35:12.753000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
@ -278811,7 +278818,7 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743
|
||||
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
|
||||
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
|
||||
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
|
||||
CVE-2025-0108,0,0,9984445b2ca5afb1526508f1260cfbe552aa27c58dc311866cf73b702ffbbe92,2025-02-19T02:00:02
|
||||
CVE-2025-0108,0,1,cc96661b8cf1892f00b78cd73695bbf610ab2e0698a13c4342c37b7095c43b6a,2025-02-19T15:33:43.727000
|
||||
CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000
|
||||
CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000
|
||||
CVE-2025-0111,0,0,aa2258940e699552d6ad0522d6bc535ee5e05cc6ed6d0935f57d5a6bf309cd74,2025-02-12T21:15:16.793000
|
||||
@ -279285,10 +279292,10 @@ CVE-2025-0981,0,0,c309731b7ff9893538036e27f735501df9811f94653975fc38c99f19642038
|
||||
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
|
||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||
CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000
|
||||
CVE-2025-0995,0,0,cdfc421290eb9c0aaf2d86d330d7548de811167731e07835b47729c6edcf7253,2025-02-18T17:15:19.383000
|
||||
CVE-2025-0996,0,0,96e6c91bf4ad6f13de2d7e7d33ae6669310fa693571332f25d6d49457d8ebc3a,2025-02-18T18:15:29.130000
|
||||
CVE-2025-0997,0,0,9a6c4b35ba1bd9bfdebd68ad687359b2a111440316e9e605ae9be400472a1e40,2025-02-18T18:15:29.347000
|
||||
CVE-2025-0998,0,0,260aa2ee4883a3fee476ba7c1a4fd8609a0274d690b6f034f84af7eb5edade81,2025-02-18T18:15:29.550000
|
||||
CVE-2025-0995,0,1,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000
|
||||
CVE-2025-0996,0,1,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000
|
||||
CVE-2025-0997,0,1,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fee0,2025-02-19T15:15:16.407000
|
||||
CVE-2025-0998,0,1,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000
|
||||
CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f595,2025-02-10T21:15:21.830000
|
||||
CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000
|
||||
CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000
|
||||
@ -279492,7 +279499,8 @@ CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bb
|
||||
CVE-2025-1441,0,0,dea0748ac4805add0b5a620a8c550d3c2cb9f813ccabe70b3df2355bbf5d5eab,2025-02-19T05:15:12.050000
|
||||
CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000
|
||||
CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000
|
||||
CVE-2025-1464,1,1,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000
|
||||
CVE-2025-1464,0,0,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000
|
||||
CVE-2025-1465,1,1,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3ee,2025-02-19T16:15:40.667000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -279513,7 +279521,9 @@ CVE-2025-20124,0,0,3b222e4debebf19647313be14570cd157d1c9b474f2f1fb6db3f2d02720f9
|
||||
CVE-2025-20125,0,0,4c965c93b17f55e1ee6990c432e90b6f767d7217d5ca1f99810949fadd043cf7,2025-02-05T17:15:22.610000
|
||||
CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000
|
||||
CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000
|
||||
CVE-2025-20153,1,1,8a0c118fecfde278e395d37650e56a488c35c552b597d26c46f7395365ab23a1,2025-02-19T16:15:40.860000
|
||||
CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000
|
||||
CVE-2025-20158,1,1,5a0703ebcc6e8c9261c7522dfd1e4f046c7f1bc67251a75a9860d63c2aa09237,2025-02-19T16:15:41.017000
|
||||
CVE-2025-20165,0,0,9f7b026247b5eae4a58783714ebe8eb2d48f865473657f5e720d75dccad8e306,2025-02-18T20:15:25.050000
|
||||
CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000
|
||||
CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000
|
||||
@ -279534,6 +279544,7 @@ CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3
|
||||
CVE-2025-20204,0,0,a4e9ba7d17901e18de8b9e3a60210eaecc0b2b310b697e9225923c362d7831c8,2025-02-05T17:15:26.077000
|
||||
CVE-2025-20205,0,0,4278aa005556418073946cc1ae2642befa148c4c7c75ec9371531ea83b7f1629,2025-02-05T17:15:26.243000
|
||||
CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000
|
||||
CVE-2025-20211,1,1,ab1049982f8a4ac46b9f050aa2c9e173ce4badc4048d39ecbd7e35ed3dbb8983,2025-02-19T16:15:41.163000
|
||||
CVE-2025-20615,0,0,7bf2f14d71ca066d1f71371dd6af37fe50ec1afd8739580fa516ac8ff703a51f,2025-02-13T22:15:11.590000
|
||||
CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000
|
||||
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
|
||||
@ -279812,7 +279823,7 @@ CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224
|
||||
CVE-2025-21383,0,0,cef86fb722a492bba5999008e077ba4e0bcdfdca7e1c12402fd24cbb02258e01,2025-02-11T18:15:36.963000
|
||||
CVE-2025-21385,0,0,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000
|
||||
CVE-2025-21386,0,0,17d9bcb239f3cd33e8926d95f51da996d32a15ff3f987258e6a581e2809828dd,2025-02-11T18:15:37.157000
|
||||
CVE-2025-21387,0,0,e0c0537c2c15c9eeb7f31b7c7db3b844be344ae09d1dd05923da281b0dee4a82,2025-02-11T18:15:37.337000
|
||||
CVE-2025-21387,0,1,e4ebea81a4d9f55910301b145e28f9ebdee34c280220b7e180e97f999591acd4,2025-02-19T16:55:39.487000
|
||||
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
|
||||
CVE-2025-21390,0,0,14783ca48d3efbfc9fb20859f570ff47925c810fcc0ff83e83d54b15c4d81bf4,2025-02-11T18:15:37.523000
|
||||
CVE-2025-21391,0,0,83d419fda69ced06d53cbd61e13158fe3e31c56b8681059f3bb731201858f5f1,2025-02-12T18:14:53.363000
|
||||
@ -280448,7 +280459,7 @@ CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84b
|
||||
CVE-2025-22918,0,0,2fd7b69a5783a0816fd30844977f8382a02d00bf28fb9a113c66c1ed7d87d02d,2025-02-18T19:15:26.700000
|
||||
CVE-2025-22919,0,0,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000
|
||||
CVE-2025-22920,0,0,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000
|
||||
CVE-2025-22921,0,0,debc99abe53255cfa5a22b0ec7ab8f1dfb477f7032a6902bbdfd515f66bcedf6,2025-02-18T22:15:18.040000
|
||||
CVE-2025-22921,0,1,8e982b362e449850e2ea02538af900c3ab253faa0ab7197d6c0c9fbcb9c9326b,2025-02-19T15:15:17.497000
|
||||
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
|
||||
@ -281133,7 +281144,7 @@ CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b6
|
||||
CVE-2025-24370,0,0,bfc70a6cc31e8bb3d1e99a32a23a1f93aacee805ef386dd0b2c9d04752b7618b,2025-02-03T21:15:15.547000
|
||||
CVE-2025-24371,0,0,27fe2f9aa1259e46cd957d482d07885017354097cad992d94597eb6d6d5d9942,2025-02-03T22:15:28.460000
|
||||
CVE-2025-24372,0,0,d67365bd89db4c3751e20f68485685bbddaa30222f766a46b2792537e2dc94e0,2025-02-05T19:15:46.010000
|
||||
CVE-2025-24373,0,0,9ac2e97f9f1868bee0945286027bcfea993d6a9d78eb61c55b164577479bbb11,2025-02-04T19:15:33.680000
|
||||
CVE-2025-24373,0,1,193fa5b284462d86a15715b065fb2e2fbf0806d4d05b7ae3485d9d3a3bbcad28,2025-02-19T15:45:13.197000
|
||||
CVE-2025-24374,0,0,9d28476f7b9e0a721c68d8f61a3e330d2e4b6e221dde61867e43ef2d95c1b3bb,2025-01-29T16:15:44.090000
|
||||
CVE-2025-24376,0,0,7e46d4cd45c80d06e2794dedbb8a5a694e79dc599f98b5860f6d746c41079abd,2025-01-30T16:15:31.630000
|
||||
CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8f56,2025-01-27T06:15:24.170000
|
||||
@ -281605,7 +281616,7 @@ CVE-2025-25297,0,0,0d275b3712a3a3d33cc2cdc3c558a7d071e515bf3e49f1dc29a4a93b576fa
|
||||
CVE-2025-25300,0,0,980ff15b3946d415393db142f5a2944ec9527bc437d9d2bff6f0e4d78a53fe4b,2025-02-18T19:15:28.957000
|
||||
CVE-2025-25304,0,0,faa0dc15a1534f91421e09ef7387795b56219ff6441c76442b60578f585efb63,2025-02-14T20:15:36.903000
|
||||
CVE-2025-25305,0,0,fdfd83296c931cee6549a4da42d4223cb7e0f0ca44ee3ebfa8abe753635cd695,2025-02-18T19:15:29.083000
|
||||
CVE-2025-25343,0,0,209700127e109f6eaf7535ced2a5a67f22d1ec3dd91c12407f85d8d5702206ac,2025-02-12T19:15:22.003000
|
||||
CVE-2025-25343,0,1,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000
|
||||
CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000
|
||||
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
|
||||
CVE-2025-25352,0,0,a915ce06440177393d500efbddd7de5a3f826edb2686b61dd76e9d58de13e0b3,2025-02-14T19:43:23.960000
|
||||
@ -281616,8 +281627,8 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3
|
||||
CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,5876192d19265a89356e9ca3f40fe8fc17b662577ecd7d99d37f22efaaf88049,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000
|
||||
CVE-2025-25467,0,0,61ffc7e889c5c4d70b42d956678cc9ed638e9d5b8d680d26869fea336cad8905,2025-02-18T22:15:18.373000
|
||||
CVE-2025-25468,0,0,85057d249a185badd8089bc6bcbf97fd2a496ee7b42fd2afcf4045da21103a1d,2025-02-18T22:15:18.477000
|
||||
CVE-2025-25467,0,1,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000
|
||||
CVE-2025-25468,0,1,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000
|
||||
CVE-2025-25469,0,0,e9ca9bae21c00b3260ea3e00b66e7b1daf3a8f35534912c9c9e5bdd584776714,2025-02-18T22:15:18.587000
|
||||
CVE-2025-25471,0,0,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000
|
||||
CVE-2025-25472,0,0,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000
|
||||
@ -281640,12 +281651,12 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a
|
||||
CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000
|
||||
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
|
||||
CVE-2025-25891,0,0,277e3b409b3b8988e5337c4bd767ac8e74ecfd90b769b4b9550ef2350267b9cd,2025-02-18T22:15:18.693000
|
||||
CVE-2025-25892,0,0,088117497904dbecdd0391c4388abac5d7c20ded456b021384635ad5dba303c1,2025-02-18T22:15:18.803000
|
||||
CVE-2025-25893,0,0,7efa21650fabd3fa6503510b20918331b167b4a26657feba8fa6b321eb47dd02,2025-02-18T22:15:18.920000
|
||||
CVE-2025-25894,0,0,3b9c376409610de120767f36e10d1919302234cdbfaf8ebc37dc8446994a4894,2025-02-18T22:15:19.040000
|
||||
CVE-2025-25895,0,0,623d56181753b7d6f5c525ed10655d0bf99493b283302c21873ffb6f82154fd2,2025-02-18T22:15:19.163000
|
||||
CVE-2025-25896,0,0,8685ba7afe952db781a9d0698a05f9a24ee65854afe5c70440ec7738caa3da46,2025-02-18T22:15:19.277000
|
||||
CVE-2025-25891,0,1,9ffea80911f1e47c70786967af69881dfb74e93322751a9813ef61512aae0c90,2025-02-19T16:15:41.447000
|
||||
CVE-2025-25892,0,1,5da0a3f25cf580ce2a0d5ec98e1c2a6fcbac4e2bca4f1888dc83cf1e3c60adc9,2025-02-19T16:15:41.600000
|
||||
CVE-2025-25893,0,1,3668fbd05f91f142c0368e72bcb53f03aa560730fd7cf7b399c07758d1bacf87,2025-02-19T16:15:41.763000
|
||||
CVE-2025-25894,0,1,5c2f11c1677c7adef0d47925f7169ad00211ba8749791d98cbfc944a8ea860f6,2025-02-19T16:15:41.930000
|
||||
CVE-2025-25895,0,1,dbb2dc7aefefdf851dd6cea1f5518bb8d41557a984af858095e8699201b2832d,2025-02-19T16:15:42.087000
|
||||
CVE-2025-25896,0,1,12bed3554490f6b211acee114f0848fe8685a24d4df00f8c39fe3eaa23a2bc50,2025-02-19T16:15:42.240000
|
||||
CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000
|
||||
CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000
|
||||
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
|
||||
@ -281706,7 +281717,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
|
||||
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
|
||||
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
|
||||
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
|
||||
CVE-2025-26465,0,0,3c472d5b9fa5deafc6b883ebf568235c3cb637f5368b3f619a33dbc4e629f1f6,2025-02-19T05:15:12.440000
|
||||
CVE-2025-26465,0,1,90ca92ee391124597eed5a54a98891d38a806dd2b4300c52197477b3ccb16272,2025-02-19T15:15:18.090000
|
||||
CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user