Auto-Update: 2025-01-28T17:00:25.078234+00:00

This commit is contained in:
cad-safe-bot 2025-01-28 17:03:52 +00:00
parent af73869ac3
commit 84be0f5c66
81 changed files with 3122 additions and 329 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26354",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.670",
"lastModified": "2024-11-21T05:56:11.643",
"lastModified": "2025-01-28T16:15:27.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26356",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.737",
"lastModified": "2024-11-21T05:56:12.070",
"lastModified": "2025-01-28T16:15:29.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-367"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26365",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.780",
"lastModified": "2024-11-21T05:56:13.093",
"lastModified": "2025-01-28T16:15:29.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26371",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.820",
"lastModified": "2024-11-21T05:56:14.083",
"lastModified": "2025-01-28T16:15:29.637",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26379",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.863",
"lastModified": "2024-11-21T05:56:15.457",
"lastModified": "2025-01-28T16:15:29.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26397",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.903",
"lastModified": "2024-11-21T05:56:17.807",
"lastModified": "2025-01-28T16:15:30.127",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26406",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.943",
"lastModified": "2024-11-21T05:56:18.897",
"lastModified": "2025-01-28T16:15:30.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-45345",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T20:15:09.427",
"lastModified": "2024-11-21T06:32:07.427",
"lastModified": "2025-01-28T16:15:30.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46749",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:10.997",
"lastModified": "2024-11-21T06:34:37.847",
"lastModified": "2025-01-28T16:15:30.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46753",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.040",
"lastModified": "2024-11-21T06:34:38.127",
"lastModified": "2025-01-28T16:15:31.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46755",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T20:15:12.157",
"lastModified": "2024-11-21T06:34:38.670",
"lastModified": "2025-01-28T16:15:31.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46756",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T20:15:12.200",
"lastModified": "2024-11-21T06:34:38.833",
"lastModified": "2025-01-28T16:15:31.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46763",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.123",
"lastModified": "2024-11-21T06:34:40.117",
"lastModified": "2025-01-28T16:15:32.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46764",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.160",
"lastModified": "2024-11-21T06:34:40.283",
"lastModified": "2025-01-28T16:15:32.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46769",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.200",
"lastModified": "2024-11-21T06:34:41.030",
"lastModified": "2025-01-28T16:15:32.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46773",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T20:15:12.370",
"lastModified": "2024-11-21T06:34:41.453",
"lastModified": "2025-01-28T16:15:32.647",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46775",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.240",
"lastModified": "2024-11-21T06:34:41.953",
"lastModified": "2025-01-28T16:15:32.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46792",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T20:15:12.413",
"lastModified": "2024-11-21T06:34:43.910",
"lastModified": "2025-01-28T16:15:33.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-367"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46794",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T20:15:12.463",
"lastModified": "2024-11-21T06:34:44.127",
"lastModified": "2025-01-28T16:15:33.417",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23818",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.367",
"lastModified": "2024-11-21T06:49:18.543",
"lastModified": "2025-01-28T16:15:33.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3365",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-01-28T01:15:08.277",
"lastModified": "2025-01-28T01:15:08.277",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:34.643",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct's custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@rapid7.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38090",
"sourceIdentifier": "secure@intel.com",
"published": "2023-02-16T21:15:13.760",
"lastModified": "2024-11-21T07:15:46.340",
"lastModified": "2025-01-28T16:15:34.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20520",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.507",
"lastModified": "2024-11-21T07:41:04.147",
"lastModified": "2025-01-28T16:15:34.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20524",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-05-09T19:15:11.550",
"lastModified": "2024-11-21T07:41:04.847",
"lastModified": "2025-01-28T16:15:35.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25646",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2024-06-20T07:15:41.340",
"lastModified": "2024-11-21T07:49:51.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-28T16:29:58.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -49,16 +69,61 @@
"value": "CWE-281"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zte:zxhn_h388x_firmware:10.1_agzhm_1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B505C00-1388-4B53-B2E0-A43D5C794A10"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zte:zxhn_h388x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B08F94E-4211-4592-9919-4F2D0CD688E7"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31689",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T20:15:10.887",
"lastModified": "2024-11-21T08:02:09.323",
"lastModified": "2025-01-28T16:15:35.497",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T17:15:09.477",
"lastModified": "2024-11-21T08:02:13.737",
"lastModified": "2025-01-28T16:15:35.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32568",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:11.990",
"lastModified": "2024-11-21T08:03:37.133",
"lastModified": "2025-01-28T16:15:35.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32569",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.103",
"lastModified": "2024-11-21T08:03:37.287",
"lastModified": "2025-01-28T16:15:36.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.190",
"lastModified": "2024-11-21T08:03:37.430",
"lastModified": "2025-01-28T16:15:36.333",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12723",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-28T06:15:31.370",
"lastModified": "2025-01-28T06:15:31.370",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:37.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Infility Global WordPress plugin through 2.9.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/d9053b8b-c05c-42fd-913e-f85c799df807/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12807",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-28T06:15:31.680",
"lastModified": "2025-01-28T06:15:31.680",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:37.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Social Share Buttons for WordPress plugin through 2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/fcce0839-bb1d-4aa3-b236-ff5f5e9b6120/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22064",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2024-05-14T14:56:40.160",
"lastModified": "2025-01-27T18:36:59.497",
"lastModified": "2025-01-28T16:12:31.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -83,7 +83,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -91,20 +90,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:zte:zxun-epdg_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:zte:zxun-epdg:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.20.20",
"matchCriteriaId": "A5DD1547-50E5-46B1-9E6F-CFE9EBCE6B39"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:zte:zxun-epdg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A0BFF58-BA88-4BE2-9E7A-ACD6A28F8E1C"
"matchCriteriaId": "428020C1-365E-4AD1-AFF7-51D3916201BE"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35299",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-05-16T11:15:47.460",
"lastModified": "2024-11-21T09:20:06.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-28T16:35:03.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-295"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.1.29548",
"matchCriteriaId": "8ED92D3B-43B1-4E9F-AA5F-DBC03DD04687"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3892",
"sourceIdentifier": "security@progress.com",
"published": "2024-05-15T17:15:14.470",
"lastModified": "2024-11-21T09:30:38.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-28T16:39:55.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.6,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,51 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:telerik:ui_for_winforms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021.1.122",
"versionEndExcluding": "2024.2.514",
"matchCriteriaId": "790A5E6E-F407-4B25-AEE3-F5D117253432"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4288",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-16T11:15:48.373",
"lastModified": "2024-11-21T09:42:32.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-28T16:28:47.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.7.18",
"matchCriteriaId": "90EF0E37-46E7-4E71-8D6F-BEBB7EAF8F70"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087297/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087297/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45336",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:28.807",
"lastModified": "2025-01-28T02:15:28.807",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:38.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://go.dev/cl/643100",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45339",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:28.927",
"lastModified": "2025-01-28T02:15:28.927",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:38.367",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://github.com/golang/glog/pull/74",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45340",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:29.050",
"lastModified": "2025-01-28T02:15:29.050",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:38.517",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://go.dev/cl/643097",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45341",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:29.147",
"lastModified": "2025-01-28T02:15:29.147",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:38.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://go.dev/cl/643099",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50665",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-23T22:15:13.790",
"lastModified": "2025-01-23T22:15:13.790",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:38.797",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,50 @@
"value": "gpac 2.4 contiene un SEGV en src/isomedia/drm_sample.c:1562:96 en isom_cenc_get_sai_by_saiz_saio en MP4Box."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/issues/2987",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/gpac/gpac/issues/2987",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-54475",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:12.283",
"lastModified": "2025-01-27T22:15:12.283",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to determine a user\u2019s current location."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/121839",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54499",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:12.680",
"lastModified": "2025-01-27T22:15:12.680",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.303",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing a maliciously crafted image may lead to arbitrary code execution."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use-after-free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sequoia 15.2. El procesamiento de una imagen manipulado maliciosa puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121837",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54530",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:13.753",
"lastModified": "2025-01-27T22:15:13.753",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.450",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 and iPadOS 18.2. Password autofill may fill in passwords after failing authentication."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 y iPadOS 18.2. La funci\u00f3n de autocompletar contrase\u00f1as puede completar las contrase\u00f1as despu\u00e9s de una autenticaci\u00f3n fallida."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121837",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54547",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:14.400",
"lastModified": "2025-01-27T22:15:14.400",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to access protected user data."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121839",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54550",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:14.580",
"lastModified": "2025-01-27T22:15:14.580",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.773",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An app may be able to view autocompleted contact information from Messages and Mail in system logs."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda ver la informaci\u00f3n de contacto completada autom\u00e1ticamente de Mensajes y Correo en los registros de sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121837",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55194",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-23T22:15:14.560",
"lastModified": "2025-01-23T22:15:14.560",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:39.927",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,50 @@
"value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente /OpenImageIO/fmath.h."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,112 @@
{
"id": "CVE-2025-0432",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-28T16:15:40.183",
"lastModified": "2025-01-28T16:15:40.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf?sfvrsn=37160847_4",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.hms-networks.com/cyber-security",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0659",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2025-01-28T16:15:40.360",
"lastModified": "2025-01-28T16:15:40.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path\ntraversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character\nsequence in the body of the vulnerable endpoint, it is possible to overwrite\nfiles outside of the intended directory. A threat actor with admin privileges could\nleverage this vulnerability to overwrite reports including user projects."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1715.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22865",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:29.243",
"lastModified": "2025-01-28T02:15:29.243",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:40.540",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://go.dev/cl/643098",

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-23045",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-28T16:15:40.690",
"lastModified": "2025-01-28T16:15:40.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle or jsonpickle, it's likely to be vulnerable. Upgrade to CVAT 2.26.0 or later. If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/cvat-ai/cvat/commit/563e1dfde64b15fa042b23f9d09cd854b35f0366",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-wq36-mxf8-hv62",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23084",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-28T05:15:11.267",
"lastModified": "2025-01-28T05:15:11.267",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:40.827",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-23211",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-28T16:15:40.937",
"lastModified": "2025-01-28T16:15:40.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://github.com/TandoorRecipes/recipes/blob/4f9bff20c858180d0f7376de443a9fe4c123a50c/cookbook/helper/template_helper.py#L95",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TandoorRecipes/recipes/commit/e6087d5129cc9d0c24278948872377e66c2a2c20",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-r6rj-h75w-vj8v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23212",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-28T16:15:41.080",
"lastModified": "2025-01-28T16:15:41.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/TandoorRecipes/recipes/commit/36e83a9d0108ac56b9538b45ead57efc8b97c5ff",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-jrgj-35jx-2qq7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23213",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-28T16:15:41.217",
"lastModified": "2025-01-28T16:15:41.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The file upload feature allows to upload arbitrary files, including html and svg. Both can contain malicious content (XSS Payloads). This vulnerability is fixed in 1.5.28."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/TandoorRecipes/recipes/commit/3e37d11c6a3841a00eb27670d1d003f1a713e1cf",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-56jp-j3x5-hh2w",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23385",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-28T16:15:41.377",
"lastModified": "2025-01-28T16:15:41.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-114"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24085",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:14.990",
"lastModified": "2025-01-27T22:15:14.990",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:41.540",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use after free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Una aplicaci\u00f3n maliciosa podr\u00eda elevar privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haberse explotado activamente contra versiones de iOS anteriores a iOS 17.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24092",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:15.267",
"lastModified": "2025-01-27T22:15:15.267",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:41.697",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read sensitive location information."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24093",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:15.350",
"lastModified": "2025-01-27T22:15:15.350",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:41.847",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3. An app may be able to access removable volumes without user consent."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a vol\u00famenes extra\u00edbles sin el consentimiento del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122069",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24103",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:15.900",
"lastModified": "2025-01-27T22:15:15.900",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:41.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24115",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.713",
"lastModified": "2025-01-27T22:15:16.713",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer archivos fuera de su sandbox."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24118",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.033",
"lastModified": "2025-01-27T22:15:17.033",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar una terminaci\u00f3n inesperada de sistema o escribir en la memoria del n\u00facleo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122067",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-24122",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.323",
"lastModified": "2025-01-27T22:15:17.323",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.447",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24123",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.413",
"lastModified": "2025-01-27T22:15:17.413",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24134",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:18.153",
"lastModified": "2025-01-27T22:15:18.153",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con controles de privacidad mejorados. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24135",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:18.247",
"lastModified": "2025-01-27T22:15:18.247",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:42.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n de mensajes mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24138",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:18.530",
"lastModified": "2025-01-27T22:15:18.530",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.077",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious application may be able to leak sensitive user information."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Una aplicaci\u00f3n malintencionada podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24139",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:18.627",
"lastModified": "2025-01-27T22:15:18.627",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Analizar un archivo manipulado malintencionado puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24149",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.173",
"lastModified": "2025-01-27T22:15:19.173",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.387",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una comprobaci\u00f3n de l\u00edmites mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24154",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.620",
"lastModified": "2025-01-27T22:15:19.620",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.533",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3. Un atacante podr\u00eda provocar una terminaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del kernel."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24158",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.800",
"lastModified": "2025-01-27T22:15:19.800",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24159",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.897",
"lastModified": "2025-01-27T22:15:19.897",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:43.843",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de validaci\u00f3n con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios de kernel."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24160",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.987",
"lastModified": "2025-01-27T22:15:19.987",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.003",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-24162",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.167",
"lastModified": "2025-01-27T22:15:20.167",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24163",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.267",
"lastModified": "2025-01-27T22:15:20.267",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24174",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.547",
"lastModified": "2025-01-27T22:15:20.547",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24176",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.643",
"lastModified": "2025-01-27T22:15:20.643",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.630",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Un atacante local podr\u00eda elevar sus privilegios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24783",
"sourceIdentifier": "security@apache.org",
"published": "2025-01-27T15:15:17.610",
"lastModified": "2025-01-27T19:15:29.637",
"vulnStatus": "Received",
"lastModified": "2025-01-28T16:15:44.880",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "security@apache.org",
@ -16,9 +16,36 @@
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon.\n\nThis issue affects Apache Cocoon: all versions.\n\nWhen a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to.\n\nAs a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions.\n\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de uso incorrecto de las semillas en el generador de n\u00fameros pseudoaleatorios (PRNG) en Apache Cocoon. Este problema afecta a Apache Cocoon: todas las versiones. Cuando se crea una continuaci\u00f3n, obtiene un identificador aleatorio. Debido a que el generador de n\u00fameros aleatorios utilizado para generar estos identificadores se sembr\u00f3 con la hora de inicio, es posible que no haya sido lo suficientemente impredecible y un atacante podr\u00eda usar esto para adivinar los identificadores de continuaci\u00f3n y buscar continuaciones a las que no deber\u00eda haber tenido acceso. Como mitigaci\u00f3n, puede habilitar la opci\u00f3n \"continuaciones vinculadas a la sesi\u00f3n\" para asegurarse de que las continuaciones no se compartan entre sesiones. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios de confianza. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-24800",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-28T16:15:45.063",
"lastModified": "2025-01-28T16:15:45.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. This could be used to steal funds or compromise other kinds of cross-chain applications. This vulnerability is fixed in 15.0.1."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
},
{
"lang": "en",
"value": "CWE-670"
}
]
}
],
"references": [
{
"url": "https://github.com/polytope-labs/hyperbridge/pull/372/commits/f0e85db718f5165b06585a49b14a66f8ad643aea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/polytope-labs/hyperbridge/security/advisories/GHSA-wwx5-gpgr-vxr7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/polytope-labs/ismp-substrate/pull/64/commits/5ca3351a19151f1a439c30d5cbdbfdc72a11f1a8#diff-3835cc24fb2011b3e8246036059acd8c2c2a9a869eedf7a210d18edb6543318dL262",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-28T16:05:42.333138+00:00
2025-01-28T17:00:25.078234+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-28T15:36:03.663000+00:00
2025-01-28T16:39:55.417000+00:00
```
### Last Data Feed Release
@ -33,48 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279285
279293
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `8`
- [CVE-2024-11954](CVE-2024/CVE-2024-119xx/CVE-2024-11954.json) (`2025-01-28T14:15:29.070`)
- [CVE-2024-11956](CVE-2024/CVE-2024-119xx/CVE-2024-11956.json) (`2025-01-28T14:15:29.803`)
- [CVE-2024-6351](CVE-2024/CVE-2024-63xx/CVE-2024-6351.json) (`2025-01-28T14:15:30.007`)
- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-01-28T15:15:12.847`)
- [CVE-2025-0432](CVE-2025/CVE-2025-04xx/CVE-2025-0432.json) (`2025-01-28T16:15:40.183`)
- [CVE-2025-0659](CVE-2025/CVE-2025-06xx/CVE-2025-0659.json) (`2025-01-28T16:15:40.360`)
- [CVE-2025-23045](CVE-2025/CVE-2025-230xx/CVE-2025-23045.json) (`2025-01-28T16:15:40.690`)
- [CVE-2025-23211](CVE-2025/CVE-2025-232xx/CVE-2025-23211.json) (`2025-01-28T16:15:40.937`)
- [CVE-2025-23212](CVE-2025/CVE-2025-232xx/CVE-2025-23212.json) (`2025-01-28T16:15:41.080`)
- [CVE-2025-23213](CVE-2025/CVE-2025-232xx/CVE-2025-23213.json) (`2025-01-28T16:15:41.217`)
- [CVE-2025-23385](CVE-2025/CVE-2025-233xx/CVE-2025-23385.json) (`2025-01-28T16:15:41.377`)
- [CVE-2025-24800](CVE-2025/CVE-2025-248xx/CVE-2025-24800.json) (`2025-01-28T16:15:45.063`)
### CVEs modified in the last Commit
Recently modified CVEs: `44`
Recently modified CVEs: `71`
- [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2025-01-28T15:15:10.787`)
- [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2025-01-28T15:15:10.947`)
- [CVE-2023-41776](CVE-2023/CVE-2023-417xx/CVE-2023-41776.json) (`2025-01-28T15:36:03.663`)
- [CVE-2023-41779](CVE-2023/CVE-2023-417xx/CVE-2023-41779.json) (`2025-01-28T15:36:03.663`)
- [CVE-2023-41780](CVE-2023/CVE-2023-417xx/CVE-2023-41780.json) (`2025-01-28T15:36:03.663`)
- [CVE-2023-41782](CVE-2023/CVE-2023-417xx/CVE-2023-41782.json) (`2025-01-28T15:36:03.663`)
- [CVE-2023-41783](CVE-2023/CVE-2023-417xx/CVE-2023-41783.json) (`2025-01-28T15:36:03.663`)
- [CVE-2024-22062](CVE-2024/CVE-2024-220xx/CVE-2024-22062.json) (`2025-01-28T15:29:07.970`)
- [CVE-2024-23591](CVE-2024/CVE-2024-235xx/CVE-2024-23591.json) (`2025-01-28T14:28:25.570`)
- [CVE-2024-23953](CVE-2024/CVE-2024-239xx/CVE-2024-23953.json) (`2025-01-28T15:15:11.330`)
- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-01-28T15:15:11.520`)
- [CVE-2024-54507](CVE-2024/CVE-2024-545xx/CVE-2024-54507.json) (`2025-01-28T15:15:11.723`)
- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-01-28T15:15:11.900`)
- [CVE-2024-54519](CVE-2024/CVE-2024-545xx/CVE-2024-54519.json) (`2025-01-28T15:15:12.050`)
- [CVE-2024-54523](CVE-2024/CVE-2024-545xx/CVE-2024-54523.json) (`2025-01-28T15:15:12.190`)
- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-01-28T15:15:12.340`)
- [CVE-2024-54542](CVE-2024/CVE-2024-545xx/CVE-2024-54542.json) (`2025-01-28T15:15:12.477`)
- [CVE-2024-55195](CVE-2024/CVE-2024-551xx/CVE-2024-55195.json) (`2025-01-28T15:15:12.647`)
- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-01-28T15:15:13.303`)
- [CVE-2025-24106](CVE-2025/CVE-2025-241xx/CVE-2025-24106.json) (`2025-01-28T15:15:13.450`)
- [CVE-2025-24121](CVE-2025/CVE-2025-241xx/CVE-2025-24121.json) (`2025-01-28T15:15:13.600`)
- [CVE-2025-24126](CVE-2025/CVE-2025-241xx/CVE-2025-24126.json) (`2025-01-28T15:15:13.743`)
- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-01-28T15:15:13.890`)
- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-28T15:15:14.013`)
- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-28T15:15:14.150`)
- [CVE-2024-55194](CVE-2024/CVE-2024-551xx/CVE-2024-55194.json) (`2025-01-28T16:15:39.927`)
- [CVE-2025-22865](CVE-2025/CVE-2025-228xx/CVE-2025-22865.json) (`2025-01-28T16:15:40.540`)
- [CVE-2025-23084](CVE-2025/CVE-2025-230xx/CVE-2025-23084.json) (`2025-01-28T16:15:40.827`)
- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-01-28T16:15:41.540`)
- [CVE-2025-24092](CVE-2025/CVE-2025-240xx/CVE-2025-24092.json) (`2025-01-28T16:15:41.697`)
- [CVE-2025-24093](CVE-2025/CVE-2025-240xx/CVE-2025-24093.json) (`2025-01-28T16:15:41.847`)
- [CVE-2025-24103](CVE-2025/CVE-2025-241xx/CVE-2025-24103.json) (`2025-01-28T16:15:41.990`)
- [CVE-2025-24115](CVE-2025/CVE-2025-241xx/CVE-2025-24115.json) (`2025-01-28T16:15:42.150`)
- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-01-28T16:15:42.293`)
- [CVE-2025-24122](CVE-2025/CVE-2025-241xx/CVE-2025-24122.json) (`2025-01-28T16:15:42.447`)
- [CVE-2025-24123](CVE-2025/CVE-2025-241xx/CVE-2025-24123.json) (`2025-01-28T16:15:42.590`)
- [CVE-2025-24134](CVE-2025/CVE-2025-241xx/CVE-2025-24134.json) (`2025-01-28T16:15:42.780`)
- [CVE-2025-24135](CVE-2025/CVE-2025-241xx/CVE-2025-24135.json) (`2025-01-28T16:15:42.930`)
- [CVE-2025-24138](CVE-2025/CVE-2025-241xx/CVE-2025-24138.json) (`2025-01-28T16:15:43.077`)
- [CVE-2025-24139](CVE-2025/CVE-2025-241xx/CVE-2025-24139.json) (`2025-01-28T16:15:43.230`)
- [CVE-2025-24149](CVE-2025/CVE-2025-241xx/CVE-2025-24149.json) (`2025-01-28T16:15:43.387`)
- [CVE-2025-24154](CVE-2025/CVE-2025-241xx/CVE-2025-24154.json) (`2025-01-28T16:15:43.533`)
- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-01-28T16:15:43.693`)
- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-01-28T16:15:43.843`)
- [CVE-2025-24160](CVE-2025/CVE-2025-241xx/CVE-2025-24160.json) (`2025-01-28T16:15:44.003`)
- [CVE-2025-24162](CVE-2025/CVE-2025-241xx/CVE-2025-24162.json) (`2025-01-28T16:15:44.187`)
- [CVE-2025-24163](CVE-2025/CVE-2025-241xx/CVE-2025-24163.json) (`2025-01-28T16:15:44.330`)
- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-01-28T16:15:44.490`)
- [CVE-2025-24176](CVE-2025/CVE-2025-241xx/CVE-2025-24176.json) (`2025-01-28T16:15:44.630`)
- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-28T16:15:44.880`)
## Download and Usage

View File

@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53
CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000
CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000
CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000
CVE-2017-10271,0,1,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000
CVE-2017-10271,0,0,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000
CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000
CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000
CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000
@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a
CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000
CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000
CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000
CVE-2017-12149,0,1,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000
CVE-2017-12149,0,0,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000
CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000
CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000
CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000
@ -102558,7 +102558,7 @@ CVE-2017-20192,0,0,62ca05a0a6895e670da34ea053fd80d19f2fb06d6c55730f577c1845fb514
CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4ca38,2024-10-30T20:46:34.060000
CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000
CVE-2017-20195,0,0,038824b0765b4962b51714c1d9dd9e3ad2eebba7a76824674181910d889a0075,2024-10-29T14:34:04.427000
CVE-2017-20196,0,1,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000
CVE-2017-20196,0,0,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000
@ -105455,7 +105455,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c
CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000
CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000
CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000
CVE-2017-5070,0,1,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000
CVE-2017-5070,0,0,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000
CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000
CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000
CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000
@ -106503,7 +106503,7 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8
CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000
CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000
CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000
CVE-2017-6327,0,1,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000
CVE-2017-6327,0,0,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000
CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000
CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000
CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000
@ -109621,7 +109621,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237
CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000
CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000
CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000
CVE-2017-9822,0,1,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000
CVE-2017-9822,0,0,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000
CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000
CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000
CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000
@ -121219,7 +121219,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7
CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000
CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000
CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000
CVE-2018-2380,0,1,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000
CVE-2018-2380,0,0,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000
CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000
CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000
CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000
@ -168266,7 +168266,7 @@ CVE-2021-21728,0,0,abfcfb35e980ce0ce123fceadeabb11de2a6565aa607cfe8decaede24d231
CVE-2021-21729,0,0,5c8c6ff8ced38561b4fb5213780ae73d6d2e4ee4d4bd3497a9224cefdbf3446b,2024-11-21T05:48:53.660000
CVE-2021-2173,0,0,cbad9191d79c8dacc7e443e9fe440f30f6648d01ca2a701c6c89364b5fa6a3f8,2024-11-21T06:02:32.263000
CVE-2021-21730,0,0,805546dac7c11db2476efc02242c7c7b94ea7d54741ed53fcc38f5426004b5fa,2024-11-21T05:48:53.793000
CVE-2021-21731,0,1,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000
CVE-2021-21731,0,0,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000
CVE-2021-21732,0,0,4a59c0d26af0a341d194bb0bfae954d2dc535569840fc62c58a3f0cafa422cb6,2024-11-21T05:48:54.023000
CVE-2021-21733,0,0,d39f86fdb8abfb7f331c613fcef01ccdb1e34d1f0405dbae49159b55f7cc1469,2024-11-21T05:48:54.137000
CVE-2021-21734,0,0,e560ea57bd7301969ff07503d3a9d383ce9ebb441e347c6ec57d4f8a75176222,2024-11-21T05:48:54.243000
@ -172075,9 +172075,9 @@ CVE-2021-26350,0,0,b151ad9bd32b15d8044112deaab36f3ca0dfbf6a51b55074bb0eb62eb9057
CVE-2021-26351,0,0,b8008fc01be4e89c841cd24f5f0ee416865f95d380d4137dc30bd91a2162a326,2024-11-21T05:56:11.180000
CVE-2021-26352,0,0,ab39ee46f163eb98638260277895d33940ff06b51f3a31b944ba81d8a2b208ff,2024-11-21T05:56:11.357000
CVE-2021-26353,0,0,5637ff632a3b498c1f457036db6ba13123bdc71cbb024531a1453dd05a5008fa,2024-11-21T05:56:11.500000
CVE-2021-26354,0,0,afb8359f2de1c4d48f01a85c07a563279acd701d85e7c1aee8d6f6efb6cebd69,2024-11-21T05:56:11.643000
CVE-2021-26354,0,1,8defe52f712feed4770923218c01e547e2a7b510f8687131f9bfdf0c81cfe76d,2025-01-28T16:15:27.930000
CVE-2021-26355,0,0,87df23e23ac09f5c1a75cd9b9c83e1c4aa08d97e75ae820ea97e75361dd52264,2024-11-21T05:56:11.930000
CVE-2021-26356,0,0,58621feb0cff62a95114948249e4d83d288008e7dab272ab9d6732e68cd4dec7,2024-11-21T05:56:12.070000
CVE-2021-26356,0,1,e35484f3c7337754e71cdbc8e66ee5023536dcb177d34004d6c7d898d055e27d,2025-01-28T16:15:29.150000
CVE-2021-26357,0,0,824898f84032844f9aada457906e54efe49cf0b9fb16b50003a3ed0f7a34e4ce,2023-11-07T03:31:42.733000
CVE-2021-26358,0,0,2724aa6f895ca1611bf2dfa538bc4a735862bda0b10a7d6c42c75a0f3b2ca01c,2023-11-07T03:31:42.987000
CVE-2021-26360,0,0,03debf36c182b14d8d880fd25fe30df87283f6ad4feece11e09b5096431f844f,2024-11-21T05:56:12.317000
@ -172085,20 +172085,20 @@ CVE-2021-26361,0,0,405e2906167824484f5942849cd1c0fde45dd76f483d7bdbba724366a08cc
CVE-2021-26362,0,0,68be2902fdd2e33ff49b401bf6ef06ded4fe40564b6acfdf02c1e1eb43e68ea9,2024-11-21T05:56:12.600000
CVE-2021-26363,0,0,ea5e78d5bebbd15d102f943caa10ef6b8eedc44de2844a9aaf4353dcfddd2a14,2024-11-21T05:56:12.753000
CVE-2021-26364,0,0,e6fb3d205bcba6682a325d197bf3cc47348cccd3f505ce727e85b932316ecc7b,2024-11-21T05:56:12.927000
CVE-2021-26365,0,0,8a85639532ca6e6383707321f5586a4a4a5eefa41f498dd369508ebfb022d242,2024-11-21T05:56:13.093000
CVE-2021-26365,0,1,ee6ed4aad5f83e86c7cd6b0341d548715206bf9efed575bad63574af617f278c,2025-01-28T16:15:29.400000
CVE-2021-26366,0,0,94380087ac9d954f4c158efcb4c520cbd04379e9f39e66f07b4c695a34dc95f7,2024-11-21T05:56:13.280000
CVE-2021-26367,0,0,1ea318f22602730ccaa98e9a4e306701942cebc2b7fecbfd5e7b425f47955556,2024-12-12T20:41:56.120000
CVE-2021-26368,0,0,0d92ceeb9332920af33d5588a2638b208816ad8116e7123a808b6bf68ebde242,2024-11-21T05:56:13.520000
CVE-2021-26369,0,0,0b7851746bb6e9137d08d662cf27537fc49d451d615477bba77e441e22c15d6c,2024-11-21T05:56:13.677000
CVE-2021-26370,0,0,a7ed84704755abb7ce3d2ac66c14a88f2c33f9c1d390f73183d197d43e3bf895,2024-11-21T05:56:13.870000
CVE-2021-26371,0,0,336371304272808256f3bc0b82032d60538cd1d28905555ded72788cb019624a,2024-11-21T05:56:14.083000
CVE-2021-26371,0,1,4cfd02c74b5d276e911343440a0862338b92f9b49e07cd16becd5033c6d7ad42,2025-01-28T16:15:29.637000
CVE-2021-26372,0,0,be25e17ea00fc5d2ece1089a9c4bcc97dad067ecabc99b0acf185145d799d0e2,2024-11-21T05:56:14.363000
CVE-2021-26373,0,0,fb1e96954a94661dd628ced3050aadff79600f9e8135e1d18cc7703807538a0b,2024-11-21T05:56:14.543000
CVE-2021-26374,0,0,7042fb5a11054196a852163da9c3118baaf16804c5e3aa6433d40ef9c13c9a60,2023-11-07T03:31:43.320000
CVE-2021-26375,0,0,be65532e486936f60fa4bdb31dafadc80cd5d305be54619995480b13ca546777,2024-11-21T05:56:14.807000
CVE-2021-26376,0,0,695b3db039da8392cb105b41c23fb8d0eedf963bd0284f2842802098d6efd2f0,2024-11-21T05:56:15.030000
CVE-2021-26378,0,0,62247824806125562c0c0616f0cc3265c78b0f622e1042a4b96eae9d6d22abd4,2024-11-21T05:56:15.240000
CVE-2021-26379,0,0,b8313800f6e160ca2113381039ec1000d6ed25301c3bf452c5714e710db23fec,2024-11-21T05:56:15.457000
CVE-2021-26379,0,1,bfc1178be85f1381c1cbfc86368460dd4dc108703bb6b969745f154c2dd7f431,2025-01-28T16:15:29.910000
CVE-2021-26382,0,0,2d2da654b3124491842fef9f56ae115f90a0c137138c8cde0a8d0aed70409ace,2024-11-21T05:56:15.607000
CVE-2021-26384,0,0,1f20237d6382a09fa5f1dc37ef01834f52ccbe3593ec61b252043c1c927b7a92,2024-11-21T05:56:15.767000
CVE-2021-26385,0,0,f2c8b7d9db601ac08dd018e8b3647ecdeba07aaa7932dabdf667e78be8806825,2023-11-07T03:31:43.570000
@ -172110,7 +172110,7 @@ CVE-2021-26391,0,0,42611c87ccff4bbf6f45ee1fc6b299e79cdb60a1dd36495526b6538fcfeaa
CVE-2021-26392,0,0,f4506415ef34d2c668f45e5c31297fbf0939bd3be9844eeb1012259e45a2c151,2024-11-21T05:56:16.773000
CVE-2021-26393,0,0,2e2311da7e5fd6009b7462ed3e62a0b988ac096a66499352cb820075b16a39f9,2024-11-21T05:56:17.503000
CVE-2021-26396,0,0,bedc812248f4c58139b304e8b93ad2ea7faff37786b9b742fb65461bc3b55d21,2024-11-21T05:56:17.673000
CVE-2021-26397,0,0,aa409e22c666ccbe7111c5c539e6ace6debc6aa68e7f285d6355042c0f012724,2024-11-21T05:56:17.807000
CVE-2021-26397,0,1,c4fa4107a5037ab9a9f0469d5f2cc262599cc1bc6851c1b7054ebbe5ae6609f1,2025-01-28T16:15:30.127000
CVE-2021-26398,0,0,76da1b07d0263b029647edf390d6ca48e3701a1bdaa11182a148b5b4e1b14b28,2024-11-21T05:56:17.933000
CVE-2021-26399,0,0,5e5f9f405bf7acc561d0d20a58a3ac59dca0a4ba58359540a6486db890806823,2023-11-07T03:31:44.043000
CVE-2021-26400,0,0,4a32102cb86498ca7e455a6e4a03c3ad50cc1a1969378fb12c48bc088142b733,2024-11-21T05:56:18.113000
@ -172119,7 +172119,7 @@ CVE-2021-26402,0,0,2815299b7c37e3943d6674d88c5f7a0e64195ac95b53cbadbae4d15e80b10
CVE-2021-26403,0,0,f056e101d01257d133211e984177d40ff4e1e335edaa983de3e10d8f6fe36335,2024-11-21T05:56:18.587000
CVE-2021-26404,0,0,62c3a5e41312ab345a394c48f30833b633f037431cc53aeef373f8eaf65fc30a,2024-11-21T05:56:18.740000
CVE-2021-26405,0,0,e7997b4a9a2fabe8cb89ed58df54fe10de0d03f70cec1d0355c449fadafe46c8,2023-11-07T03:31:44.613000
CVE-2021-26406,0,0,b9242914004b5fffb11919435bdb0a58e8e4edc75a253d6a6f3126e1e08e109c,2024-11-21T05:56:18.897000
CVE-2021-26406,0,1,feaa91344c371f6ddb186789655602e39d41bb880480e39b01b32a784fb63b56,2025-01-28T16:15:30.307000
CVE-2021-26407,0,0,6d75501eb6986fe4542234f0e8fb50ec5ae2f34b68eb947d449a5d913abd2465,2024-11-21T05:56:19.060000
CVE-2021-26408,0,0,29ee115f3d7798592d41ee828ddef7f56abb664c496866bc3b6d3facbde27817,2024-11-21T05:56:19.170000
CVE-2021-26409,0,0,ddbeb3098844be2c4d5fea7769f72dee25eebfb5ec0c63449ab40c828c027a55,2024-11-21T05:56:19.327000
@ -186027,7 +186027,7 @@ CVE-2021-45340,0,0,67b7dfa40c57558c2fe56d97dcd3db9f8cfae2cee1fbe6330e358e988588b
CVE-2021-45341,0,0,2de15a0973665331edb58aa09fa4c2f373a1b56f1573b63f69548334253f0a02,2024-11-21T06:32:06.990000
CVE-2021-45342,0,0,daa3728d340863ce70880dcff74d3db88ab11e53a2c0edc1b0c48fd1d544d49d,2024-11-21T06:32:07.137000
CVE-2021-45343,0,0,a1c6b5bbd7ef7c2a32d363510aefaa452e19383180fa960874728799e54542f5,2024-11-21T06:32:07.283000
CVE-2021-45345,0,0,c60446c74c9cee22f504ff06527bf2ca130835c5bcc6fe83a93093463db9ca7f,2024-11-21T06:32:07.427000
CVE-2021-45345,0,1,6d83a3a1345bc5132448524f4f553d66cdfb5bf7a4a6d9082e5b3f05590d7195,2025-01-28T16:15:30.527000
CVE-2021-45346,0,0,e1e5e34e79d9e570e6d559539c99b66153e5bbfc574466f3cb7eb9e4b00595f5,2024-11-21T06:32:07.577000
CVE-2021-45347,0,0,7d1cad60b0431bd525e33329b06c6759acff05492a9829708c7462d3c3aee380,2024-11-21T06:32:07.737000
CVE-2021-45348,0,0,0d60039cf58404f1e2404fef9958e244f4299eecff3837c067c2249a785f996e,2024-11-21T06:32:07.877000
@ -187017,29 +187017,29 @@ CVE-2021-46743,0,0,fa2103decfba18c169775b329c4df44f3980df4487f48f67188fa24658174
CVE-2021-46744,0,0,966d79f5dd773839de773aacc3c163e0400034d18a4971b39e19ee38b20768c0,2024-11-21T06:34:37.347000
CVE-2021-46746,0,0,1853c7548e8b1fa53bf6723c123487c64fa2064f9a9d8f58b03b516ad6db460d,2024-10-31T14:35:00.797000
CVE-2021-46748,0,0,e58198977e83f84004306b15f2073e45f9840ae24e082c85dbe60aa2b9bea3d3,2024-11-21T06:34:37.687000
CVE-2021-46749,0,0,0a913d97adace2572982f3d04ea00e4a6dcdd1c0f91351bd00e31805326f9b8b,2024-11-21T06:34:37.847000
CVE-2021-46753,0,0,5d66659434e1c645fc7525f776880b9ebfdcf627e101f9036cbd25f31d0fdac5,2024-11-21T06:34:38.127000
CVE-2021-46749,0,1,d4f1d2736184a5a310e2336499e738df8d7c4b9e48c387fe911ae62aad62d7c2,2025-01-28T16:15:30.747000
CVE-2021-46753,0,1,5aad8c8682702c543998f0a57823d36079ee78cc662f1ee4983b8d9141178575,2025-01-28T16:15:31.070000
CVE-2021-46754,0,0,c4c7622192121c483a6dd65cb3e199e74a112c267e112e931d7ec81def35a161,2024-11-21T06:34:38.400000
CVE-2021-46755,0,0,c544c754b4881728b6daf09ae7628d8e4cda68f2b744f9d3351feca6d015137b,2024-11-21T06:34:38.670000
CVE-2021-46756,0,0,4b62f6001d47f3e1b3afa4b8d344c7f30b91163fcb6dcc2223a8dcd3e10c8988,2024-11-21T06:34:38.833000
CVE-2021-46755,0,1,e73a4a154a1c9901b9a47e2089e50ad52b479a71a7a8890c41b5d6108c7369f2,2025-01-28T16:15:31.403000
CVE-2021-46756,0,1,348edd97a5618ca4219a5eb39fe589ed996e990d11b5940259c1c9a597d071d1,2025-01-28T16:15:31.723000
CVE-2021-46757,0,0,9bb395cfc6c2cc867004a009f9eeae811c297f927d63893e956b0fe116fa2946,2024-11-21T06:34:39.013000
CVE-2021-46758,0,0,61a2c8261647305cf0c168e689ef2547a9e118bcd79bbe37e35d6250fbc1a5ad,2024-11-21T06:34:39.233000
CVE-2021-46759,0,0,ee41477de6aec6d8765a770d4587c30e8d34746d178e40b5c618fc67772ca7cb,2025-01-27T18:15:28.957000
CVE-2021-46760,0,0,2a5c5d4614a8f99d6c513f4ec337736cb9c89dbc6c65e6108bb5f09456b91415,2025-01-27T18:15:29.347000
CVE-2021-46761,0,0,673565b132841f4e40fa9ef86a4bec9a270e19da8772bf1d5a2324269de3a1a0,2023-11-07T03:40:03.307000
CVE-2021-46762,0,0,a04b8facc1f877f06c93e09fdc65010cfefddf9144e2e823bf5ac7fdfff01198,2024-11-21T06:34:39.943000
CVE-2021-46763,0,0,b3a4154b5d3dda9491a8280f0f3a10f0f913a8350d28a8bbc092421ff8c661d5,2024-11-21T06:34:40.117000
CVE-2021-46764,0,0,137705b0985a360ec3fc7919a2b15c5294e6b50e2ed47e5fbefdae6ccb67aa23,2024-11-21T06:34:40.283000
CVE-2021-46763,0,1,479096be352a86e0db261253285064059aa17860a5878ca2bd973b8e4911394d,2025-01-28T16:15:32.050000
CVE-2021-46764,0,1,97cc2002a793b3449c0141fddd218879f6c2d56385c1033c7a5b04ab5f2c8f73,2025-01-28T16:15:32.250000
CVE-2021-46765,0,0,fe1e34ba3941eb547a595865103b1e703bc3945612d81406f9f99d9b9bfebcfa,2025-01-27T18:15:29.550000
CVE-2021-46766,0,0,bccf8c60bb6c6f348913cb8600a7bf05fbe599718b959086f4540fa76b250f22,2024-11-21T06:34:40.617000
CVE-2021-46767,0,0,ed28b18ceedfc909daa60b057d370b54ffe9be04b0322bfef58c76b097fce08b,2024-11-21T06:34:40.793000
CVE-2021-46768,0,0,3efc93a3218052c35679d8d9e65810db17d49b4d3976f82dd366c1c9a2d70b43,2024-11-21T06:34:40.917000
CVE-2021-46769,0,0,7a1a9c4358d4da6d3a5a5a503a47c0f64da5787516222ecdeb21a57558167224,2024-11-21T06:34:41.030000
CVE-2021-46769,0,1,33b93ec5c624f04f870525cd2b9f0bb35757ee6cbba0aae077c8e45000d07d36,2025-01-28T16:15:32.440000
CVE-2021-46771,0,0,2db0ae4ec8923430ef43208646e80340249366137d0e8e055b8389009ce50327,2024-11-21T06:34:41.190000
CVE-2021-46772,0,0,f253f96b9b076f0e52e80ce930cbafabed8fd2e43589a011145649e2defea26e,2024-11-05T22:35:01.630000
CVE-2021-46773,0,0,2dcda26d05567ea3f98d4cd0b0d3d7d247835dc078892aafff10f254d729eb88,2024-11-21T06:34:41.453000
CVE-2021-46773,0,1,63513a81b05f40282335c1ad5fdb9049a5934240e17fcc698f866e1ae35bf4ac,2025-01-28T16:15:32.647000
CVE-2021-46774,0,0,ef64e0c599d426c07397dde560d8723094891ec90f1c70c2db374dee78a11c95,2024-11-21T06:34:41.667000
CVE-2021-46775,0,0,3af1d3c0cc4de808de2e5eedd171b4efcbbb911df46c6aaf8953ab56b926d6e3,2024-11-21T06:34:41.953000
CVE-2021-46775,0,1,4ec5da084476062caf48bd8dc8a9e49fc4f350302044cc7b382c4f33babcd08b,2025-01-28T16:15:32.910000
CVE-2021-46778,0,0,6be3a3c577cea903827adaa59850a57d29dd763234a27e93fc22fea72c5301a9,2024-11-21T06:34:42.120000
CVE-2021-46779,0,0,6e414a9d1953f67179d4647211e0d91f5ee590ddd6e2b5413ba639c86c44d749,2024-11-21T06:34:42.400000
CVE-2021-46780,0,0,5cd689ffb43f9985a355d5b276e32b9b23083b973e5faff72d29a0c4e217261f,2024-11-21T06:34:42.517000
@ -187053,9 +187053,9 @@ CVE-2021-46788,0,0,32e89ce10b2a5a6977e6ba307ec05c390d77e5524ada8597a176045dbb24d
CVE-2021-46789,0,0,3ac1770c8993487da9af7040eb1c2919779dce70f3686c5c80e66317975d391b,2024-11-21T06:34:43.503000
CVE-2021-46790,0,0,7e330ae8c3f4d1c058580fe6c8a9bdbcbc9daeafea6603075154115df9816bd7,2024-11-21T06:34:43.620000
CVE-2021-46791,0,0,26ea3d4deeb4ec718e57ac570254f4718a9a548779641a26074761ff235973a2,2024-11-21T06:34:43.797000
CVE-2021-46792,0,0,91ad78ec6757239e7ba562d67d03e899159ac0ad101ed1f7429a398de1dbedd6,2024-11-21T06:34:43.910000
CVE-2021-46792,0,1,c5b9352751c00f82141d975ab6c0b5a7450e38b6f2f972d7d7e39acf69c2e3d3,2025-01-28T16:15:33.137000
CVE-2021-46793,0,0,e31da4ac5f6a9fc6c82e49990ef734ebc97a722e9d7f320aacc22fbf42c60b81,2023-11-07T03:40:04.037000
CVE-2021-46794,0,0,e9398965d6397530d85ca3f201382c88ccdd2f4eb376fa26abe2c70120b53cf3,2024-11-21T06:34:44.127000
CVE-2021-46794,0,1,069e0c9bf5ce399233af0e9e1124f538751b0b62e35288de0a0b8b70ed817523,2025-01-28T16:15:33.417000
CVE-2021-46795,0,0,4cecf02bd2414d0376c91c7b6849803dfb1df0cbf00ab89ca4098ecd3bbecd7f,2024-11-21T06:34:44.410000
CVE-2021-46796,0,0,61c2e0baace0a2922ea57f96ad4127821a5952b70ab20bb119c777cccd3dab86,2023-11-07T03:40:04.300000
CVE-2021-46799,0,0,69658fdcb21bb92bdd7a40098b5b3f97e640d3443f4cc75a23167e0a1f89d8c0,2023-11-07T03:40:04.533000
@ -193354,7 +193354,7 @@ CVE-2022-23814,0,0,f221c5fed4ea708846f64cdec0979e1d7c60492ed369edb82988b96c17bda
CVE-2022-23815,0,0,32f2b2413eb325d507269c9820e0d2bfd57ac1be30f822aa13e6954e84ddb889,2025-01-03T18:04:08.963000
CVE-2022-23816,0,0,b3e8a185ce7f00305c2d16541dec1c202970fddb180fd72b9358d6be7b074a1f,2023-11-07T03:44:19.220000
CVE-2022-23817,0,0,3b71e6ec45f6acd0944fe7938d40f55066aaaf507fdda7d54104f1b4d447e14b,2024-08-16T21:35:00.430000
CVE-2022-23818,0,0,3856155fdefaac51ecc607bd8de135bb8597bd18819ab757f9565a89af093b21,2024-11-21T06:49:18.543000
CVE-2022-23818,0,1,dfb8ea6bafd615661a9e37e388ca178e1dc41ef80c949ed979fd828a3c041590,2025-01-28T16:15:33.747000
CVE-2022-2382,0,0,a9d43a93a32c7abc4fff5c15bd4f62f758d289c1554be08676b4ec85e8c88f6d,2024-11-21T07:00:52.790000
CVE-2022-23820,0,0,89f9b7d2e354e64d01dcc7dd790fdd76a02c40f5ef6e3c92758a9c06a8b3001f,2024-11-21T06:49:18.690000
CVE-2022-23821,0,0,3cd80f7c80135f029aa98cf0408d6bb892e9d6156659ee6944f2c1a7c7fd94fc,2024-11-21T06:49:18.963000
@ -201371,7 +201371,7 @@ CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881
CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000
CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000
CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000
CVE-2022-3365,0,0,e21e3d9a50e1a8f3411fc09e903ea37e9ab2e3dbe6644212bc7fcd6140ebe0ff,2025-01-28T01:15:08.277000
CVE-2022-3365,0,1,58ac0ea17e907ec681d70aa00994d0452cd8d41ea4da0c2336898fda59f06e51,2025-01-28T16:15:34.643000
CVE-2022-33650,0,0,8ce80787b8df19552561bb21e3ad24057869ada7a0f0f982878d44e02b7ceac8,2024-11-21T07:08:15.140000
CVE-2022-33651,0,0,9a318cb6a42b4e621fd1d5fee25d959d8bc2f3e44dc0a50b3ab6016651bb5f61,2024-11-21T07:08:15.250000
CVE-2022-33652,0,0,f5146da1cfd413adcad997798a0d1b636c0788d5c4cd20b5dffba13a0f13cee1,2024-11-21T07:08:15.363000
@ -204955,7 +204955,7 @@ CVE-2022-38087,0,0,3abd9f1efeb6184561ade4ca91955afc6a42c4485df9d83f9557afd1b4a29
CVE-2022-38088,0,0,ca06efd770cad06ce74aa550e159e1a37d8432f883844dfb1879ee2073417ea5,2024-11-21T07:15:46.093000
CVE-2022-38089,0,0,fbebd59a44614d844bdd1281aa173d01ac7fba6affa8a38247007f4774ddafe1,2024-11-21T07:15:46.230000
CVE-2022-3809,0,0,ff70c64279d205ec14140d3115cd9cddf693be8d216ea456e4f6ba13b68b3b59,2024-11-21T07:20:16.623000
CVE-2022-38090,0,0,1b46d51929e4cbf3b96883577926f4f84ab2add0cfc292756e5ff1ffe94d04de,2024-11-21T07:15:46.340000
CVE-2022-38090,0,1,69e39827219e628e62c50ece37bdecfc105f724fbcd1208bdcedc8d1e475483e,2025-01-28T16:15:34.100000
CVE-2022-38093,0,0,8b19a88b2225b156c4fa828402c7d106334aa2d5dce74ac85ec91283a9763098,2024-11-21T07:15:46.680000
CVE-2022-38094,0,0,1596fd8416a957c74e2779d3056ef236ac7255f4d9105be9b3e22e18e10d14ab,2024-11-21T07:15:46.820000
CVE-2022-38095,0,0,935eee8e648def7e11b80f97b75aa432008f2a9150fc79762d7a375cd170d267,2024-11-21T07:15:46.947000
@ -206362,7 +206362,7 @@ CVE-2022-40073,0,0,e70cb5d8371fd7f2d3adb545818d1342b3d91ca78a490d67a70ba3cef3b61
CVE-2022-40074,0,0,e6681222f196869647c103fb04c2071fb9eb5b2878fc4661c5940517bffb4565,2024-11-21T07:20:48.497000
CVE-2022-40075,0,0,528238a21c223c94fd7e677a83885dfb032391305d3ea4dd2958f5640e7c5ad2,2024-11-21T07:20:48.647000
CVE-2022-40076,0,0,c046b91313e33d852e787506d4c9c3b2814c879e207d5c27f199fbb28002715c,2024-11-21T07:20:48.800000
CVE-2022-4008,0,1,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000
CVE-2022-4008,0,0,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000
CVE-2022-40080,0,0,0b19a6ef973056f75152ce2a1f048e7f1573677c516306567b89503bb7ee2bef,2024-11-21T07:20:48.960000
CVE-2022-40082,0,0,56e76875663e98850cea47c91ae372970f7a80cab7e0f217ec87951590fd2597,2024-11-21T07:20:49.127000
CVE-2022-40083,0,0,00c52ecc769d6134409ef73ebc9833bdb81527bec230aa202b259398d890e40a,2024-11-21T07:20:49.287000
@ -215392,11 +215392,11 @@ CVE-2023-20513,0,0,7776ff01f91e5878655445e9bf7052bf6adde2a07843f41e59f135f097f32
CVE-2023-20518,0,0,ec4070e10bb6753c589b73fc8777b131da82d0da8c8e27a0d18ea12dd1178ce6,2024-11-05T17:35:02.627000
CVE-2023-20519,0,0,334e6205bc50dbe0dda46e080b5512b64b8b838d7dcef69d9c0e3875cd92a55e,2024-11-21T07:41:04.023000
CVE-2023-2052,0,0,1e4161388b9b7a198878f66cab1655514d5646eef4374ad14c045ae17d5ec328,2024-11-21T07:57:50.540000
CVE-2023-20520,0,0,63343e4ec485c0f35dd1069c649168e45984a37c50b1106499e6e21fca01f082,2024-11-21T07:41:04.147000
CVE-2023-20520,0,1,8b30bccd7dd50b04b95a81ed05805a037cf85a960461a992bc08e26e7898f311,2025-01-28T16:15:34.843000
CVE-2023-20521,0,0,fd93d0eb15c7822b1e307405ea23c5525a309ac03121fd6ca1496347bc964642,2024-11-21T07:41:04.330000
CVE-2023-20522,0,0,45ab4766b0c799ec350aaab1c9149b610d74aaf2902c726aa2f87b62daabd46c,2024-11-21T07:41:04.570000
CVE-2023-20523,0,0,faf481ef2dec80ed2f9cf8bf737a8a589661c03510549746aae65d6cddb4ed95,2024-11-21T07:41:04.690000
CVE-2023-20524,0,0,a223612a0119bdb75bc5994e7c8ec19fd9f2a965e0f4af6801d42111c901442b,2024-11-21T07:41:04.847000
CVE-2023-20524,0,1,8dd904eba1fe12b22384e0421fdd5d9210eb70700d452ad2d82329ad316a8e56,2025-01-28T16:15:35.090000
CVE-2023-20525,0,0,86c19920bc8621b58e18b962b69881982e158b4b8e0eb076ac7dcabc76932145,2024-11-21T07:41:04.990000
CVE-2023-20526,0,0,065150ad67194ab22fd8f2de5ccab3cb453cca06282056be34e89b36bbac36ec,2024-11-21T07:41:05.137000
CVE-2023-20527,0,0,f5f779927233cf2a2b45f2d1f1cc4bd6bab52ac6416c9a4f508b379c9ece5690,2024-11-21T07:41:05.310000
@ -217169,7 +217169,7 @@ CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794
CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000
CVE-2023-2236,0,0,7a218227d81da1e3f369ef4b8f9cd06e52cc34b359f143c1afab0c2fd8539745,2024-11-21T07:58:12.760000
CVE-2023-22360,0,0,fd39a65648711ab8fca8410196aa194e55218a4b817fbfbb522e25878ac6b54a,2024-11-21T07:44:37.927000
CVE-2023-22361,0,1,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000
CVE-2023-22361,0,0,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000
CVE-2023-22362,0,0,c3ba0f65014999f63dd9643dd347ae876cd94a8ac19156266e3221f4ca257c83,2024-11-21T07:44:38.150000
CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16ac60,2024-11-21T07:44:38.263000
CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000
@ -217247,7 +217247,7 @@ CVE-2023-22438,0,0,5703d0c4eb5aa393e07fb85a45fb079e2501bb28ea84b28790691f2382e31
CVE-2023-22439,0,0,ca68d33d01cfaf8fae9ea4cc43a47b0f92b3a227512f3203fc183a193b04683b,2024-11-21T07:44:48.323000
CVE-2023-2244,0,0,9025fdc5a6a759ed98b80fd24d007a79e81c2dab5fc8cbc2e2ac71984ae522d5,2024-11-21T07:58:13.680000
CVE-2023-22440,0,0,c5ec718ecf01186f250ace3719ba2ad09a9b09feb1366a6ca10e80d692ebffb0,2024-11-21T07:44:48.453000
CVE-2023-22441,0,1,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000
CVE-2023-22441,0,0,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000
CVE-2023-22442,0,0,29a9cdca2e21aa6d398bb690de439ba4d4d2ddb0ea81a01806255dac3a21ff10,2024-11-21T07:44:48.687000
CVE-2023-22443,0,0,9fddab8612d3067f0d4cebc1a90128c8533756620471b9c208288be6aa2f41d8,2024-11-21T07:44:48.817000
CVE-2023-22444,0,0,20b223dec4ff7bd0b8efd2978a9b7375e7a68fedd8b267f92dd20c6f584cb0c1,2024-11-21T07:44:48.947000
@ -218407,7 +218407,7 @@ CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fca
CVE-2023-23899,0,0,83c684d5a0c0153ca536e41b4b1ec7ab525d48af8abf9c727f10c646f36b7714,2024-11-21T07:47:03.583000
CVE-2023-2390,0,0,0b3933c68aac4c6dd381bee40c06fb4fbff5d2442ca411a48ccacdd9579faa67,2024-11-21T07:58:31.300000
CVE-2023-23900,0,0,bcb049b1d07fa99f1c9c7b07a1a1e31428f3d9389488a84b2a6b57255ec7a77d,2024-11-21T07:47:03.723000
CVE-2023-23901,0,1,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000
CVE-2023-23901,0,0,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000
CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000
CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000
CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000
@ -218968,7 +218968,7 @@ CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4
CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000
CVE-2023-24584,0,0,450b8fe4752031bc85f08e6e3249bd441ebacea296c3154e9791a18ef187d89e,2024-11-21T07:48:10.787000
CVE-2023-24585,0,0,8daffcf761a5e332fbb31dd00952f08646614a1fe870f4d740df8552f3a0ab79,2024-11-21T07:48:10.920000
CVE-2023-24586,0,1,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000
CVE-2023-24586,0,0,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000
CVE-2023-24587,0,0,292e05491f18fcd1c7e0ecb44788f9081cc8b8543f871a74f452e2948d572e7f,2024-11-21T07:48:11.237000
CVE-2023-24588,0,0,4a357365b75707750f9002dd1d54b5c251abd9b6ecad45bb39848b8c6c0c240a,2024-11-21T07:48:11.380000
CVE-2023-24589,0,0,098dfca42c558b814e364ffb8a37e58cbd9b62cb01477fa4e47746b32480f74b,2024-11-21T07:48:11.503000
@ -219354,9 +219354,9 @@ CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b57
CVE-2023-25067,0,0,6ee55e97fa7054de1cfb0e958d38df776cb2a1824dea0f5315ab298b89f915e2,2024-12-09T13:15:23.200000
CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000
CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000
CVE-2023-25070,0,1,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000
CVE-2023-25070,0,0,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000
CVE-2023-25071,0,0,e4fa2c8e71ed3ebf0e69731ddfba75b34ec50abf37f9a0a35ca7af0e752253ae,2024-11-21T07:49:02.867000
CVE-2023-25072,0,1,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000
CVE-2023-25072,0,0,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000
CVE-2023-25073,0,0,faa56cf615949f57edd90ef85627d225940d3db6a28bd01dd46fbace2f38bd3f,2024-11-21T07:49:03.120000
CVE-2023-25074,0,0,f9fc176b6b7e8915167411663c245628ea6a10ef6d26394f4ea82c7839d24074,2024-11-21T07:49:03.247000
CVE-2023-25075,0,0,25335c7983447de1bb2c448769548c7ebd749f93baae0786465db7e2ad0a1e95,2024-11-21T07:49:03.390000
@ -219475,7 +219475,7 @@ CVE-2023-25180,0,0,9c594a57ef3362d5c7f529a93ac159a56bac306f4849dec68b36e434e1827
CVE-2023-25181,0,0,29d437748b5b0b1191ee76bfc7f9056117c6702ccb85aae9719438ec4611f4c4,2024-11-21T07:49:15.940000
CVE-2023-25182,0,0,a11de1df0cacaf51b756500b43ba70b812535157065deee5df3b307e1abe5a62,2024-11-21T07:49:16.057000
CVE-2023-25183,0,0,9dc08ea2e0bd8f00745279ad28938358f2df63ccf7df8fba93b0e55bb61f5733,2024-11-21T07:49:16.180000
CVE-2023-25184,0,1,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000
CVE-2023-25184,0,0,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000
CVE-2023-25185,0,0,654ebd21078f1c5996fb55f66ebecc642265579f6eb0f98fcb3a07307e5d9a80,2024-12-12T22:15:06.247000
CVE-2023-25186,0,0,ec4420d7c1ea5324e6f0bd6478cba82abfdf0c84215571aee85ba5a2b42cb753,2024-11-21T07:49:16.570000
CVE-2023-25187,0,0,d19d0068cef419b7b1f2d261c4666d21e822db83b39c37d7957fec0cce6817a9,2024-12-12T21:15:06.680000
@ -219795,12 +219795,12 @@ CVE-2023-25642,0,0,e8ced01f0b7a93d97b1fccad86986e0a1030c461d9fee8295cbc0d3751ced
CVE-2023-25643,0,0,18dde583afda8da6447b7fc5d9bab3401cd028b66fb92fef8944c7d4aaf81dd4,2024-11-21T07:49:51.263000
CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac60e,2024-11-21T07:49:51.387000
CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000
CVE-2023-25646,0,0,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000
CVE-2023-25646,0,1,6b070d65d4a80d6a727ef95f1c7a9714916cf56c439f39d80e49bfad0caef4a1,2025-01-28T16:29:58.553000
CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000
CVE-2023-25648,0,1,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000
CVE-2023-25648,0,0,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000
CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000
CVE-2023-2565,0,0,b533c314e7bdbee51b7919f7d466927cc9624d83669f7284a3c70d8e5a7890eb,2024-11-21T07:58:50.483000
CVE-2023-25650,0,1,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000
CVE-2023-25650,0,0,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000
CVE-2023-25651,0,0,8041ab7732534a3f15abe3d8b3c1a9f1432cc679b3c9dabd96eb7471cf125d9a,2024-11-21T07:49:52.290000
CVE-2023-25652,0,0,9a2af3222703b12c596f16fed6f83ee7a9f2704131e4c9d1c16f143419251b78,2024-11-21T07:49:52.417000
CVE-2023-25653,0,0,c79c2b8a5628263bd2bb95a4a5d5f1d09456b445a09ad3bb8cd4d64fe5f77c3b,2024-11-21T07:49:52.583000
@ -221155,7 +221155,7 @@ CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9d
CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000
CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000
CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000
CVE-2023-27385,0,1,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
CVE-2023-27385,0,0,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000
@ -221284,7 +221284,7 @@ CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0
CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000
CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000
CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000
CVE-2023-27510,0,1,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
CVE-2023-27510,0,0,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000
CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000
CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000
@ -221301,7 +221301,7 @@ CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829
CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000
CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000
CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000
CVE-2023-27527,0,1,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000
CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000
CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000
CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000
CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000
@ -224583,7 +224583,7 @@ CVE-2023-31677,0,0,bcf3c7e10e2a63db542637c44b6af1d38b0f7b06834e48fd76d2c43aaf0c4
CVE-2023-31678,0,0,f38078099aa2cae4702ad7ad25370979047193087a4a1644b1f1a43716d2c986,2025-01-23T17:15:12.187000
CVE-2023-31679,0,0,cd77c7d833b81e176fd505de111957b2b2546fa3a06e3b2d516e61678dbdf298,2025-01-23T17:15:12.350000
CVE-2023-3168,0,0,1bd92a1174d3d25efb01791dc24e9721f58f20da4ecaaad50c6cc157e99ec726,2024-11-21T08:16:36.643000
CVE-2023-31689,0,0,e1a0688f6f537b7c1fa56c9ec182be01ee7169349e51aec1bda32ba01c926cc0,2024-11-21T08:02:09.323000
CVE-2023-31689,0,1,ba8ce1ec50f7bc59bc1742bfc8237c05e6e92e1170aca920f92d2135a234a4cc,2025-01-28T16:15:35.497000
CVE-2023-3169,0,0,c91442e162ed6b40e2ae0d4cb311993a8a2c9d900971320a57eb9faf25b7a47c,2024-11-21T08:16:36.763000
CVE-2023-31698,0,0,8c41f620a0b0851f781e3f3c6cb4ecc9f44b43d68037b88e96fa4ec01608a58d,2024-11-21T08:02:09.457000
CVE-2023-31699,0,0,53129eaf3a83785c0fc3132ffe189c5da80a64b39e9211df74592a9f2bf7e5c6,2025-01-22T18:15:17.453000
@ -224614,7 +224614,7 @@ CVE-2023-31729,0,0,fb850d7e9530696277b89467d42b2446bbca42462c9d5510c48ec451f9e2b
CVE-2023-3173,0,0,022677952ebd42989b06e1597f2563b8948d7c0602e4beeb60f1c2aa27971ff0,2024-11-21T08:16:37.493000
CVE-2023-31740,0,0,80e7b9a45904c8543256467b80a91316d59d9a1749284741343b92ae51a51232,2025-01-21T19:15:10.353000
CVE-2023-31741,0,0,b89581e0d2046fed9493237ea7dce65f515c3b7ec5a3eb03b769c3cda9c77a61,2025-01-21T19:15:10.547000
CVE-2023-31742,0,0,4c39e5d01348f84c495d575eca9ea50662e51a5fe50b47b11a8aff9ab90a53ef,2024-11-21T08:02:13.737000
CVE-2023-31742,0,1,79ae55d4c3ed67071ad7042d27cdc3c91046849382fbcf8c726d2f9ec10108ab,2025-01-28T16:15:35.723000
CVE-2023-31746,0,0,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfdb61,2025-01-06T17:15:13.100000
CVE-2023-31747,0,0,b8b56959c6373967e26817aac4b6c53e61c1c72f4122342a10fe51993e0cd879,2025-01-21T19:15:10.737000
CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000
@ -225339,9 +225339,9 @@ CVE-2023-32564,0,0,0110939bbbb296f8a1f1c00eaf9f1d011e42a76f4d099cf6325379b063f2f
CVE-2023-32565,0,0,c758dc41ed02cd23af8831add347bf021d7a6870c2092336f155e1024b96d95c,2024-11-21T08:03:36.767000
CVE-2023-32566,0,0,5b005c26bbcaa68d97a8a9cddb900380525a4257f5c8b9c6d97371f57050c466,2024-11-21T08:03:36.887000
CVE-2023-32567,0,0,e0546d57e233b6a00a0c74841e953885d4a8160cbd2f9b3978b168ecf27ba260,2024-11-21T08:03:37.007000
CVE-2023-32568,0,0,4ec2577b59d133a1c8bbbb0b243257f68ebc439eba98303245c7e96d39392477,2024-11-21T08:03:37.133000
CVE-2023-32569,0,0,d6b9bae9b3c4eb94354882bc9fa141696546622ccd5e7ff303745011c179701c,2024-11-21T08:03:37.287000
CVE-2023-32570,0,0,1a1ee02218f84d3f8f62a376ce6c3dcf84497e7066d7437194a67436cd308025,2024-11-21T08:03:37.430000
CVE-2023-32568,0,1,ce2d5346fe68a1f1977bffced979f73ebcfd87233aa06bbd0e8906139a442807,2025-01-28T16:15:35.987000
CVE-2023-32569,0,1,858a8b493283d46c6983789bd883cdbd6b0dc7af409eb35c4de645aba27f5c05,2025-01-28T16:15:36.150000
CVE-2023-32570,0,1,99af3003c5e35828644727ab1f19d14a509d00b4a9a41710ed0f84a197c03ee2,2025-01-28T16:15:36.333000
CVE-2023-32571,0,0,1014efdf87437be49397d72af75e29ed93957fc73be6bc4c6eaf7c7e362bb8ee,2024-11-21T08:03:37.590000
CVE-2023-32572,0,0,9a61e2958a4814e7739c5bca06ec91ce656d578c176075880f69c1b3ad5a82b6,2024-11-21T08:03:37.737000
CVE-2023-32573,0,0,a1532dcaac2f177cf96f0e0d15e4ce0b45ae7dbe247505f8db1e4bc642cf5590,2025-01-27T21:15:11.243000
@ -232490,13 +232490,13 @@ CVE-2023-41772,0,0,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6
CVE-2023-41773,0,0,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000
CVE-2023-41774,0,0,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000
CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000
CVE-2023-41776,0,1,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000
CVE-2023-41779,0,1,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000
CVE-2023-41776,0,0,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000
CVE-2023-41779,0,0,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000
CVE-2023-4178,0,0,1141fd40ba18bee37e1c42fae821d1b64549ca6cc2a33d2a55286ccb58509271,2024-11-21T08:34:33.433000
CVE-2023-41780,0,1,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000
CVE-2023-41780,0,0,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000
CVE-2023-41781,0,0,19fc06020fc9ee508abcb1f4254ac105cd846b8768551d2051e133fcf7cc9f16,2024-11-21T08:21:40.457000
CVE-2023-41782,0,1,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000
CVE-2023-41783,0,1,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000
CVE-2023-41782,0,0,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000
CVE-2023-41783,0,0,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000
CVE-2023-41784,0,0,a8ebf61f8b77dfe47b65c2a49d655477006d0f22c6688955b05553cef45f4c1c,2024-11-21T08:21:40.887000
CVE-2023-41786,0,0,679e1ab2a11d5095960d26f95e0bea184bf9a762765b891d0eb540ee9417bb2c,2024-11-21T08:21:41.023000
CVE-2023-41787,0,0,538197acdb53a2536c302129254e1b8e381ed654db4bfe21b17f47a8b5eaa3d2,2024-11-21T08:21:41.150000
@ -245073,8 +245073,8 @@ CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a
CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
CVE-2024-11954,1,1,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000
CVE-2024-11956,1,1,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000
CVE-2024-11954,0,0,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000
CVE-2024-11956,0,0,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000
CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000
CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000
CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000
@ -245680,7 +245680,7 @@ CVE-2024-12717,0,0,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275a
CVE-2024-12719,0,0,6e113e19479495992fd0f698aec2463ab1e0a34cf6f80cb6f4fc67b14c63b540,2025-01-07T10:15:07.323000
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000
CVE-2024-12723,0,0,cf512e4db24e5978657de7d385acad4042bd6d708f13d756e3aac43342c38eb6,2025-01-28T06:15:31.370000
CVE-2024-12723,0,1,5f12518e7f9f0df8a91b8296f6f86b0b561b4474759814a3fb8c7b64943255ad,2025-01-28T16:15:37.430000
CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000
CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000
CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000
@ -245728,7 +245728,7 @@ CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf
CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000
CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
CVE-2024-12807,0,0,fa880fedc4c863866634d2a0780beaa56e686b63fa7ec5a788046683be0dcc3c,2025-01-28T06:15:31.680000
CVE-2024-12807,0,1,ddbe1339bdc0147fc12b37b5f5fb8455c3f845277526b2584620ced7a2147952,2025-01-28T16:15:37.633000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
CVE-2024-12816,0,0,79eb2dd90c9c17b3c2a7f3ee70302afe651f99aae7099dfbb75f3ebb64366af3,2025-01-25T08:15:08.137000
CVE-2024-12817,0,0,32f9e7e0f8e1095319b7a827501ce7d109efcd2bf6309a60da88244f6164d371,2025-01-25T08:15:08.300000
@ -248689,9 +248689,9 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6
CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000
CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000
CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000
CVE-2024-22062,0,1,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000
CVE-2024-22062,0,0,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000
CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000
CVE-2024-22064,0,0,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000
CVE-2024-22064,0,1,8d540dd94bb5f229f66fba83ffdffbac152147b35ab3dd7610555afda1d84b7b,2025-01-28T16:12:31.863000
CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000
CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000
CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000
@ -249793,7 +249793,7 @@ CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277
CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000
CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000
CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000
CVE-2024-23591,0,1,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000
CVE-2024-23591,0,0,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000
CVE-2024-23592,0,0,ef014cbf8808263f731f61b0bea284cf199deacfcf795438ec07cedc3d97e15d,2024-11-21T08:57:58.270000
CVE-2024-23593,0,0,1669104ef0f6d536595a3f0242aea2e399af734f766398709f067343dd11f88d,2024-11-21T08:57:58.400000
CVE-2024-23594,0,0,1f0e1d4dfefab44adcf5b5a1aea994e7319979d868c10f29cf8eb184905dd76b,2024-11-21T08:57:58.520000
@ -250131,7 +250131,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa
CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000
CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000
CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000
CVE-2024-23953,0,1,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000
CVE-2024-23953,0,0,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000
CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000
CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000
CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000
@ -258575,7 +258575,7 @@ CVE-2024-35294,0,0,1c6f1605fc3c9904bc421a18ad31d4464fc1e4554d4917d8dd1c25b7a0d02
CVE-2024-35296,0,0,40769f470665a8f5701939f0eb28f8f5b53e116a5eb768803583af8eaa677464,2024-11-21T09:20:05.773000
CVE-2024-35297,0,0,23e69c7fa8758d2839ba0f21232e1c70c9a4debd79526bb77618b215f0e86ca8,2024-11-21T09:20:05.907000
CVE-2024-35298,0,0,fa7788bf317a71a84bf8146795eafa26bcb4ed57f180f49f693caedd58415924,2024-11-21T09:20:06.100000
CVE-2024-35299,0,0,66ebbab2b0a692e2b1d921e2a31108ce541366992eb29d6d2df1746eef7b2b2c,2024-11-21T09:20:06.297000
CVE-2024-35299,0,1,0ce5ddda10cf58c6e1ac79722bb6069b8f6eded11917b404a1cd1e7eb3548184,2025-01-28T16:35:03.737000
CVE-2024-3530,0,0,19a26ee56ded29d2e11b10a192b107effee98b98e60c5d0c5a925841596c5055,2024-11-21T09:29:47.480000
CVE-2024-35300,0,0,8476854df88ded7ab4fe4db1007017684a43223b3513105c5d461b5e9e5fe242,2024-12-16T15:48:36.930000
CVE-2024-35301,0,0,3aa290a2314ba6b70fc37ae1db563a8252a1099fb3aea3ee731b4ca2cd8d2137,2024-12-16T15:51:28.007000
@ -261570,7 +261570,7 @@ CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3
CVE-2024-38909,0,0,b15b2d0b578ec22ef9b768dfad1ac7e18a3e7777eb1f844ceb5682377b647733,2024-11-21T09:26:59.560000
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
CVE-2024-3892,0,0,168f6aff52bfffda49f624381b72994cf29f64be38888e2b464dc312a00a3830,2024-11-21T09:30:38.637000
CVE-2024-3892,0,1,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000
CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000
CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000
CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000
@ -264305,7 +264305,7 @@ CVE-2024-42852,0,0,b81891c57cec62244510e3d84ae796ccaf7c41b7c9858039dc7f4522044e0
CVE-2024-4286,0,0,fc10432f74acfd23bc16db5ad2ae8d1fb5ffa13fb0db5216eff98611dc6693fd,2024-11-21T09:42:32.600000
CVE-2024-42861,0,0,c171ccea5ad776c157b3e5743fbc5040713688f83926001b0f23825a30a4e8b5,2024-09-30T17:35:11.653000
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
CVE-2024-4288,0,0,a90edbd9d891b348809fde369462e544cf47349997cd076b1f05ba954e1b5203,2024-11-21T09:42:32.860000
CVE-2024-4288,0,1,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
@ -266179,13 +266179,13 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44
CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
CVE-2024-45336,0,0,3e7ae3add87fdedc39007439173db0ef558280c47154def679c01839605d6db3,2025-01-28T02:15:28.807000
CVE-2024-45336,0,1,58e68f7c35a3e0d7bbc9bde00e471a0d85b4ad129fcd4b117e8ad183ef45a26b,2025-01-28T16:15:38.220000
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
CVE-2024-45339,0,0,1278bba7c73d64a4463ca6a2d25240e7cccf0db0f2382bb80d4dc77aec2a5b1b,2025-01-28T02:15:28.927000
CVE-2024-45339,0,1,2657449aeecf358a747d3833a8bad48d5c5984d5d31941c928f3a6165aa77854,2025-01-28T16:15:38.367000
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
CVE-2024-45340,0,0,2c4623ca46a98e086eee38c98fc33ffd94922e7be2544c8d0cbd2745609b8d3d,2025-01-28T02:15:29.050000
CVE-2024-45341,0,0,0809e593d93d0e45831640bffac5034f296f07d3c2d59a6a5ba0ce3172378a9c,2025-01-28T02:15:29.147000
CVE-2024-45340,0,1,b5aab4b2896907244da5a423def985944e88d20aed34eecfddef8969458a8ed7,2025-01-28T16:15:38.517000
CVE-2024-45341,0,1,9c3af9974b32c4ca5b0cd4e0c752d66cd7aeaea007c41b684aa86af58604ba05,2025-01-28T16:15:38.650000
CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
@ -269988,7 +269988,7 @@ CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85
CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
CVE-2024-50664,0,0,1fdbd6c57bb31afbb483101d6ed8dc43655bb3434beb0c6c63777e5dea4eb589,2025-01-23T22:15:13.667000
CVE-2024-50665,0,0,9bff4b7cd271941bca588d7fef13aaa9a06c4a4cba1b66a32d4c74182b27ff2e,2025-01-23T22:15:13.790000
CVE-2024-50665,0,1,e23cfc84806902554f96be5a4f6053908a31047113bc4150b656a3b0c69a6b9b,2025-01-28T16:15:38.797000
CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000
CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000
CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000
@ -272473,10 +272473,10 @@ CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000
CVE-2024-54475,0,1,775ec2ccbbbc7d76f505a322b572f9baa34329391d668720ed36223c584406df,2025-01-28T16:15:39.167000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000
CVE-2024-54478,0,1,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000
CVE-2024-54478,0,0,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000
CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000
CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000
CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000
@ -272493,7 +272493,7 @@ CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d05623
CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000
CVE-2024-54497,0,0,6c931e88af4ef1b6e785f08151bbc21af8defbb5ea02edf8fcb1c5cf3270c15d,2025-01-27T22:15:12.583000
CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000
CVE-2024-54499,0,0,1587a813e75a49803d367936d691c19e3eeb984364f69f6aabb295d83310b09d,2025-01-27T22:15:12.680000
CVE-2024-54499,0,1,c133d3f15988c5ac34c810762fe5ec20ea83eda4ebf16dbab8404963c417b3f8,2025-01-28T16:15:39.303000
CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000
CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000
CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000
@ -272502,7 +272502,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df
CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000
CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000
CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000
CVE-2024-54507,0,1,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000
CVE-2024-54507,0,0,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000
CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000
CVE-2024-54509,0,0,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000
CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000
@ -272513,34 +272513,34 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
CVE-2024-54516,0,0,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000
CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000
CVE-2024-54518,0,1,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
CVE-2024-54519,0,1,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000
CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
CVE-2024-54519,0,0,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
CVE-2024-54520,0,0,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000
CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000
CVE-2024-54523,0,1,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000
CVE-2024-54523,0,0,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000
CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
CVE-2024-54530,0,0,da8332735200c0a6f862416fece7f7fc7e57b57e342ec63f5a3515be83c84585,2025-01-27T22:15:13.753000
CVE-2024-54530,0,1,b2115a5253c8f295f8da3ec0a11eca80d9250abe9135d8d48e4eae4b7c3c1fb7,2025-01-28T16:15:39.450000
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000
CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000
CVE-2024-54537,0,0,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000
CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000
CVE-2024-54539,0,1,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000
CVE-2024-54539,0,0,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000
CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000
CVE-2024-54541,0,0,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000
CVE-2024-54542,0,1,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000
CVE-2024-54542,0,0,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000
CVE-2024-54543,0,0,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000
CVE-2024-54547,0,0,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000
CVE-2024-54547,0,1,2ce7ebd8dc7ed2fc58eb2f77522780dacbba66c07b08536995b0bed9a41a2ed7,2025-01-28T16:15:39.603000
CVE-2024-54549,0,0,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
CVE-2024-54550,0,0,e813c3b2e30fbc9af78a93fcf3f62083567d452d1e62ce7ff0c3c5068da641a6,2025-01-27T22:15:14.580000
CVE-2024-54550,0,1,cf2419cf86ce3280d8018811b8a0a12cf59a849c3ad266419d3ac3c972049bc4,2025-01-28T16:15:39.773000
CVE-2024-54557,0,0,0497db03b589d583d836efddd0e32b6368ca6e56450d80e21c65082431a6c35b,2025-01-27T22:15:14.670000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
@ -272703,8 +272703,8 @@ CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000
CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000
CVE-2024-55194,0,0,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000
CVE-2024-55195,0,1,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000
CVE-2024-55194,0,1,c38cb72c8f81c8ae4f496dafee53f7ca664e363ce35004199c8c73fda469a1f8,2025-01-28T16:15:39.927000
CVE-2024-55195,0,0,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
@ -274536,7 +274536,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f
CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000
CVE-2024-6351,1,1,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000
CVE-2024-6351,0,0,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000
CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000
CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000
CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000
@ -275878,7 +275878,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac
CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000
CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000
CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000
CVE-2024-7881,1,1,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000
CVE-2024-7881,0,0,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000
CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000
CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000
CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000
@ -277777,6 +277777,7 @@ CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb6
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000
CVE-2025-0432,1,1,9f823e7859a9303a996b3c64743c4232542833d3a53d421588a9d745c50d603e,2025-01-28T16:15:40.183000
CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000
CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000
CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000
@ -277880,6 +277881,7 @@ CVE-2025-0638,0,0,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d
CVE-2025-0648,0,0,7c07f8a9922bc43bc4487ab208bcf7a7d7e60788bb09a129a0ee4eabefb874ff,2025-01-23T11:15:11.030000
CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf70,2025-01-23T18:15:33.110000
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
CVE-2025-0659,1,1,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
@ -278577,7 +278579,7 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000
CVE-2025-22865,0,0,a230429544aa2c6786a3863896558bf7a7afe958cdc9d412012c493e8058a98b,2025-01-28T02:15:29.243000
CVE-2025-22865,0,1,cf415926e77c21e99a39a9cfe2c641fe13fa0618d5fb446a10a390fe83b03728,2025-01-28T16:15:40.540000
CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000
CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000
CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000
@ -278622,6 +278624,7 @@ CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8
CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
CVE-2025-23045,1,1,f178d85d6e2e1bc41349bb3607f9a44cd436178af8a68c7f7ca82142f5b04422,2025-01-28T16:15:40.690000
CVE-2025-23047,0,0,6fdba3566238181d8ca3c91ca160e254b213eed36441cd5f9334903c854d1fd2,2025-01-22T18:15:21.893000
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
@ -278635,7 +278638,7 @@ CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca9
CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000
CVE-2025-23084,0,0,3eb9b1b6f9bb179ab9a29b725c978bec728033a30bf279f15395efb6094f00e4,2025-01-28T05:15:11.267000
CVE-2025-23084,0,1,5f743e4152aa1396e90a03cddd28c1d417d67f631ccbc3bbb7bfb90db72a87f6,2025-01-28T16:15:40.827000
CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000
CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000
CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000
@ -278666,6 +278669,9 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000
CVE-2025-23211,1,1,006f5a7ce38277883e5ec8e22df55c9d550b638bdc53265d7e1846c3d7038b43,2025-01-28T16:15:40.937000
CVE-2025-23212,1,1,bd594dbd158738f9322e80e1196e25d70ccf44f6ed0dfe2452c4e50dfc5a5d02,2025-01-28T16:15:41.080000
CVE-2025-23213,1,1,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000
CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000
CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000
CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000
@ -278676,6 +278682,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
CVE-2025-23385,1,1,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000
CVE-2025-23422,0,0,0bfcbffa99a5b85a71c8ee37755dbd0aca82e1025173efce8505c4ff37c6deb2,2025-01-24T11:15:09.987000
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000
@ -279047,68 +279054,68 @@ CVE-2025-24027,0,0,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bd
CVE-2025-24030,0,0,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
CVE-2025-24085,0,0,c14028dc84daee9d90020a98a98eab2b31ec934ec9b6933876856177a5f6f4b0,2025-01-27T22:15:14.990000
CVE-2025-24085,0,1,cd6eaca5b429f80fb0a35bc2d721227de78643291355f6b6fe912a9dcce479cf,2025-01-28T16:15:41.540000
CVE-2025-24086,0,0,7c5dca39e6ccd2231eef6bf1dd5f599552abe1ede3ec1541e3a2ac0474eb97aa,2025-01-27T22:15:15.080000
CVE-2025-24087,0,0,835732cf3eefe74b8ac13f2a4025988b418c0a20b7f315efff16a3050e6ed224,2025-01-27T22:15:15.180000
CVE-2025-24092,0,0,d9a8d44da95886fec6e8ccce9614e643a214860b6ea08f6de6640d3577ec027b,2025-01-27T22:15:15.267000
CVE-2025-24093,0,0,95657131e09c206793fd530c0fc80d357c2b135e7c8257f69d778887a02ee6c8,2025-01-27T22:15:15.350000
CVE-2025-24092,0,1,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65cbb0,2025-01-28T16:15:41.697000
CVE-2025-24093,0,1,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000
CVE-2025-24094,0,0,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46b2e,2025-01-27T22:15:15.450000
CVE-2025-24096,0,0,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000
CVE-2025-24100,0,0,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000
CVE-2025-24101,0,0,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000
CVE-2025-24102,0,1,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
CVE-2025-24103,0,0,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000
CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
CVE-2025-24103,0,1,b855906b195c4dc587795824d73768dd8eb50f59e5ebd39c191f21e7d50f830d,2025-01-28T16:15:41.990000
CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000
CVE-2025-24106,0,1,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000
CVE-2025-24106,0,0,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000
CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000
CVE-2025-24108,0,0,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000
CVE-2025-24109,0,0,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000
CVE-2025-24112,0,0,1d2969d6d80d7a4b29f11c091a804966e89ceb608d695ab0187a156e13995338,2025-01-27T22:15:16.433000
CVE-2025-24113,0,0,e3165632c8b4ddab1258ba856efb494e13b0ebef36ddf947b35aaf4ec3db0771,2025-01-27T22:15:16.530000
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
CVE-2025-24115,0,0,c95e3395453557e5b431aefc85034f76f0c8b1b69d0a1fcb1a61c73ba0c35f9c,2025-01-27T22:15:16.713000
CVE-2025-24115,0,1,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
CVE-2025-24117,0,0,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000
CVE-2025-24118,0,0,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000
CVE-2025-24118,0,1,c4c7cf0ccae327f1e2910a4df7950a5f148425468f8ed5cf85ce2f00e56e9e3f,2025-01-28T16:15:42.293000
CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000
CVE-2025-24121,0,1,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
CVE-2025-24122,0,0,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000
CVE-2025-24123,0,0,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000
CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
CVE-2025-24122,0,1,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000
CVE-2025-24123,0,1,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000
CVE-2025-24124,0,0,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000
CVE-2025-24126,0,1,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000
CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000
CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000
CVE-2025-24130,0,1,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
CVE-2025-24130,0,0,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000
CVE-2025-24134,0,0,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000
CVE-2025-24135,0,0,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000
CVE-2025-24134,0,1,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000
CVE-2025-24135,0,1,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000
CVE-2025-24136,0,0,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000
CVE-2025-24137,0,0,5b657031fc0d48278d9bcd3c281388e4962e50effbbb855d3f7f9bc7f3ab725c,2025-01-27T22:15:18.433000
CVE-2025-24138,0,0,71fd490bb69478196eafb3b55c96daeb767ba26484dc123dd17ce73d9d828684,2025-01-27T22:15:18.530000
CVE-2025-24139,0,0,699ab002de103a9fc6370545e2866b9dc1d733dd6b9058c60c5b4f122324b8d4,2025-01-27T22:15:18.627000
CVE-2025-24138,0,1,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000
CVE-2025-24139,0,1,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000
CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000
CVE-2025-24141,0,0,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000
CVE-2025-24143,0,0,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000
CVE-2025-24145,0,0,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000
CVE-2025-24146,0,1,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000
CVE-2025-24149,0,0,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000
CVE-2025-24146,0,0,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000
CVE-2025-24149,0,1,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeecc11,2025-01-28T16:15:43.387000
CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000
CVE-2025-24151,0,1,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000
CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000
CVE-2025-24154,0,0,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000
CVE-2025-24154,0,1,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000
CVE-2025-24156,0,0,b31e860ae0f287a4e55d80ce5295e8b216141d9744778e55fcbf70961f9196e0,2025-01-27T22:15:19.710000
CVE-2025-24158,0,0,958ab24a351c08ae2d37d82aa9a58131653fdda58ef39d0038d1a6bcd29d13cb,2025-01-27T22:15:19.800000
CVE-2025-24159,0,0,1b9aba57afa1c7268c6f0a356b044e00ee89cb5b596c74f23398ec84262146ee,2025-01-27T22:15:19.897000
CVE-2025-24160,0,0,1b6ff2d4bc9c9beb4ec9901d4c44f5db885014d9dffe1fb867c9b5f4c3925fc6,2025-01-27T22:15:19.987000
CVE-2025-24158,0,1,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000
CVE-2025-24159,0,1,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000
CVE-2025-24160,0,1,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000
CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000
CVE-2025-24162,0,0,9463e44df647b566fdc6d77ad9aa2961be851ffbe1b612e2da53bb5785b9c7b6,2025-01-27T22:15:20.167000
CVE-2025-24163,0,0,91fc2f170654ac01d435f8f1dbaf7034d0eee62c47dae1f32a2cb5960eca0c04,2025-01-27T22:15:20.267000
CVE-2025-24162,0,1,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000
CVE-2025-24163,0,1,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000
CVE-2025-24166,0,0,9ca035738a2e0b4c88133f181378b4ebabcfdd0e45c248150891735b95780aa9,2025-01-27T22:15:20.357000
CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000
CVE-2025-24174,0,0,c4428cb0ae7d4247d293b4a79c4936682809d79d5f83a3777284666b7ed6f45f,2025-01-27T22:15:20.547000
CVE-2025-24176,0,0,093d4bc1cead3fb3eb26eee3735d4f5a8e3bd4316b3fc0d2d6afa3b52cddf359,2025-01-27T22:15:20.643000
CVE-2025-24174,0,1,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000
CVE-2025-24176,0,1,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
CVE-2025-24177,0,0,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000
CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
@ -279280,7 +279287,8 @@ CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651f
CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000
CVE-2025-24783,0,0,3767ef322fc0c20fd082201a2ac0c7b57ed64f90c79baef6c1c88b7b021b0a09,2025-01-27T19:15:29.637000
CVE-2025-24783,0,1,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
CVE-2025-24800,1,1,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000

Can't render this file because it is too large.