mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-28T17:00:25.078234+00:00
This commit is contained in:
parent
af73869ac3
commit
84be0f5c66
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26354",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.670",
|
||||
"lastModified": "2024-11-21T05:56:11.643",
|
||||
"lastModified": "2025-01-28T16:15:27.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26356",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.737",
|
||||
"lastModified": "2024-11-21T05:56:12.070",
|
||||
"lastModified": "2025-01-28T16:15:29.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26365",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.780",
|
||||
"lastModified": "2024-11-21T05:56:13.093",
|
||||
"lastModified": "2025-01-28T16:15:29.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26371",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.820",
|
||||
"lastModified": "2024-11-21T05:56:14.083",
|
||||
"lastModified": "2025-01-28T16:15:29.637",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26379",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.863",
|
||||
"lastModified": "2024-11-21T05:56:15.457",
|
||||
"lastModified": "2025-01-28T16:15:29.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26397",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.903",
|
||||
"lastModified": "2024-11-21T05:56:17.807",
|
||||
"lastModified": "2025-01-28T16:15:30.127",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-26406",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.943",
|
||||
"lastModified": "2024-11-21T05:56:18.897",
|
||||
"lastModified": "2025-01-28T16:15:30.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-45345",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T20:15:09.427",
|
||||
"lastModified": "2024-11-21T06:32:07.427",
|
||||
"lastModified": "2025-01-28T16:15:30.527",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46749",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:10.997",
|
||||
"lastModified": "2024-11-21T06:34:37.847",
|
||||
"lastModified": "2025-01-28T16:15:30.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46753",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.040",
|
||||
"lastModified": "2024-11-21T06:34:38.127",
|
||||
"lastModified": "2025-01-28T16:15:31.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46755",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.157",
|
||||
"lastModified": "2024-11-21T06:34:38.670",
|
||||
"lastModified": "2025-01-28T16:15:31.403",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46756",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.200",
|
||||
"lastModified": "2024-11-21T06:34:38.833",
|
||||
"lastModified": "2025-01-28T16:15:31.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46763",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.123",
|
||||
"lastModified": "2024-11-21T06:34:40.117",
|
||||
"lastModified": "2025-01-28T16:15:32.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46764",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.160",
|
||||
"lastModified": "2024-11-21T06:34:40.283",
|
||||
"lastModified": "2025-01-28T16:15:32.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46769",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.200",
|
||||
"lastModified": "2024-11-21T06:34:41.030",
|
||||
"lastModified": "2025-01-28T16:15:32.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46773",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.370",
|
||||
"lastModified": "2024-11-21T06:34:41.453",
|
||||
"lastModified": "2025-01-28T16:15:32.647",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46775",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.240",
|
||||
"lastModified": "2024-11-21T06:34:41.953",
|
||||
"lastModified": "2025-01-28T16:15:32.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46792",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.413",
|
||||
"lastModified": "2024-11-21T06:34:43.910",
|
||||
"lastModified": "2025-01-28T16:15:33.137",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46794",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T20:15:12.463",
|
||||
"lastModified": "2024-11-21T06:34:44.127",
|
||||
"lastModified": "2025-01-28T16:15:33.417",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23818",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.367",
|
||||
"lastModified": "2024-11-21T06:49:18.543",
|
||||
"lastModified": "2025-01-28T16:15:33.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3365",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-01-28T01:15:08.277",
|
||||
"lastModified": "2025-01-28T01:15:08.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:34.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct's custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@rapid7.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38090",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2023-02-16T21:15:13.760",
|
||||
"lastModified": "2024-11-21T07:15:46.340",
|
||||
"lastModified": "2025-01-28T16:15:34.100",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20520",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.507",
|
||||
"lastModified": "2024-11-21T07:41:04.147",
|
||||
"lastModified": "2025-01-28T16:15:34.843",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20524",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2023-05-09T19:15:11.550",
|
||||
"lastModified": "2024-11-21T07:41:04.847",
|
||||
"lastModified": "2025-01-28T16:15:35.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25646",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-06-20T07:15:41.340",
|
||||
"lastModified": "2024-11-21T07:49:51.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T16:29:58.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,61 @@
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxhn_h388x_firmware:10.1_agzhm_1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B505C00-1388-4B53-B2E0-A43D5C794A10"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxhn_h388x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B08F94E-4211-4592-9919-4F2D0CD688E7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844",
|
||||
"source": "psirt@zte.com.cn"
|
||||
"source": "psirt@zte.com.cn",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31689",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T20:15:10.887",
|
||||
"lastModified": "2024-11-21T08:02:09.323",
|
||||
"lastModified": "2025-01-28T16:15:35.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T17:15:09.477",
|
||||
"lastModified": "2024-11-21T08:02:13.737",
|
||||
"lastModified": "2025-01-28T16:15:35.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:11.990",
|
||||
"lastModified": "2024-11-21T08:03:37.133",
|
||||
"lastModified": "2025-01-28T16:15:35.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32569",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.103",
|
||||
"lastModified": "2024-11-21T08:03:37.287",
|
||||
"lastModified": "2025-01-28T16:15:36.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.190",
|
||||
"lastModified": "2024-11-21T08:03:37.430",
|
||||
"lastModified": "2025-01-28T16:15:36.333",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12723",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-28T06:15:31.370",
|
||||
"lastModified": "2025-01-28T06:15:31.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:37.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Infility Global WordPress plugin through 2.9.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d9053b8b-c05c-42fd-913e-f85c799df807/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12807",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-28T06:15:31.680",
|
||||
"lastModified": "2025-01-28T06:15:31.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:37.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Social Share Buttons for WordPress plugin through 2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fcce0839-bb1d-4aa3-b236-ff5f5e9b6120/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22064",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-05-14T14:56:40.160",
|
||||
"lastModified": "2025-01-27T18:36:59.497",
|
||||
"lastModified": "2025-01-28T16:12:31.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -83,7 +83,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -91,20 +90,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxun-epdg_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxun-epdg:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.20.20",
|
||||
"matchCriteriaId": "A5DD1547-50E5-46B1-9E6F-CFE9EBCE6B39"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxun-epdg:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A0BFF58-BA88-4BE2-9E7A-ACD6A28F8E1C"
|
||||
"matchCriteriaId": "428020C1-365E-4AD1-AFF7-51D3916201BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35299",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-05-16T11:15:47.460",
|
||||
"lastModified": "2024-11-21T09:20:06.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-28T16:35:03.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.1.29548",
|
||||
"matchCriteriaId": "8ED92D3B-43B1-4E9F-AA5F-DBC03DD04687"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
"source": "cve@jetbrains.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3892",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-05-15T17:15:14.470",
|
||||
"lastModified": "2024-11-21T09:30:38.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T16:39:55.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,51 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:telerik:ui_for_winforms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021.1.122",
|
||||
"versionEndExcluding": "2024.2.514",
|
||||
"matchCriteriaId": "790A5E6E-F407-4B25-AEE3-F5D117253432"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892",
|
||||
"source": "security@progress.com"
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4288",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.373",
|
||||
"lastModified": "2024-11-21T09:42:32.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-28T16:28:47.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.7.18",
|
||||
"matchCriteriaId": "90EF0E37-46E7-4E71-8D6F-BEBB7EAF8F70"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087297/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087297/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45336",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2025-01-28T02:15:28.807",
|
||||
"lastModified": "2025-01-28T02:15:28.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:38.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/643100",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45339",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2025-01-28T02:15:28.927",
|
||||
"lastModified": "2025-01-28T02:15:28.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:38.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/golang/glog/pull/74",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45340",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2025-01-28T02:15:29.050",
|
||||
"lastModified": "2025-01-28T02:15:29.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:38.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/643097",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45341",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2025-01-28T02:15:29.147",
|
||||
"lastModified": "2025-01-28T02:15:29.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:38.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/643099",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T22:15:13.790",
|
||||
"lastModified": "2025-01-23T22:15:13.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:38.797",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,50 @@
|
||||
"value": "gpac 2.4 contiene un SEGV en src/isomedia/drm_sample.c:1562:96 en isom_cenc_get_sai_by_saiz_saio en MP4Box."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2987",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/2987",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-54475",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:12.283",
|
||||
"lastModified": "2025-01-27T22:15:12.283",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to determine a user\u2019s current location."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121839",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54499",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:12.680",
|
||||
"lastModified": "2025-01-27T22:15:12.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing a maliciously crafted image may lead to arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de use-after-free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sequoia 15.2. El procesamiento de una imagen manipulado maliciosa puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54530",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:13.753",
|
||||
"lastModified": "2025-01-27T22:15:13.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 and iPadOS 18.2. Password autofill may fill in passwords after failing authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 y iPadOS 18.2. La funci\u00f3n de autocompletar contrase\u00f1as puede completar las contrase\u00f1as despu\u00e9s de una autenticaci\u00f3n fallida."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54547",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.400",
|
||||
"lastModified": "2025-01-27T22:15:14.400",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to access protected user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121839",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54550",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.580",
|
||||
"lastModified": "2025-01-27T22:15:14.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An app may be able to view autocompleted contact information from Messages and Mail in system logs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda ver la informaci\u00f3n de contacto completada autom\u00e1ticamente de Mensajes y Correo en los registros de sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-55194",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T22:15:14.560",
|
||||
"lastModified": "2025-01-23T22:15:14.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:39.927",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,50 @@
|
||||
"value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente /OpenImageIO/fmath.h."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
112
CVE-2025/CVE-2025-04xx/CVE-2025-0432.json
Normal file
112
CVE-2025/CVE-2025-04xx/CVE-2025-0432.json
Normal file
@ -0,0 +1,112 @@
|
||||
{
|
||||
"id": "CVE-2025-0432",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-28T16:15:40.183",
|
||||
"lastModified": "2025-01-28T16:15:40.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf?sfvrsn=37160847_4",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.hms-networks.com/cyber-security",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-06xx/CVE-2025-0659.json
Normal file
78
CVE-2025/CVE-2025-06xx/CVE-2025-0659.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0659",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2025-01-28T16:15:40.360",
|
||||
"lastModified": "2025-01-28T16:15:40.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path\ntraversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character\nsequence in the body of the vulnerable endpoint, it is possible to overwrite\nfiles outside of the intended directory. A threat actor with admin privileges could\nleverage this vulnerability to overwrite reports including user projects."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1715.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22865",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2025-01-28T02:15:29.243",
|
||||
"lastModified": "2025-01-28T02:15:29.243",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:40.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://go.dev/cl/643098",
|
||||
|
82
CVE-2025/CVE-2025-230xx/CVE-2025-23045.json
Normal file
82
CVE-2025/CVE-2025-230xx/CVE-2025-23045.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-23045",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-28T16:15:40.690",
|
||||
"lastModified": "2025-01-28T16:15:40.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle or jsonpickle, it's likely to be vulnerable. Upgrade to CVAT 2.26.0 or later. If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/commit/563e1dfde64b15fa042b23f9d09cd854b35f0366",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-wq36-mxf8-hv62",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23084",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-01-28T05:15:11.267",
|
||||
"lastModified": "2025-01-28T05:15:11.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:40.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases",
|
||||
|
64
CVE-2025/CVE-2025-232xx/CVE-2025-23211.json
Normal file
64
CVE-2025/CVE-2025-232xx/CVE-2025-23211.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-23211",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-28T16:15:40.937",
|
||||
"lastModified": "2025-01-28T16:15:40.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/blob/4f9bff20c858180d0f7376de443a9fe4c123a50c/cookbook/helper/template_helper.py#L95",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/commit/e6087d5129cc9d0c24278948872377e66c2a2c20",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-r6rj-h75w-vj8v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-232xx/CVE-2025-23212.json
Normal file
60
CVE-2025/CVE-2025-232xx/CVE-2025-23212.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23212",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-28T16:15:41.080",
|
||||
"lastModified": "2025-01-28T16:15:41.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/commit/36e83a9d0108ac56b9538b45ead57efc8b97c5ff",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-jrgj-35jx-2qq7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-232xx/CVE-2025-23213.json
Normal file
60
CVE-2025/CVE-2025-232xx/CVE-2025-23213.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23213",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-28T16:15:41.217",
|
||||
"lastModified": "2025-01-28T16:15:41.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The file upload feature allows to upload arbitrary files, including html and svg. Both can contain malicious content (XSS Payloads). This vulnerability is fixed in 1.5.28."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/commit/3e37d11c6a3841a00eb27670d1d003f1a713e1cf",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-56jp-j3x5-hh2w",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23385.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23385.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23385",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2025-01-28T16:15:41.377",
|
||||
"lastModified": "2025-01-28T16:15:41.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-114"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24085",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.990",
|
||||
"lastModified": "2025-01-27T22:15:14.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:41.540",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de use after free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Una aplicaci\u00f3n maliciosa podr\u00eda elevar privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haberse explotado activamente contra versiones de iOS anteriores a iOS 17.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24092",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:15.267",
|
||||
"lastModified": "2025-01-27T22:15:15.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:41.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read sensitive location information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24093",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:15.350",
|
||||
"lastModified": "2025-01-27T22:15:15.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:41.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3. An app may be able to access removable volumes without user consent."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a vol\u00famenes extra\u00edbles sin el consentimiento del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122069",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24103",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:15.900",
|
||||
"lastModified": "2025-01-27T22:15:15.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:41.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24115",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:16.713",
|
||||
"lastModified": "2025-01-27T22:15:16.713",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer archivos fuera de su sandbox."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24118",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.033",
|
||||
"lastModified": "2025-01-27T22:15:17.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar una terminaci\u00f3n inesperada de sistema o escribir en la memoria del n\u00facleo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122067",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24122",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.323",
|
||||
"lastModified": "2025-01-27T22:15:17.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24123",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.413",
|
||||
"lastModified": "2025-01-27T22:15:17.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.590",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24134",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:18.153",
|
||||
"lastModified": "2025-01-27T22:15:18.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con controles de privacidad mejorados. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24135",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:18.247",
|
||||
"lastModified": "2025-01-27T22:15:18.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:42.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con una validaci\u00f3n de mensajes mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24138",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:18.530",
|
||||
"lastModified": "2025-01-27T22:15:18.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.077",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious application may be able to leak sensitive user information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Una aplicaci\u00f3n malintencionada podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24139",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:18.627",
|
||||
"lastModified": "2025-01-27T22:15:18.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Analizar un archivo manipulado malintencionado puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24149",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.173",
|
||||
"lastModified": "2025-01-27T22:15:19.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una comprobaci\u00f3n de l\u00edmites mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24154",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.620",
|
||||
"lastModified": "2025-01-27T22:15:19.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3. Un atacante podr\u00eda provocar una terminaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24158",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.800",
|
||||
"lastModified": "2025-01-27T22:15:19.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24159",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.897",
|
||||
"lastModified": "2025-01-27T22:15:19.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:43.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de validaci\u00f3n con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios de kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24160",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.987",
|
||||
"lastModified": "2025-01-27T22:15:19.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24162",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.167",
|
||||
"lastModified": "2025-01-27T22:15:20.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24163",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.267",
|
||||
"lastModified": "2025-01-27T22:15:20.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24174",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.547",
|
||||
"lastModified": "2025-01-27T22:15:20.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24176",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.643",
|
||||
"lastModified": "2025-01-27T22:15:20.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Un atacante local podr\u00eda elevar sus privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24783",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-01-27T15:15:17.610",
|
||||
"lastModified": "2025-01-27T19:15:29.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T16:15:44.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
@ -16,9 +16,36 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon.\n\nThis issue affects Apache Cocoon: all versions.\n\nWhen a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to.\n\nAs a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions.\n\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de uso incorrecto de las semillas en el generador de n\u00fameros pseudoaleatorios (PRNG) en Apache Cocoon. Este problema afecta a Apache Cocoon: todas las versiones. Cuando se crea una continuaci\u00f3n, obtiene un identificador aleatorio. Debido a que el generador de n\u00fameros aleatorios utilizado para generar estos identificadores se sembr\u00f3 con la hora de inicio, es posible que no haya sido lo suficientemente impredecible y un atacante podr\u00eda usar esto para adivinar los identificadores de continuaci\u00f3n y buscar continuaciones a las que no deber\u00eda haber tenido acceso. Como mitigaci\u00f3n, puede habilitar la opci\u00f3n \"continuaciones vinculadas a la sesi\u00f3n\" para asegurarse de que las continuaciones no se compartan entre sesiones. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios de confianza. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
90
CVE-2025/CVE-2025-248xx/CVE-2025-24800.json
Normal file
90
CVE-2025/CVE-2025-248xx/CVE-2025-24800.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-24800",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-28T16:15:45.063",
|
||||
"lastModified": "2025-01-28T16:15:45.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. This could be used to steal funds or compromise other kinds of cross-chain applications. This vulnerability is fixed in 15.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/polytope-labs/hyperbridge/pull/372/commits/f0e85db718f5165b06585a49b14a66f8ad643aea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/polytope-labs/hyperbridge/security/advisories/GHSA-wwx5-gpgr-vxr7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/polytope-labs/ismp-substrate/pull/64/commits/5ca3351a19151f1a439c30d5cbdbfdc72a11f1a8#diff-3835cc24fb2011b3e8246036059acd8c2c2a9a869eedf7a210d18edb6543318dL262",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-28T16:05:42.333138+00:00
|
||||
2025-01-28T17:00:25.078234+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-28T15:36:03.663000+00:00
|
||||
2025-01-28T16:39:55.417000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279285
|
||||
279293
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-11954](CVE-2024/CVE-2024-119xx/CVE-2024-11954.json) (`2025-01-28T14:15:29.070`)
|
||||
- [CVE-2024-11956](CVE-2024/CVE-2024-119xx/CVE-2024-11956.json) (`2025-01-28T14:15:29.803`)
|
||||
- [CVE-2024-6351](CVE-2024/CVE-2024-63xx/CVE-2024-6351.json) (`2025-01-28T14:15:30.007`)
|
||||
- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-01-28T15:15:12.847`)
|
||||
- [CVE-2025-0432](CVE-2025/CVE-2025-04xx/CVE-2025-0432.json) (`2025-01-28T16:15:40.183`)
|
||||
- [CVE-2025-0659](CVE-2025/CVE-2025-06xx/CVE-2025-0659.json) (`2025-01-28T16:15:40.360`)
|
||||
- [CVE-2025-23045](CVE-2025/CVE-2025-230xx/CVE-2025-23045.json) (`2025-01-28T16:15:40.690`)
|
||||
- [CVE-2025-23211](CVE-2025/CVE-2025-232xx/CVE-2025-23211.json) (`2025-01-28T16:15:40.937`)
|
||||
- [CVE-2025-23212](CVE-2025/CVE-2025-232xx/CVE-2025-23212.json) (`2025-01-28T16:15:41.080`)
|
||||
- [CVE-2025-23213](CVE-2025/CVE-2025-232xx/CVE-2025-23213.json) (`2025-01-28T16:15:41.217`)
|
||||
- [CVE-2025-23385](CVE-2025/CVE-2025-233xx/CVE-2025-23385.json) (`2025-01-28T16:15:41.377`)
|
||||
- [CVE-2025-24800](CVE-2025/CVE-2025-248xx/CVE-2025-24800.json) (`2025-01-28T16:15:45.063`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `44`
|
||||
Recently modified CVEs: `71`
|
||||
|
||||
- [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2025-01-28T15:15:10.787`)
|
||||
- [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2025-01-28T15:15:10.947`)
|
||||
- [CVE-2023-41776](CVE-2023/CVE-2023-417xx/CVE-2023-41776.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41779](CVE-2023/CVE-2023-417xx/CVE-2023-41779.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41780](CVE-2023/CVE-2023-417xx/CVE-2023-41780.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41782](CVE-2023/CVE-2023-417xx/CVE-2023-41782.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41783](CVE-2023/CVE-2023-417xx/CVE-2023-41783.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2024-22062](CVE-2024/CVE-2024-220xx/CVE-2024-22062.json) (`2025-01-28T15:29:07.970`)
|
||||
- [CVE-2024-23591](CVE-2024/CVE-2024-235xx/CVE-2024-23591.json) (`2025-01-28T14:28:25.570`)
|
||||
- [CVE-2024-23953](CVE-2024/CVE-2024-239xx/CVE-2024-23953.json) (`2025-01-28T15:15:11.330`)
|
||||
- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-01-28T15:15:11.520`)
|
||||
- [CVE-2024-54507](CVE-2024/CVE-2024-545xx/CVE-2024-54507.json) (`2025-01-28T15:15:11.723`)
|
||||
- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-01-28T15:15:11.900`)
|
||||
- [CVE-2024-54519](CVE-2024/CVE-2024-545xx/CVE-2024-54519.json) (`2025-01-28T15:15:12.050`)
|
||||
- [CVE-2024-54523](CVE-2024/CVE-2024-545xx/CVE-2024-54523.json) (`2025-01-28T15:15:12.190`)
|
||||
- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-01-28T15:15:12.340`)
|
||||
- [CVE-2024-54542](CVE-2024/CVE-2024-545xx/CVE-2024-54542.json) (`2025-01-28T15:15:12.477`)
|
||||
- [CVE-2024-55195](CVE-2024/CVE-2024-551xx/CVE-2024-55195.json) (`2025-01-28T15:15:12.647`)
|
||||
- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-01-28T15:15:13.303`)
|
||||
- [CVE-2025-24106](CVE-2025/CVE-2025-241xx/CVE-2025-24106.json) (`2025-01-28T15:15:13.450`)
|
||||
- [CVE-2025-24121](CVE-2025/CVE-2025-241xx/CVE-2025-24121.json) (`2025-01-28T15:15:13.600`)
|
||||
- [CVE-2025-24126](CVE-2025/CVE-2025-241xx/CVE-2025-24126.json) (`2025-01-28T15:15:13.743`)
|
||||
- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-01-28T15:15:13.890`)
|
||||
- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-28T15:15:14.013`)
|
||||
- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-28T15:15:14.150`)
|
||||
- [CVE-2024-55194](CVE-2024/CVE-2024-551xx/CVE-2024-55194.json) (`2025-01-28T16:15:39.927`)
|
||||
- [CVE-2025-22865](CVE-2025/CVE-2025-228xx/CVE-2025-22865.json) (`2025-01-28T16:15:40.540`)
|
||||
- [CVE-2025-23084](CVE-2025/CVE-2025-230xx/CVE-2025-23084.json) (`2025-01-28T16:15:40.827`)
|
||||
- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-01-28T16:15:41.540`)
|
||||
- [CVE-2025-24092](CVE-2025/CVE-2025-240xx/CVE-2025-24092.json) (`2025-01-28T16:15:41.697`)
|
||||
- [CVE-2025-24093](CVE-2025/CVE-2025-240xx/CVE-2025-24093.json) (`2025-01-28T16:15:41.847`)
|
||||
- [CVE-2025-24103](CVE-2025/CVE-2025-241xx/CVE-2025-24103.json) (`2025-01-28T16:15:41.990`)
|
||||
- [CVE-2025-24115](CVE-2025/CVE-2025-241xx/CVE-2025-24115.json) (`2025-01-28T16:15:42.150`)
|
||||
- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-01-28T16:15:42.293`)
|
||||
- [CVE-2025-24122](CVE-2025/CVE-2025-241xx/CVE-2025-24122.json) (`2025-01-28T16:15:42.447`)
|
||||
- [CVE-2025-24123](CVE-2025/CVE-2025-241xx/CVE-2025-24123.json) (`2025-01-28T16:15:42.590`)
|
||||
- [CVE-2025-24134](CVE-2025/CVE-2025-241xx/CVE-2025-24134.json) (`2025-01-28T16:15:42.780`)
|
||||
- [CVE-2025-24135](CVE-2025/CVE-2025-241xx/CVE-2025-24135.json) (`2025-01-28T16:15:42.930`)
|
||||
- [CVE-2025-24138](CVE-2025/CVE-2025-241xx/CVE-2025-24138.json) (`2025-01-28T16:15:43.077`)
|
||||
- [CVE-2025-24139](CVE-2025/CVE-2025-241xx/CVE-2025-24139.json) (`2025-01-28T16:15:43.230`)
|
||||
- [CVE-2025-24149](CVE-2025/CVE-2025-241xx/CVE-2025-24149.json) (`2025-01-28T16:15:43.387`)
|
||||
- [CVE-2025-24154](CVE-2025/CVE-2025-241xx/CVE-2025-24154.json) (`2025-01-28T16:15:43.533`)
|
||||
- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-01-28T16:15:43.693`)
|
||||
- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-01-28T16:15:43.843`)
|
||||
- [CVE-2025-24160](CVE-2025/CVE-2025-241xx/CVE-2025-24160.json) (`2025-01-28T16:15:44.003`)
|
||||
- [CVE-2025-24162](CVE-2025/CVE-2025-241xx/CVE-2025-24162.json) (`2025-01-28T16:15:44.187`)
|
||||
- [CVE-2025-24163](CVE-2025/CVE-2025-241xx/CVE-2025-24163.json) (`2025-01-28T16:15:44.330`)
|
||||
- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-01-28T16:15:44.490`)
|
||||
- [CVE-2025-24176](CVE-2025/CVE-2025-241xx/CVE-2025-24176.json) (`2025-01-28T16:15:44.630`)
|
||||
- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-28T16:15:44.880`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
246
_state.csv
246
_state.csv
@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53
|
||||
CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000
|
||||
CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000
|
||||
CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000
|
||||
CVE-2017-10271,0,1,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000
|
||||
CVE-2017-10271,0,0,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000
|
||||
CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000
|
||||
CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000
|
||||
CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000
|
||||
@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a
|
||||
CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000
|
||||
CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000
|
||||
CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000
|
||||
CVE-2017-12149,0,1,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000
|
||||
CVE-2017-12149,0,0,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000
|
||||
CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000
|
||||
CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000
|
||||
CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000
|
||||
@ -102558,7 +102558,7 @@ CVE-2017-20192,0,0,62ca05a0a6895e670da34ea053fd80d19f2fb06d6c55730f577c1845fb514
|
||||
CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4ca38,2024-10-30T20:46:34.060000
|
||||
CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000
|
||||
CVE-2017-20195,0,0,038824b0765b4962b51714c1d9dd9e3ad2eebba7a76824674181910d889a0075,2024-10-29T14:34:04.427000
|
||||
CVE-2017-20196,0,1,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000
|
||||
CVE-2017-20196,0,0,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000
|
||||
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
|
||||
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
|
||||
CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000
|
||||
@ -105455,7 +105455,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c
|
||||
CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000
|
||||
CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000
|
||||
CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000
|
||||
CVE-2017-5070,0,1,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000
|
||||
CVE-2017-5070,0,0,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000
|
||||
CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000
|
||||
CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000
|
||||
CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000
|
||||
@ -106503,7 +106503,7 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8
|
||||
CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000
|
||||
CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000
|
||||
CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000
|
||||
CVE-2017-6327,0,1,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000
|
||||
CVE-2017-6327,0,0,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000
|
||||
CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000
|
||||
CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000
|
||||
CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000
|
||||
@ -109621,7 +109621,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237
|
||||
CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000
|
||||
CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000
|
||||
CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000
|
||||
CVE-2017-9822,0,1,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000
|
||||
CVE-2017-9822,0,0,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000
|
||||
CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000
|
||||
CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000
|
||||
CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000
|
||||
@ -121219,7 +121219,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7
|
||||
CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000
|
||||
CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000
|
||||
CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000
|
||||
CVE-2018-2380,0,1,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000
|
||||
CVE-2018-2380,0,0,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000
|
||||
CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000
|
||||
CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000
|
||||
CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000
|
||||
@ -168266,7 +168266,7 @@ CVE-2021-21728,0,0,abfcfb35e980ce0ce123fceadeabb11de2a6565aa607cfe8decaede24d231
|
||||
CVE-2021-21729,0,0,5c8c6ff8ced38561b4fb5213780ae73d6d2e4ee4d4bd3497a9224cefdbf3446b,2024-11-21T05:48:53.660000
|
||||
CVE-2021-2173,0,0,cbad9191d79c8dacc7e443e9fe440f30f6648d01ca2a701c6c89364b5fa6a3f8,2024-11-21T06:02:32.263000
|
||||
CVE-2021-21730,0,0,805546dac7c11db2476efc02242c7c7b94ea7d54741ed53fcc38f5426004b5fa,2024-11-21T05:48:53.793000
|
||||
CVE-2021-21731,0,1,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000
|
||||
CVE-2021-21731,0,0,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000
|
||||
CVE-2021-21732,0,0,4a59c0d26af0a341d194bb0bfae954d2dc535569840fc62c58a3f0cafa422cb6,2024-11-21T05:48:54.023000
|
||||
CVE-2021-21733,0,0,d39f86fdb8abfb7f331c613fcef01ccdb1e34d1f0405dbae49159b55f7cc1469,2024-11-21T05:48:54.137000
|
||||
CVE-2021-21734,0,0,e560ea57bd7301969ff07503d3a9d383ce9ebb441e347c6ec57d4f8a75176222,2024-11-21T05:48:54.243000
|
||||
@ -172075,9 +172075,9 @@ CVE-2021-26350,0,0,b151ad9bd32b15d8044112deaab36f3ca0dfbf6a51b55074bb0eb62eb9057
|
||||
CVE-2021-26351,0,0,b8008fc01be4e89c841cd24f5f0ee416865f95d380d4137dc30bd91a2162a326,2024-11-21T05:56:11.180000
|
||||
CVE-2021-26352,0,0,ab39ee46f163eb98638260277895d33940ff06b51f3a31b944ba81d8a2b208ff,2024-11-21T05:56:11.357000
|
||||
CVE-2021-26353,0,0,5637ff632a3b498c1f457036db6ba13123bdc71cbb024531a1453dd05a5008fa,2024-11-21T05:56:11.500000
|
||||
CVE-2021-26354,0,0,afb8359f2de1c4d48f01a85c07a563279acd701d85e7c1aee8d6f6efb6cebd69,2024-11-21T05:56:11.643000
|
||||
CVE-2021-26354,0,1,8defe52f712feed4770923218c01e547e2a7b510f8687131f9bfdf0c81cfe76d,2025-01-28T16:15:27.930000
|
||||
CVE-2021-26355,0,0,87df23e23ac09f5c1a75cd9b9c83e1c4aa08d97e75ae820ea97e75361dd52264,2024-11-21T05:56:11.930000
|
||||
CVE-2021-26356,0,0,58621feb0cff62a95114948249e4d83d288008e7dab272ab9d6732e68cd4dec7,2024-11-21T05:56:12.070000
|
||||
CVE-2021-26356,0,1,e35484f3c7337754e71cdbc8e66ee5023536dcb177d34004d6c7d898d055e27d,2025-01-28T16:15:29.150000
|
||||
CVE-2021-26357,0,0,824898f84032844f9aada457906e54efe49cf0b9fb16b50003a3ed0f7a34e4ce,2023-11-07T03:31:42.733000
|
||||
CVE-2021-26358,0,0,2724aa6f895ca1611bf2dfa538bc4a735862bda0b10a7d6c42c75a0f3b2ca01c,2023-11-07T03:31:42.987000
|
||||
CVE-2021-26360,0,0,03debf36c182b14d8d880fd25fe30df87283f6ad4feece11e09b5096431f844f,2024-11-21T05:56:12.317000
|
||||
@ -172085,20 +172085,20 @@ CVE-2021-26361,0,0,405e2906167824484f5942849cd1c0fde45dd76f483d7bdbba724366a08cc
|
||||
CVE-2021-26362,0,0,68be2902fdd2e33ff49b401bf6ef06ded4fe40564b6acfdf02c1e1eb43e68ea9,2024-11-21T05:56:12.600000
|
||||
CVE-2021-26363,0,0,ea5e78d5bebbd15d102f943caa10ef6b8eedc44de2844a9aaf4353dcfddd2a14,2024-11-21T05:56:12.753000
|
||||
CVE-2021-26364,0,0,e6fb3d205bcba6682a325d197bf3cc47348cccd3f505ce727e85b932316ecc7b,2024-11-21T05:56:12.927000
|
||||
CVE-2021-26365,0,0,8a85639532ca6e6383707321f5586a4a4a5eefa41f498dd369508ebfb022d242,2024-11-21T05:56:13.093000
|
||||
CVE-2021-26365,0,1,ee6ed4aad5f83e86c7cd6b0341d548715206bf9efed575bad63574af617f278c,2025-01-28T16:15:29.400000
|
||||
CVE-2021-26366,0,0,94380087ac9d954f4c158efcb4c520cbd04379e9f39e66f07b4c695a34dc95f7,2024-11-21T05:56:13.280000
|
||||
CVE-2021-26367,0,0,1ea318f22602730ccaa98e9a4e306701942cebc2b7fecbfd5e7b425f47955556,2024-12-12T20:41:56.120000
|
||||
CVE-2021-26368,0,0,0d92ceeb9332920af33d5588a2638b208816ad8116e7123a808b6bf68ebde242,2024-11-21T05:56:13.520000
|
||||
CVE-2021-26369,0,0,0b7851746bb6e9137d08d662cf27537fc49d451d615477bba77e441e22c15d6c,2024-11-21T05:56:13.677000
|
||||
CVE-2021-26370,0,0,a7ed84704755abb7ce3d2ac66c14a88f2c33f9c1d390f73183d197d43e3bf895,2024-11-21T05:56:13.870000
|
||||
CVE-2021-26371,0,0,336371304272808256f3bc0b82032d60538cd1d28905555ded72788cb019624a,2024-11-21T05:56:14.083000
|
||||
CVE-2021-26371,0,1,4cfd02c74b5d276e911343440a0862338b92f9b49e07cd16becd5033c6d7ad42,2025-01-28T16:15:29.637000
|
||||
CVE-2021-26372,0,0,be25e17ea00fc5d2ece1089a9c4bcc97dad067ecabc99b0acf185145d799d0e2,2024-11-21T05:56:14.363000
|
||||
CVE-2021-26373,0,0,fb1e96954a94661dd628ced3050aadff79600f9e8135e1d18cc7703807538a0b,2024-11-21T05:56:14.543000
|
||||
CVE-2021-26374,0,0,7042fb5a11054196a852163da9c3118baaf16804c5e3aa6433d40ef9c13c9a60,2023-11-07T03:31:43.320000
|
||||
CVE-2021-26375,0,0,be65532e486936f60fa4bdb31dafadc80cd5d305be54619995480b13ca546777,2024-11-21T05:56:14.807000
|
||||
CVE-2021-26376,0,0,695b3db039da8392cb105b41c23fb8d0eedf963bd0284f2842802098d6efd2f0,2024-11-21T05:56:15.030000
|
||||
CVE-2021-26378,0,0,62247824806125562c0c0616f0cc3265c78b0f622e1042a4b96eae9d6d22abd4,2024-11-21T05:56:15.240000
|
||||
CVE-2021-26379,0,0,b8313800f6e160ca2113381039ec1000d6ed25301c3bf452c5714e710db23fec,2024-11-21T05:56:15.457000
|
||||
CVE-2021-26379,0,1,bfc1178be85f1381c1cbfc86368460dd4dc108703bb6b969745f154c2dd7f431,2025-01-28T16:15:29.910000
|
||||
CVE-2021-26382,0,0,2d2da654b3124491842fef9f56ae115f90a0c137138c8cde0a8d0aed70409ace,2024-11-21T05:56:15.607000
|
||||
CVE-2021-26384,0,0,1f20237d6382a09fa5f1dc37ef01834f52ccbe3593ec61b252043c1c927b7a92,2024-11-21T05:56:15.767000
|
||||
CVE-2021-26385,0,0,f2c8b7d9db601ac08dd018e8b3647ecdeba07aaa7932dabdf667e78be8806825,2023-11-07T03:31:43.570000
|
||||
@ -172110,7 +172110,7 @@ CVE-2021-26391,0,0,42611c87ccff4bbf6f45ee1fc6b299e79cdb60a1dd36495526b6538fcfeaa
|
||||
CVE-2021-26392,0,0,f4506415ef34d2c668f45e5c31297fbf0939bd3be9844eeb1012259e45a2c151,2024-11-21T05:56:16.773000
|
||||
CVE-2021-26393,0,0,2e2311da7e5fd6009b7462ed3e62a0b988ac096a66499352cb820075b16a39f9,2024-11-21T05:56:17.503000
|
||||
CVE-2021-26396,0,0,bedc812248f4c58139b304e8b93ad2ea7faff37786b9b742fb65461bc3b55d21,2024-11-21T05:56:17.673000
|
||||
CVE-2021-26397,0,0,aa409e22c666ccbe7111c5c539e6ace6debc6aa68e7f285d6355042c0f012724,2024-11-21T05:56:17.807000
|
||||
CVE-2021-26397,0,1,c4fa4107a5037ab9a9f0469d5f2cc262599cc1bc6851c1b7054ebbe5ae6609f1,2025-01-28T16:15:30.127000
|
||||
CVE-2021-26398,0,0,76da1b07d0263b029647edf390d6ca48e3701a1bdaa11182a148b5b4e1b14b28,2024-11-21T05:56:17.933000
|
||||
CVE-2021-26399,0,0,5e5f9f405bf7acc561d0d20a58a3ac59dca0a4ba58359540a6486db890806823,2023-11-07T03:31:44.043000
|
||||
CVE-2021-26400,0,0,4a32102cb86498ca7e455a6e4a03c3ad50cc1a1969378fb12c48bc088142b733,2024-11-21T05:56:18.113000
|
||||
@ -172119,7 +172119,7 @@ CVE-2021-26402,0,0,2815299b7c37e3943d6674d88c5f7a0e64195ac95b53cbadbae4d15e80b10
|
||||
CVE-2021-26403,0,0,f056e101d01257d133211e984177d40ff4e1e335edaa983de3e10d8f6fe36335,2024-11-21T05:56:18.587000
|
||||
CVE-2021-26404,0,0,62c3a5e41312ab345a394c48f30833b633f037431cc53aeef373f8eaf65fc30a,2024-11-21T05:56:18.740000
|
||||
CVE-2021-26405,0,0,e7997b4a9a2fabe8cb89ed58df54fe10de0d03f70cec1d0355c449fadafe46c8,2023-11-07T03:31:44.613000
|
||||
CVE-2021-26406,0,0,b9242914004b5fffb11919435bdb0a58e8e4edc75a253d6a6f3126e1e08e109c,2024-11-21T05:56:18.897000
|
||||
CVE-2021-26406,0,1,feaa91344c371f6ddb186789655602e39d41bb880480e39b01b32a784fb63b56,2025-01-28T16:15:30.307000
|
||||
CVE-2021-26407,0,0,6d75501eb6986fe4542234f0e8fb50ec5ae2f34b68eb947d449a5d913abd2465,2024-11-21T05:56:19.060000
|
||||
CVE-2021-26408,0,0,29ee115f3d7798592d41ee828ddef7f56abb664c496866bc3b6d3facbde27817,2024-11-21T05:56:19.170000
|
||||
CVE-2021-26409,0,0,ddbeb3098844be2c4d5fea7769f72dee25eebfb5ec0c63449ab40c828c027a55,2024-11-21T05:56:19.327000
|
||||
@ -186027,7 +186027,7 @@ CVE-2021-45340,0,0,67b7dfa40c57558c2fe56d97dcd3db9f8cfae2cee1fbe6330e358e988588b
|
||||
CVE-2021-45341,0,0,2de15a0973665331edb58aa09fa4c2f373a1b56f1573b63f69548334253f0a02,2024-11-21T06:32:06.990000
|
||||
CVE-2021-45342,0,0,daa3728d340863ce70880dcff74d3db88ab11e53a2c0edc1b0c48fd1d544d49d,2024-11-21T06:32:07.137000
|
||||
CVE-2021-45343,0,0,a1c6b5bbd7ef7c2a32d363510aefaa452e19383180fa960874728799e54542f5,2024-11-21T06:32:07.283000
|
||||
CVE-2021-45345,0,0,c60446c74c9cee22f504ff06527bf2ca130835c5bcc6fe83a93093463db9ca7f,2024-11-21T06:32:07.427000
|
||||
CVE-2021-45345,0,1,6d83a3a1345bc5132448524f4f553d66cdfb5bf7a4a6d9082e5b3f05590d7195,2025-01-28T16:15:30.527000
|
||||
CVE-2021-45346,0,0,e1e5e34e79d9e570e6d559539c99b66153e5bbfc574466f3cb7eb9e4b00595f5,2024-11-21T06:32:07.577000
|
||||
CVE-2021-45347,0,0,7d1cad60b0431bd525e33329b06c6759acff05492a9829708c7462d3c3aee380,2024-11-21T06:32:07.737000
|
||||
CVE-2021-45348,0,0,0d60039cf58404f1e2404fef9958e244f4299eecff3837c067c2249a785f996e,2024-11-21T06:32:07.877000
|
||||
@ -187017,29 +187017,29 @@ CVE-2021-46743,0,0,fa2103decfba18c169775b329c4df44f3980df4487f48f67188fa24658174
|
||||
CVE-2021-46744,0,0,966d79f5dd773839de773aacc3c163e0400034d18a4971b39e19ee38b20768c0,2024-11-21T06:34:37.347000
|
||||
CVE-2021-46746,0,0,1853c7548e8b1fa53bf6723c123487c64fa2064f9a9d8f58b03b516ad6db460d,2024-10-31T14:35:00.797000
|
||||
CVE-2021-46748,0,0,e58198977e83f84004306b15f2073e45f9840ae24e082c85dbe60aa2b9bea3d3,2024-11-21T06:34:37.687000
|
||||
CVE-2021-46749,0,0,0a913d97adace2572982f3d04ea00e4a6dcdd1c0f91351bd00e31805326f9b8b,2024-11-21T06:34:37.847000
|
||||
CVE-2021-46753,0,0,5d66659434e1c645fc7525f776880b9ebfdcf627e101f9036cbd25f31d0fdac5,2024-11-21T06:34:38.127000
|
||||
CVE-2021-46749,0,1,d4f1d2736184a5a310e2336499e738df8d7c4b9e48c387fe911ae62aad62d7c2,2025-01-28T16:15:30.747000
|
||||
CVE-2021-46753,0,1,5aad8c8682702c543998f0a57823d36079ee78cc662f1ee4983b8d9141178575,2025-01-28T16:15:31.070000
|
||||
CVE-2021-46754,0,0,c4c7622192121c483a6dd65cb3e199e74a112c267e112e931d7ec81def35a161,2024-11-21T06:34:38.400000
|
||||
CVE-2021-46755,0,0,c544c754b4881728b6daf09ae7628d8e4cda68f2b744f9d3351feca6d015137b,2024-11-21T06:34:38.670000
|
||||
CVE-2021-46756,0,0,4b62f6001d47f3e1b3afa4b8d344c7f30b91163fcb6dcc2223a8dcd3e10c8988,2024-11-21T06:34:38.833000
|
||||
CVE-2021-46755,0,1,e73a4a154a1c9901b9a47e2089e50ad52b479a71a7a8890c41b5d6108c7369f2,2025-01-28T16:15:31.403000
|
||||
CVE-2021-46756,0,1,348edd97a5618ca4219a5eb39fe589ed996e990d11b5940259c1c9a597d071d1,2025-01-28T16:15:31.723000
|
||||
CVE-2021-46757,0,0,9bb395cfc6c2cc867004a009f9eeae811c297f927d63893e956b0fe116fa2946,2024-11-21T06:34:39.013000
|
||||
CVE-2021-46758,0,0,61a2c8261647305cf0c168e689ef2547a9e118bcd79bbe37e35d6250fbc1a5ad,2024-11-21T06:34:39.233000
|
||||
CVE-2021-46759,0,0,ee41477de6aec6d8765a770d4587c30e8d34746d178e40b5c618fc67772ca7cb,2025-01-27T18:15:28.957000
|
||||
CVE-2021-46760,0,0,2a5c5d4614a8f99d6c513f4ec337736cb9c89dbc6c65e6108bb5f09456b91415,2025-01-27T18:15:29.347000
|
||||
CVE-2021-46761,0,0,673565b132841f4e40fa9ef86a4bec9a270e19da8772bf1d5a2324269de3a1a0,2023-11-07T03:40:03.307000
|
||||
CVE-2021-46762,0,0,a04b8facc1f877f06c93e09fdc65010cfefddf9144e2e823bf5ac7fdfff01198,2024-11-21T06:34:39.943000
|
||||
CVE-2021-46763,0,0,b3a4154b5d3dda9491a8280f0f3a10f0f913a8350d28a8bbc092421ff8c661d5,2024-11-21T06:34:40.117000
|
||||
CVE-2021-46764,0,0,137705b0985a360ec3fc7919a2b15c5294e6b50e2ed47e5fbefdae6ccb67aa23,2024-11-21T06:34:40.283000
|
||||
CVE-2021-46763,0,1,479096be352a86e0db261253285064059aa17860a5878ca2bd973b8e4911394d,2025-01-28T16:15:32.050000
|
||||
CVE-2021-46764,0,1,97cc2002a793b3449c0141fddd218879f6c2d56385c1033c7a5b04ab5f2c8f73,2025-01-28T16:15:32.250000
|
||||
CVE-2021-46765,0,0,fe1e34ba3941eb547a595865103b1e703bc3945612d81406f9f99d9b9bfebcfa,2025-01-27T18:15:29.550000
|
||||
CVE-2021-46766,0,0,bccf8c60bb6c6f348913cb8600a7bf05fbe599718b959086f4540fa76b250f22,2024-11-21T06:34:40.617000
|
||||
CVE-2021-46767,0,0,ed28b18ceedfc909daa60b057d370b54ffe9be04b0322bfef58c76b097fce08b,2024-11-21T06:34:40.793000
|
||||
CVE-2021-46768,0,0,3efc93a3218052c35679d8d9e65810db17d49b4d3976f82dd366c1c9a2d70b43,2024-11-21T06:34:40.917000
|
||||
CVE-2021-46769,0,0,7a1a9c4358d4da6d3a5a5a503a47c0f64da5787516222ecdeb21a57558167224,2024-11-21T06:34:41.030000
|
||||
CVE-2021-46769,0,1,33b93ec5c624f04f870525cd2b9f0bb35757ee6cbba0aae077c8e45000d07d36,2025-01-28T16:15:32.440000
|
||||
CVE-2021-46771,0,0,2db0ae4ec8923430ef43208646e80340249366137d0e8e055b8389009ce50327,2024-11-21T06:34:41.190000
|
||||
CVE-2021-46772,0,0,f253f96b9b076f0e52e80ce930cbafabed8fd2e43589a011145649e2defea26e,2024-11-05T22:35:01.630000
|
||||
CVE-2021-46773,0,0,2dcda26d05567ea3f98d4cd0b0d3d7d247835dc078892aafff10f254d729eb88,2024-11-21T06:34:41.453000
|
||||
CVE-2021-46773,0,1,63513a81b05f40282335c1ad5fdb9049a5934240e17fcc698f866e1ae35bf4ac,2025-01-28T16:15:32.647000
|
||||
CVE-2021-46774,0,0,ef64e0c599d426c07397dde560d8723094891ec90f1c70c2db374dee78a11c95,2024-11-21T06:34:41.667000
|
||||
CVE-2021-46775,0,0,3af1d3c0cc4de808de2e5eedd171b4efcbbb911df46c6aaf8953ab56b926d6e3,2024-11-21T06:34:41.953000
|
||||
CVE-2021-46775,0,1,4ec5da084476062caf48bd8dc8a9e49fc4f350302044cc7b382c4f33babcd08b,2025-01-28T16:15:32.910000
|
||||
CVE-2021-46778,0,0,6be3a3c577cea903827adaa59850a57d29dd763234a27e93fc22fea72c5301a9,2024-11-21T06:34:42.120000
|
||||
CVE-2021-46779,0,0,6e414a9d1953f67179d4647211e0d91f5ee590ddd6e2b5413ba639c86c44d749,2024-11-21T06:34:42.400000
|
||||
CVE-2021-46780,0,0,5cd689ffb43f9985a355d5b276e32b9b23083b973e5faff72d29a0c4e217261f,2024-11-21T06:34:42.517000
|
||||
@ -187053,9 +187053,9 @@ CVE-2021-46788,0,0,32e89ce10b2a5a6977e6ba307ec05c390d77e5524ada8597a176045dbb24d
|
||||
CVE-2021-46789,0,0,3ac1770c8993487da9af7040eb1c2919779dce70f3686c5c80e66317975d391b,2024-11-21T06:34:43.503000
|
||||
CVE-2021-46790,0,0,7e330ae8c3f4d1c058580fe6c8a9bdbcbc9daeafea6603075154115df9816bd7,2024-11-21T06:34:43.620000
|
||||
CVE-2021-46791,0,0,26ea3d4deeb4ec718e57ac570254f4718a9a548779641a26074761ff235973a2,2024-11-21T06:34:43.797000
|
||||
CVE-2021-46792,0,0,91ad78ec6757239e7ba562d67d03e899159ac0ad101ed1f7429a398de1dbedd6,2024-11-21T06:34:43.910000
|
||||
CVE-2021-46792,0,1,c5b9352751c00f82141d975ab6c0b5a7450e38b6f2f972d7d7e39acf69c2e3d3,2025-01-28T16:15:33.137000
|
||||
CVE-2021-46793,0,0,e31da4ac5f6a9fc6c82e49990ef734ebc97a722e9d7f320aacc22fbf42c60b81,2023-11-07T03:40:04.037000
|
||||
CVE-2021-46794,0,0,e9398965d6397530d85ca3f201382c88ccdd2f4eb376fa26abe2c70120b53cf3,2024-11-21T06:34:44.127000
|
||||
CVE-2021-46794,0,1,069e0c9bf5ce399233af0e9e1124f538751b0b62e35288de0a0b8b70ed817523,2025-01-28T16:15:33.417000
|
||||
CVE-2021-46795,0,0,4cecf02bd2414d0376c91c7b6849803dfb1df0cbf00ab89ca4098ecd3bbecd7f,2024-11-21T06:34:44.410000
|
||||
CVE-2021-46796,0,0,61c2e0baace0a2922ea57f96ad4127821a5952b70ab20bb119c777cccd3dab86,2023-11-07T03:40:04.300000
|
||||
CVE-2021-46799,0,0,69658fdcb21bb92bdd7a40098b5b3f97e640d3443f4cc75a23167e0a1f89d8c0,2023-11-07T03:40:04.533000
|
||||
@ -193354,7 +193354,7 @@ CVE-2022-23814,0,0,f221c5fed4ea708846f64cdec0979e1d7c60492ed369edb82988b96c17bda
|
||||
CVE-2022-23815,0,0,32f2b2413eb325d507269c9820e0d2bfd57ac1be30f822aa13e6954e84ddb889,2025-01-03T18:04:08.963000
|
||||
CVE-2022-23816,0,0,b3e8a185ce7f00305c2d16541dec1c202970fddb180fd72b9358d6be7b074a1f,2023-11-07T03:44:19.220000
|
||||
CVE-2022-23817,0,0,3b71e6ec45f6acd0944fe7938d40f55066aaaf507fdda7d54104f1b4d447e14b,2024-08-16T21:35:00.430000
|
||||
CVE-2022-23818,0,0,3856155fdefaac51ecc607bd8de135bb8597bd18819ab757f9565a89af093b21,2024-11-21T06:49:18.543000
|
||||
CVE-2022-23818,0,1,dfb8ea6bafd615661a9e37e388ca178e1dc41ef80c949ed979fd828a3c041590,2025-01-28T16:15:33.747000
|
||||
CVE-2022-2382,0,0,a9d43a93a32c7abc4fff5c15bd4f62f758d289c1554be08676b4ec85e8c88f6d,2024-11-21T07:00:52.790000
|
||||
CVE-2022-23820,0,0,89f9b7d2e354e64d01dcc7dd790fdd76a02c40f5ef6e3c92758a9c06a8b3001f,2024-11-21T06:49:18.690000
|
||||
CVE-2022-23821,0,0,3cd80f7c80135f029aa98cf0408d6bb892e9d6156659ee6944f2c1a7c7fd94fc,2024-11-21T06:49:18.963000
|
||||
@ -201371,7 +201371,7 @@ CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881
|
||||
CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000
|
||||
CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000
|
||||
CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000
|
||||
CVE-2022-3365,0,0,e21e3d9a50e1a8f3411fc09e903ea37e9ab2e3dbe6644212bc7fcd6140ebe0ff,2025-01-28T01:15:08.277000
|
||||
CVE-2022-3365,0,1,58ac0ea17e907ec681d70aa00994d0452cd8d41ea4da0c2336898fda59f06e51,2025-01-28T16:15:34.643000
|
||||
CVE-2022-33650,0,0,8ce80787b8df19552561bb21e3ad24057869ada7a0f0f982878d44e02b7ceac8,2024-11-21T07:08:15.140000
|
||||
CVE-2022-33651,0,0,9a318cb6a42b4e621fd1d5fee25d959d8bc2f3e44dc0a50b3ab6016651bb5f61,2024-11-21T07:08:15.250000
|
||||
CVE-2022-33652,0,0,f5146da1cfd413adcad997798a0d1b636c0788d5c4cd20b5dffba13a0f13cee1,2024-11-21T07:08:15.363000
|
||||
@ -204955,7 +204955,7 @@ CVE-2022-38087,0,0,3abd9f1efeb6184561ade4ca91955afc6a42c4485df9d83f9557afd1b4a29
|
||||
CVE-2022-38088,0,0,ca06efd770cad06ce74aa550e159e1a37d8432f883844dfb1879ee2073417ea5,2024-11-21T07:15:46.093000
|
||||
CVE-2022-38089,0,0,fbebd59a44614d844bdd1281aa173d01ac7fba6affa8a38247007f4774ddafe1,2024-11-21T07:15:46.230000
|
||||
CVE-2022-3809,0,0,ff70c64279d205ec14140d3115cd9cddf693be8d216ea456e4f6ba13b68b3b59,2024-11-21T07:20:16.623000
|
||||
CVE-2022-38090,0,0,1b46d51929e4cbf3b96883577926f4f84ab2add0cfc292756e5ff1ffe94d04de,2024-11-21T07:15:46.340000
|
||||
CVE-2022-38090,0,1,69e39827219e628e62c50ece37bdecfc105f724fbcd1208bdcedc8d1e475483e,2025-01-28T16:15:34.100000
|
||||
CVE-2022-38093,0,0,8b19a88b2225b156c4fa828402c7d106334aa2d5dce74ac85ec91283a9763098,2024-11-21T07:15:46.680000
|
||||
CVE-2022-38094,0,0,1596fd8416a957c74e2779d3056ef236ac7255f4d9105be9b3e22e18e10d14ab,2024-11-21T07:15:46.820000
|
||||
CVE-2022-38095,0,0,935eee8e648def7e11b80f97b75aa432008f2a9150fc79762d7a375cd170d267,2024-11-21T07:15:46.947000
|
||||
@ -206362,7 +206362,7 @@ CVE-2022-40073,0,0,e70cb5d8371fd7f2d3adb545818d1342b3d91ca78a490d67a70ba3cef3b61
|
||||
CVE-2022-40074,0,0,e6681222f196869647c103fb04c2071fb9eb5b2878fc4661c5940517bffb4565,2024-11-21T07:20:48.497000
|
||||
CVE-2022-40075,0,0,528238a21c223c94fd7e677a83885dfb032391305d3ea4dd2958f5640e7c5ad2,2024-11-21T07:20:48.647000
|
||||
CVE-2022-40076,0,0,c046b91313e33d852e787506d4c9c3b2814c879e207d5c27f199fbb28002715c,2024-11-21T07:20:48.800000
|
||||
CVE-2022-4008,0,1,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000
|
||||
CVE-2022-4008,0,0,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000
|
||||
CVE-2022-40080,0,0,0b19a6ef973056f75152ce2a1f048e7f1573677c516306567b89503bb7ee2bef,2024-11-21T07:20:48.960000
|
||||
CVE-2022-40082,0,0,56e76875663e98850cea47c91ae372970f7a80cab7e0f217ec87951590fd2597,2024-11-21T07:20:49.127000
|
||||
CVE-2022-40083,0,0,00c52ecc769d6134409ef73ebc9833bdb81527bec230aa202b259398d890e40a,2024-11-21T07:20:49.287000
|
||||
@ -215392,11 +215392,11 @@ CVE-2023-20513,0,0,7776ff01f91e5878655445e9bf7052bf6adde2a07843f41e59f135f097f32
|
||||
CVE-2023-20518,0,0,ec4070e10bb6753c589b73fc8777b131da82d0da8c8e27a0d18ea12dd1178ce6,2024-11-05T17:35:02.627000
|
||||
CVE-2023-20519,0,0,334e6205bc50dbe0dda46e080b5512b64b8b838d7dcef69d9c0e3875cd92a55e,2024-11-21T07:41:04.023000
|
||||
CVE-2023-2052,0,0,1e4161388b9b7a198878f66cab1655514d5646eef4374ad14c045ae17d5ec328,2024-11-21T07:57:50.540000
|
||||
CVE-2023-20520,0,0,63343e4ec485c0f35dd1069c649168e45984a37c50b1106499e6e21fca01f082,2024-11-21T07:41:04.147000
|
||||
CVE-2023-20520,0,1,8b30bccd7dd50b04b95a81ed05805a037cf85a960461a992bc08e26e7898f311,2025-01-28T16:15:34.843000
|
||||
CVE-2023-20521,0,0,fd93d0eb15c7822b1e307405ea23c5525a309ac03121fd6ca1496347bc964642,2024-11-21T07:41:04.330000
|
||||
CVE-2023-20522,0,0,45ab4766b0c799ec350aaab1c9149b610d74aaf2902c726aa2f87b62daabd46c,2024-11-21T07:41:04.570000
|
||||
CVE-2023-20523,0,0,faf481ef2dec80ed2f9cf8bf737a8a589661c03510549746aae65d6cddb4ed95,2024-11-21T07:41:04.690000
|
||||
CVE-2023-20524,0,0,a223612a0119bdb75bc5994e7c8ec19fd9f2a965e0f4af6801d42111c901442b,2024-11-21T07:41:04.847000
|
||||
CVE-2023-20524,0,1,8dd904eba1fe12b22384e0421fdd5d9210eb70700d452ad2d82329ad316a8e56,2025-01-28T16:15:35.090000
|
||||
CVE-2023-20525,0,0,86c19920bc8621b58e18b962b69881982e158b4b8e0eb076ac7dcabc76932145,2024-11-21T07:41:04.990000
|
||||
CVE-2023-20526,0,0,065150ad67194ab22fd8f2de5ccab3cb453cca06282056be34e89b36bbac36ec,2024-11-21T07:41:05.137000
|
||||
CVE-2023-20527,0,0,f5f779927233cf2a2b45f2d1f1cc4bd6bab52ac6416c9a4f508b379c9ece5690,2024-11-21T07:41:05.310000
|
||||
@ -217169,7 +217169,7 @@ CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794
|
||||
CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000
|
||||
CVE-2023-2236,0,0,7a218227d81da1e3f369ef4b8f9cd06e52cc34b359f143c1afab0c2fd8539745,2024-11-21T07:58:12.760000
|
||||
CVE-2023-22360,0,0,fd39a65648711ab8fca8410196aa194e55218a4b817fbfbb522e25878ac6b54a,2024-11-21T07:44:37.927000
|
||||
CVE-2023-22361,0,1,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000
|
||||
CVE-2023-22361,0,0,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000
|
||||
CVE-2023-22362,0,0,c3ba0f65014999f63dd9643dd347ae876cd94a8ac19156266e3221f4ca257c83,2024-11-21T07:44:38.150000
|
||||
CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16ac60,2024-11-21T07:44:38.263000
|
||||
CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000
|
||||
@ -217247,7 +217247,7 @@ CVE-2023-22438,0,0,5703d0c4eb5aa393e07fb85a45fb079e2501bb28ea84b28790691f2382e31
|
||||
CVE-2023-22439,0,0,ca68d33d01cfaf8fae9ea4cc43a47b0f92b3a227512f3203fc183a193b04683b,2024-11-21T07:44:48.323000
|
||||
CVE-2023-2244,0,0,9025fdc5a6a759ed98b80fd24d007a79e81c2dab5fc8cbc2e2ac71984ae522d5,2024-11-21T07:58:13.680000
|
||||
CVE-2023-22440,0,0,c5ec718ecf01186f250ace3719ba2ad09a9b09feb1366a6ca10e80d692ebffb0,2024-11-21T07:44:48.453000
|
||||
CVE-2023-22441,0,1,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000
|
||||
CVE-2023-22441,0,0,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000
|
||||
CVE-2023-22442,0,0,29a9cdca2e21aa6d398bb690de439ba4d4d2ddb0ea81a01806255dac3a21ff10,2024-11-21T07:44:48.687000
|
||||
CVE-2023-22443,0,0,9fddab8612d3067f0d4cebc1a90128c8533756620471b9c208288be6aa2f41d8,2024-11-21T07:44:48.817000
|
||||
CVE-2023-22444,0,0,20b223dec4ff7bd0b8efd2978a9b7375e7a68fedd8b267f92dd20c6f584cb0c1,2024-11-21T07:44:48.947000
|
||||
@ -218407,7 +218407,7 @@ CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fca
|
||||
CVE-2023-23899,0,0,83c684d5a0c0153ca536e41b4b1ec7ab525d48af8abf9c727f10c646f36b7714,2024-11-21T07:47:03.583000
|
||||
CVE-2023-2390,0,0,0b3933c68aac4c6dd381bee40c06fb4fbff5d2442ca411a48ccacdd9579faa67,2024-11-21T07:58:31.300000
|
||||
CVE-2023-23900,0,0,bcb049b1d07fa99f1c9c7b07a1a1e31428f3d9389488a84b2a6b57255ec7a77d,2024-11-21T07:47:03.723000
|
||||
CVE-2023-23901,0,1,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000
|
||||
CVE-2023-23901,0,0,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000
|
||||
CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000
|
||||
CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000
|
||||
CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000
|
||||
@ -218968,7 +218968,7 @@ CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4
|
||||
CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000
|
||||
CVE-2023-24584,0,0,450b8fe4752031bc85f08e6e3249bd441ebacea296c3154e9791a18ef187d89e,2024-11-21T07:48:10.787000
|
||||
CVE-2023-24585,0,0,8daffcf761a5e332fbb31dd00952f08646614a1fe870f4d740df8552f3a0ab79,2024-11-21T07:48:10.920000
|
||||
CVE-2023-24586,0,1,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000
|
||||
CVE-2023-24586,0,0,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000
|
||||
CVE-2023-24587,0,0,292e05491f18fcd1c7e0ecb44788f9081cc8b8543f871a74f452e2948d572e7f,2024-11-21T07:48:11.237000
|
||||
CVE-2023-24588,0,0,4a357365b75707750f9002dd1d54b5c251abd9b6ecad45bb39848b8c6c0c240a,2024-11-21T07:48:11.380000
|
||||
CVE-2023-24589,0,0,098dfca42c558b814e364ffb8a37e58cbd9b62cb01477fa4e47746b32480f74b,2024-11-21T07:48:11.503000
|
||||
@ -219354,9 +219354,9 @@ CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b57
|
||||
CVE-2023-25067,0,0,6ee55e97fa7054de1cfb0e958d38df776cb2a1824dea0f5315ab298b89f915e2,2024-12-09T13:15:23.200000
|
||||
CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000
|
||||
CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000
|
||||
CVE-2023-25070,0,1,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000
|
||||
CVE-2023-25070,0,0,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000
|
||||
CVE-2023-25071,0,0,e4fa2c8e71ed3ebf0e69731ddfba75b34ec50abf37f9a0a35ca7af0e752253ae,2024-11-21T07:49:02.867000
|
||||
CVE-2023-25072,0,1,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000
|
||||
CVE-2023-25072,0,0,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000
|
||||
CVE-2023-25073,0,0,faa56cf615949f57edd90ef85627d225940d3db6a28bd01dd46fbace2f38bd3f,2024-11-21T07:49:03.120000
|
||||
CVE-2023-25074,0,0,f9fc176b6b7e8915167411663c245628ea6a10ef6d26394f4ea82c7839d24074,2024-11-21T07:49:03.247000
|
||||
CVE-2023-25075,0,0,25335c7983447de1bb2c448769548c7ebd749f93baae0786465db7e2ad0a1e95,2024-11-21T07:49:03.390000
|
||||
@ -219475,7 +219475,7 @@ CVE-2023-25180,0,0,9c594a57ef3362d5c7f529a93ac159a56bac306f4849dec68b36e434e1827
|
||||
CVE-2023-25181,0,0,29d437748b5b0b1191ee76bfc7f9056117c6702ccb85aae9719438ec4611f4c4,2024-11-21T07:49:15.940000
|
||||
CVE-2023-25182,0,0,a11de1df0cacaf51b756500b43ba70b812535157065deee5df3b307e1abe5a62,2024-11-21T07:49:16.057000
|
||||
CVE-2023-25183,0,0,9dc08ea2e0bd8f00745279ad28938358f2df63ccf7df8fba93b0e55bb61f5733,2024-11-21T07:49:16.180000
|
||||
CVE-2023-25184,0,1,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000
|
||||
CVE-2023-25184,0,0,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000
|
||||
CVE-2023-25185,0,0,654ebd21078f1c5996fb55f66ebecc642265579f6eb0f98fcb3a07307e5d9a80,2024-12-12T22:15:06.247000
|
||||
CVE-2023-25186,0,0,ec4420d7c1ea5324e6f0bd6478cba82abfdf0c84215571aee85ba5a2b42cb753,2024-11-21T07:49:16.570000
|
||||
CVE-2023-25187,0,0,d19d0068cef419b7b1f2d261c4666d21e822db83b39c37d7957fec0cce6817a9,2024-12-12T21:15:06.680000
|
||||
@ -219795,12 +219795,12 @@ CVE-2023-25642,0,0,e8ced01f0b7a93d97b1fccad86986e0a1030c461d9fee8295cbc0d3751ced
|
||||
CVE-2023-25643,0,0,18dde583afda8da6447b7fc5d9bab3401cd028b66fb92fef8944c7d4aaf81dd4,2024-11-21T07:49:51.263000
|
||||
CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac60e,2024-11-21T07:49:51.387000
|
||||
CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000
|
||||
CVE-2023-25646,0,0,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000
|
||||
CVE-2023-25646,0,1,6b070d65d4a80d6a727ef95f1c7a9714916cf56c439f39d80e49bfad0caef4a1,2025-01-28T16:29:58.553000
|
||||
CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000
|
||||
CVE-2023-25648,0,1,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25648,0,0,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000
|
||||
CVE-2023-2565,0,0,b533c314e7bdbee51b7919f7d466927cc9624d83669f7284a3c70d8e5a7890eb,2024-11-21T07:58:50.483000
|
||||
CVE-2023-25650,0,1,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25650,0,0,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25651,0,0,8041ab7732534a3f15abe3d8b3c1a9f1432cc679b3c9dabd96eb7471cf125d9a,2024-11-21T07:49:52.290000
|
||||
CVE-2023-25652,0,0,9a2af3222703b12c596f16fed6f83ee7a9f2704131e4c9d1c16f143419251b78,2024-11-21T07:49:52.417000
|
||||
CVE-2023-25653,0,0,c79c2b8a5628263bd2bb95a4a5d5f1d09456b445a09ad3bb8cd4d64fe5f77c3b,2024-11-21T07:49:52.583000
|
||||
@ -221155,7 +221155,7 @@ CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9d
|
||||
CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000
|
||||
CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000
|
||||
CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000
|
||||
CVE-2023-27385,0,1,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
|
||||
CVE-2023-27385,0,0,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
|
||||
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
|
||||
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
|
||||
CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000
|
||||
@ -221284,7 +221284,7 @@ CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0
|
||||
CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000
|
||||
CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000
|
||||
CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000
|
||||
CVE-2023-27510,0,1,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
|
||||
CVE-2023-27510,0,0,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
|
||||
CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000
|
||||
CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000
|
||||
CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000
|
||||
@ -221301,7 +221301,7 @@ CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829
|
||||
CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000
|
||||
CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000
|
||||
CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000
|
||||
CVE-2023-27527,0,1,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000
|
||||
CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000
|
||||
CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000
|
||||
CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000
|
||||
CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000
|
||||
@ -224583,7 +224583,7 @@ CVE-2023-31677,0,0,bcf3c7e10e2a63db542637c44b6af1d38b0f7b06834e48fd76d2c43aaf0c4
|
||||
CVE-2023-31678,0,0,f38078099aa2cae4702ad7ad25370979047193087a4a1644b1f1a43716d2c986,2025-01-23T17:15:12.187000
|
||||
CVE-2023-31679,0,0,cd77c7d833b81e176fd505de111957b2b2546fa3a06e3b2d516e61678dbdf298,2025-01-23T17:15:12.350000
|
||||
CVE-2023-3168,0,0,1bd92a1174d3d25efb01791dc24e9721f58f20da4ecaaad50c6cc157e99ec726,2024-11-21T08:16:36.643000
|
||||
CVE-2023-31689,0,0,e1a0688f6f537b7c1fa56c9ec182be01ee7169349e51aec1bda32ba01c926cc0,2024-11-21T08:02:09.323000
|
||||
CVE-2023-31689,0,1,ba8ce1ec50f7bc59bc1742bfc8237c05e6e92e1170aca920f92d2135a234a4cc,2025-01-28T16:15:35.497000
|
||||
CVE-2023-3169,0,0,c91442e162ed6b40e2ae0d4cb311993a8a2c9d900971320a57eb9faf25b7a47c,2024-11-21T08:16:36.763000
|
||||
CVE-2023-31698,0,0,8c41f620a0b0851f781e3f3c6cb4ecc9f44b43d68037b88e96fa4ec01608a58d,2024-11-21T08:02:09.457000
|
||||
CVE-2023-31699,0,0,53129eaf3a83785c0fc3132ffe189c5da80a64b39e9211df74592a9f2bf7e5c6,2025-01-22T18:15:17.453000
|
||||
@ -224614,7 +224614,7 @@ CVE-2023-31729,0,0,fb850d7e9530696277b89467d42b2446bbca42462c9d5510c48ec451f9e2b
|
||||
CVE-2023-3173,0,0,022677952ebd42989b06e1597f2563b8948d7c0602e4beeb60f1c2aa27971ff0,2024-11-21T08:16:37.493000
|
||||
CVE-2023-31740,0,0,80e7b9a45904c8543256467b80a91316d59d9a1749284741343b92ae51a51232,2025-01-21T19:15:10.353000
|
||||
CVE-2023-31741,0,0,b89581e0d2046fed9493237ea7dce65f515c3b7ec5a3eb03b769c3cda9c77a61,2025-01-21T19:15:10.547000
|
||||
CVE-2023-31742,0,0,4c39e5d01348f84c495d575eca9ea50662e51a5fe50b47b11a8aff9ab90a53ef,2024-11-21T08:02:13.737000
|
||||
CVE-2023-31742,0,1,79ae55d4c3ed67071ad7042d27cdc3c91046849382fbcf8c726d2f9ec10108ab,2025-01-28T16:15:35.723000
|
||||
CVE-2023-31746,0,0,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfdb61,2025-01-06T17:15:13.100000
|
||||
CVE-2023-31747,0,0,b8b56959c6373967e26817aac4b6c53e61c1c72f4122342a10fe51993e0cd879,2025-01-21T19:15:10.737000
|
||||
CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000
|
||||
@ -225339,9 +225339,9 @@ CVE-2023-32564,0,0,0110939bbbb296f8a1f1c00eaf9f1d011e42a76f4d099cf6325379b063f2f
|
||||
CVE-2023-32565,0,0,c758dc41ed02cd23af8831add347bf021d7a6870c2092336f155e1024b96d95c,2024-11-21T08:03:36.767000
|
||||
CVE-2023-32566,0,0,5b005c26bbcaa68d97a8a9cddb900380525a4257f5c8b9c6d97371f57050c466,2024-11-21T08:03:36.887000
|
||||
CVE-2023-32567,0,0,e0546d57e233b6a00a0c74841e953885d4a8160cbd2f9b3978b168ecf27ba260,2024-11-21T08:03:37.007000
|
||||
CVE-2023-32568,0,0,4ec2577b59d133a1c8bbbb0b243257f68ebc439eba98303245c7e96d39392477,2024-11-21T08:03:37.133000
|
||||
CVE-2023-32569,0,0,d6b9bae9b3c4eb94354882bc9fa141696546622ccd5e7ff303745011c179701c,2024-11-21T08:03:37.287000
|
||||
CVE-2023-32570,0,0,1a1ee02218f84d3f8f62a376ce6c3dcf84497e7066d7437194a67436cd308025,2024-11-21T08:03:37.430000
|
||||
CVE-2023-32568,0,1,ce2d5346fe68a1f1977bffced979f73ebcfd87233aa06bbd0e8906139a442807,2025-01-28T16:15:35.987000
|
||||
CVE-2023-32569,0,1,858a8b493283d46c6983789bd883cdbd6b0dc7af409eb35c4de645aba27f5c05,2025-01-28T16:15:36.150000
|
||||
CVE-2023-32570,0,1,99af3003c5e35828644727ab1f19d14a509d00b4a9a41710ed0f84a197c03ee2,2025-01-28T16:15:36.333000
|
||||
CVE-2023-32571,0,0,1014efdf87437be49397d72af75e29ed93957fc73be6bc4c6eaf7c7e362bb8ee,2024-11-21T08:03:37.590000
|
||||
CVE-2023-32572,0,0,9a61e2958a4814e7739c5bca06ec91ce656d578c176075880f69c1b3ad5a82b6,2024-11-21T08:03:37.737000
|
||||
CVE-2023-32573,0,0,a1532dcaac2f177cf96f0e0d15e4ce0b45ae7dbe247505f8db1e4bc642cf5590,2025-01-27T21:15:11.243000
|
||||
@ -232490,13 +232490,13 @@ CVE-2023-41772,0,0,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6
|
||||
CVE-2023-41773,0,0,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000
|
||||
CVE-2023-41774,0,0,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000
|
||||
CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000
|
||||
CVE-2023-41776,0,1,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41779,0,1,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41776,0,0,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41779,0,0,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000
|
||||
CVE-2023-4178,0,0,1141fd40ba18bee37e1c42fae821d1b64549ca6cc2a33d2a55286ccb58509271,2024-11-21T08:34:33.433000
|
||||
CVE-2023-41780,0,1,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41780,0,0,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41781,0,0,19fc06020fc9ee508abcb1f4254ac105cd846b8768551d2051e133fcf7cc9f16,2024-11-21T08:21:40.457000
|
||||
CVE-2023-41782,0,1,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41783,0,1,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41782,0,0,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41783,0,0,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41784,0,0,a8ebf61f8b77dfe47b65c2a49d655477006d0f22c6688955b05553cef45f4c1c,2024-11-21T08:21:40.887000
|
||||
CVE-2023-41786,0,0,679e1ab2a11d5095960d26f95e0bea184bf9a762765b891d0eb540ee9417bb2c,2024-11-21T08:21:41.023000
|
||||
CVE-2023-41787,0,0,538197acdb53a2536c302129254e1b8e381ed654db4bfe21b17f47a8b5eaa3d2,2024-11-21T08:21:41.150000
|
||||
@ -245073,8 +245073,8 @@ CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a
|
||||
CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000
|
||||
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
|
||||
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
|
||||
CVE-2024-11954,1,1,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000
|
||||
CVE-2024-11956,1,1,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000
|
||||
CVE-2024-11954,0,0,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000
|
||||
CVE-2024-11956,0,0,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000
|
||||
CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000
|
||||
CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000
|
||||
CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000
|
||||
@ -245680,7 +245680,7 @@ CVE-2024-12717,0,0,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275a
|
||||
CVE-2024-12719,0,0,6e113e19479495992fd0f698aec2463ab1e0a34cf6f80cb6f4fc67b14c63b540,2025-01-07T10:15:07.323000
|
||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||
CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000
|
||||
CVE-2024-12723,0,0,cf512e4db24e5978657de7d385acad4042bd6d708f13d756e3aac43342c38eb6,2025-01-28T06:15:31.370000
|
||||
CVE-2024-12723,0,1,5f12518e7f9f0df8a91b8296f6f86b0b561b4474759814a3fb8c7b64943255ad,2025-01-28T16:15:37.430000
|
||||
CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000
|
||||
CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000
|
||||
CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000
|
||||
@ -245728,7 +245728,7 @@ CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf
|
||||
CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000
|
||||
CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000
|
||||
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
|
||||
CVE-2024-12807,0,0,fa880fedc4c863866634d2a0780beaa56e686b63fa7ec5a788046683be0dcc3c,2025-01-28T06:15:31.680000
|
||||
CVE-2024-12807,0,1,ddbe1339bdc0147fc12b37b5f5fb8455c3f845277526b2584620ced7a2147952,2025-01-28T16:15:37.633000
|
||||
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
|
||||
CVE-2024-12816,0,0,79eb2dd90c9c17b3c2a7f3ee70302afe651f99aae7099dfbb75f3ebb64366af3,2025-01-25T08:15:08.137000
|
||||
CVE-2024-12817,0,0,32f9e7e0f8e1095319b7a827501ce7d109efcd2bf6309a60da88244f6164d371,2025-01-25T08:15:08.300000
|
||||
@ -248689,9 +248689,9 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6
|
||||
CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000
|
||||
CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000
|
||||
CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000
|
||||
CVE-2024-22062,0,1,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000
|
||||
CVE-2024-22062,0,0,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000
|
||||
CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000
|
||||
CVE-2024-22064,0,0,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000
|
||||
CVE-2024-22064,0,1,8d540dd94bb5f229f66fba83ffdffbac152147b35ab3dd7610555afda1d84b7b,2025-01-28T16:12:31.863000
|
||||
CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000
|
||||
CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000
|
||||
CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000
|
||||
@ -249793,7 +249793,7 @@ CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277
|
||||
CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000
|
||||
CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000
|
||||
CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000
|
||||
CVE-2024-23591,0,1,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000
|
||||
CVE-2024-23591,0,0,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000
|
||||
CVE-2024-23592,0,0,ef014cbf8808263f731f61b0bea284cf199deacfcf795438ec07cedc3d97e15d,2024-11-21T08:57:58.270000
|
||||
CVE-2024-23593,0,0,1669104ef0f6d536595a3f0242aea2e399af734f766398709f067343dd11f88d,2024-11-21T08:57:58.400000
|
||||
CVE-2024-23594,0,0,1f0e1d4dfefab44adcf5b5a1aea994e7319979d868c10f29cf8eb184905dd76b,2024-11-21T08:57:58.520000
|
||||
@ -250131,7 +250131,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa
|
||||
CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000
|
||||
CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000
|
||||
CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000
|
||||
CVE-2024-23953,0,1,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000
|
||||
CVE-2024-23953,0,0,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000
|
||||
CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000
|
||||
CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000
|
||||
CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000
|
||||
@ -258575,7 +258575,7 @@ CVE-2024-35294,0,0,1c6f1605fc3c9904bc421a18ad31d4464fc1e4554d4917d8dd1c25b7a0d02
|
||||
CVE-2024-35296,0,0,40769f470665a8f5701939f0eb28f8f5b53e116a5eb768803583af8eaa677464,2024-11-21T09:20:05.773000
|
||||
CVE-2024-35297,0,0,23e69c7fa8758d2839ba0f21232e1c70c9a4debd79526bb77618b215f0e86ca8,2024-11-21T09:20:05.907000
|
||||
CVE-2024-35298,0,0,fa7788bf317a71a84bf8146795eafa26bcb4ed57f180f49f693caedd58415924,2024-11-21T09:20:06.100000
|
||||
CVE-2024-35299,0,0,66ebbab2b0a692e2b1d921e2a31108ce541366992eb29d6d2df1746eef7b2b2c,2024-11-21T09:20:06.297000
|
||||
CVE-2024-35299,0,1,0ce5ddda10cf58c6e1ac79722bb6069b8f6eded11917b404a1cd1e7eb3548184,2025-01-28T16:35:03.737000
|
||||
CVE-2024-3530,0,0,19a26ee56ded29d2e11b10a192b107effee98b98e60c5d0c5a925841596c5055,2024-11-21T09:29:47.480000
|
||||
CVE-2024-35300,0,0,8476854df88ded7ab4fe4db1007017684a43223b3513105c5d461b5e9e5fe242,2024-12-16T15:48:36.930000
|
||||
CVE-2024-35301,0,0,3aa290a2314ba6b70fc37ae1db563a8252a1099fb3aea3ee731b4ca2cd8d2137,2024-12-16T15:51:28.007000
|
||||
@ -261570,7 +261570,7 @@ CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3
|
||||
CVE-2024-38909,0,0,b15b2d0b578ec22ef9b768dfad1ac7e18a3e7777eb1f844ceb5682377b647733,2024-11-21T09:26:59.560000
|
||||
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
|
||||
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
|
||||
CVE-2024-3892,0,0,168f6aff52bfffda49f624381b72994cf29f64be38888e2b464dc312a00a3830,2024-11-21T09:30:38.637000
|
||||
CVE-2024-3892,0,1,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000
|
||||
CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000
|
||||
CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000
|
||||
CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000
|
||||
@ -264305,7 +264305,7 @@ CVE-2024-42852,0,0,b81891c57cec62244510e3d84ae796ccaf7c41b7c9858039dc7f4522044e0
|
||||
CVE-2024-4286,0,0,fc10432f74acfd23bc16db5ad2ae8d1fb5ffa13fb0db5216eff98611dc6693fd,2024-11-21T09:42:32.600000
|
||||
CVE-2024-42861,0,0,c171ccea5ad776c157b3e5743fbc5040713688f83926001b0f23825a30a4e8b5,2024-09-30T17:35:11.653000
|
||||
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
|
||||
CVE-2024-4288,0,0,a90edbd9d891b348809fde369462e544cf47349997cd076b1f05ba954e1b5203,2024-11-21T09:42:32.860000
|
||||
CVE-2024-4288,0,1,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
|
||||
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
|
||||
CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000
|
||||
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
|
||||
@ -266179,13 +266179,13 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44
|
||||
CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000
|
||||
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
|
||||
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
|
||||
CVE-2024-45336,0,0,3e7ae3add87fdedc39007439173db0ef558280c47154def679c01839605d6db3,2025-01-28T02:15:28.807000
|
||||
CVE-2024-45336,0,1,58e68f7c35a3e0d7bbc9bde00e471a0d85b4ad129fcd4b117e8ad183ef45a26b,2025-01-28T16:15:38.220000
|
||||
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
|
||||
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
|
||||
CVE-2024-45339,0,0,1278bba7c73d64a4463ca6a2d25240e7cccf0db0f2382bb80d4dc77aec2a5b1b,2025-01-28T02:15:28.927000
|
||||
CVE-2024-45339,0,1,2657449aeecf358a747d3833a8bad48d5c5984d5d31941c928f3a6165aa77854,2025-01-28T16:15:38.367000
|
||||
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
|
||||
CVE-2024-45340,0,0,2c4623ca46a98e086eee38c98fc33ffd94922e7be2544c8d0cbd2745609b8d3d,2025-01-28T02:15:29.050000
|
||||
CVE-2024-45341,0,0,0809e593d93d0e45831640bffac5034f296f07d3c2d59a6a5ba0ce3172378a9c,2025-01-28T02:15:29.147000
|
||||
CVE-2024-45340,0,1,b5aab4b2896907244da5a423def985944e88d20aed34eecfddef8969458a8ed7,2025-01-28T16:15:38.517000
|
||||
CVE-2024-45341,0,1,9c3af9974b32c4ca5b0cd4e0c752d66cd7aeaea007c41b684aa86af58604ba05,2025-01-28T16:15:38.650000
|
||||
CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
|
||||
CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
|
||||
CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
|
||||
@ -269988,7 +269988,7 @@ CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85
|
||||
CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000
|
||||
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
|
||||
CVE-2024-50664,0,0,1fdbd6c57bb31afbb483101d6ed8dc43655bb3434beb0c6c63777e5dea4eb589,2025-01-23T22:15:13.667000
|
||||
CVE-2024-50665,0,0,9bff4b7cd271941bca588d7fef13aaa9a06c4a4cba1b66a32d4c74182b27ff2e,2025-01-23T22:15:13.790000
|
||||
CVE-2024-50665,0,1,e23cfc84806902554f96be5a4f6053908a31047113bc4150b656a3b0c69a6b9b,2025-01-28T16:15:38.797000
|
||||
CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000
|
||||
CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000
|
||||
CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000
|
||||
@ -272473,10 +272473,10 @@ CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5
|
||||
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
|
||||
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
|
||||
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
||||
CVE-2024-54475,0,0,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000
|
||||
CVE-2024-54475,0,1,775ec2ccbbbc7d76f505a322b572f9baa34329391d668720ed36223c584406df,2025-01-28T16:15:39.167000
|
||||
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
|
||||
CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000
|
||||
CVE-2024-54478,0,1,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000
|
||||
CVE-2024-54478,0,0,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000
|
||||
CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000
|
||||
CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000
|
||||
CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000
|
||||
@ -272493,7 +272493,7 @@ CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d05623
|
||||
CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000
|
||||
CVE-2024-54497,0,0,6c931e88af4ef1b6e785f08151bbc21af8defbb5ea02edf8fcb1c5cf3270c15d,2025-01-27T22:15:12.583000
|
||||
CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000
|
||||
CVE-2024-54499,0,0,1587a813e75a49803d367936d691c19e3eeb984364f69f6aabb295d83310b09d,2025-01-27T22:15:12.680000
|
||||
CVE-2024-54499,0,1,c133d3f15988c5ac34c810762fe5ec20ea83eda4ebf16dbab8404963c417b3f8,2025-01-28T16:15:39.303000
|
||||
CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000
|
||||
CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000
|
||||
CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000
|
||||
@ -272502,7 +272502,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df
|
||||
CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000
|
||||
CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000
|
||||
CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000
|
||||
CVE-2024-54507,0,1,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000
|
||||
CVE-2024-54507,0,0,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000
|
||||
CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000
|
||||
CVE-2024-54509,0,0,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000
|
||||
CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000
|
||||
@ -272513,34 +272513,34 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309
|
||||
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
|
||||
CVE-2024-54516,0,0,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000
|
||||
CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000
|
||||
CVE-2024-54518,0,1,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
|
||||
CVE-2024-54519,0,1,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000
|
||||
CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
|
||||
CVE-2024-54519,0,0,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000
|
||||
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
|
||||
CVE-2024-54520,0,0,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000
|
||||
CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000
|
||||
CVE-2024-54523,0,1,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000
|
||||
CVE-2024-54523,0,0,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000
|
||||
CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
|
||||
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
|
||||
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
|
||||
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
|
||||
CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54530,0,0,da8332735200c0a6f862416fece7f7fc7e57b57e342ec63f5a3515be83c84585,2025-01-27T22:15:13.753000
|
||||
CVE-2024-54530,0,1,b2115a5253c8f295f8da3ec0a11eca80d9250abe9135d8d48e4eae4b7c3c1fb7,2025-01-28T16:15:39.450000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000
|
||||
CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000
|
||||
CVE-2024-54537,0,0,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000
|
||||
CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000
|
||||
CVE-2024-54539,0,1,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000
|
||||
CVE-2024-54539,0,0,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000
|
||||
CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000
|
||||
CVE-2024-54541,0,0,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000
|
||||
CVE-2024-54542,0,1,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000
|
||||
CVE-2024-54542,0,0,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000
|
||||
CVE-2024-54543,0,0,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000
|
||||
CVE-2024-54547,0,0,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000
|
||||
CVE-2024-54547,0,1,2ce7ebd8dc7ed2fc58eb2f77522780dacbba66c07b08536995b0bed9a41a2ed7,2025-01-28T16:15:39.603000
|
||||
CVE-2024-54549,0,0,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000
|
||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||
CVE-2024-54550,0,0,e813c3b2e30fbc9af78a93fcf3f62083567d452d1e62ce7ff0c3c5068da641a6,2025-01-27T22:15:14.580000
|
||||
CVE-2024-54550,0,1,cf2419cf86ce3280d8018811b8a0a12cf59a849c3ad266419d3ac3c972049bc4,2025-01-28T16:15:39.773000
|
||||
CVE-2024-54557,0,0,0497db03b589d583d836efddd0e32b6368ca6e56450d80e21c65082431a6c35b,2025-01-27T22:15:14.670000
|
||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
||||
@ -272703,8 +272703,8 @@ CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806
|
||||
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
|
||||
CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000
|
||||
CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000
|
||||
CVE-2024-55194,0,0,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000
|
||||
CVE-2024-55195,0,1,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000
|
||||
CVE-2024-55194,0,1,c38cb72c8f81c8ae4f496dafee53f7ca664e363ce35004199c8c73fda469a1f8,2025-01-28T16:15:39.927000
|
||||
CVE-2024-55195,0,0,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000
|
||||
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
||||
@ -274536,7 +274536,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f
|
||||
CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000
|
||||
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000
|
||||
CVE-2024-6351,1,1,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000
|
||||
CVE-2024-6351,0,0,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000
|
||||
CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000
|
||||
CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000
|
||||
CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000
|
||||
@ -275878,7 +275878,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac
|
||||
CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000
|
||||
CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000
|
||||
CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000
|
||||
CVE-2024-7881,1,1,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000
|
||||
CVE-2024-7881,0,0,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000
|
||||
CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000
|
||||
CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000
|
||||
CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000
|
||||
@ -277777,6 +277777,7 @@ CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb6
|
||||
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
|
||||
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
|
||||
CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000
|
||||
CVE-2025-0432,1,1,9f823e7859a9303a996b3c64743c4232542833d3a53d421588a9d745c50d603e,2025-01-28T16:15:40.183000
|
||||
CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000
|
||||
CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000
|
||||
CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000
|
||||
@ -277880,6 +277881,7 @@ CVE-2025-0638,0,0,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d
|
||||
CVE-2025-0648,0,0,7c07f8a9922bc43bc4487ab208bcf7a7d7e60788bb09a129a0ee4eabefb874ff,2025-01-23T11:15:11.030000
|
||||
CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf70,2025-01-23T18:15:33.110000
|
||||
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
|
||||
CVE-2025-0659,1,1,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
|
||||
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
|
||||
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
|
||||
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
|
||||
@ -278577,7 +278579,7 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd
|
||||
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
|
||||
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
|
||||
CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000
|
||||
CVE-2025-22865,0,0,a230429544aa2c6786a3863896558bf7a7afe958cdc9d412012c493e8058a98b,2025-01-28T02:15:29.243000
|
||||
CVE-2025-22865,0,1,cf415926e77c21e99a39a9cfe2c641fe13fa0618d5fb446a10a390fe83b03728,2025-01-28T16:15:40.540000
|
||||
CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000
|
||||
CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000
|
||||
CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000
|
||||
@ -278622,6 +278624,7 @@ CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8
|
||||
CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000
|
||||
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
|
||||
CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
|
||||
CVE-2025-23045,1,1,f178d85d6e2e1bc41349bb3607f9a44cd436178af8a68c7f7ca82142f5b04422,2025-01-28T16:15:40.690000
|
||||
CVE-2025-23047,0,0,6fdba3566238181d8ca3c91ca160e254b213eed36441cd5f9334903c854d1fd2,2025-01-22T18:15:21.893000
|
||||
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
|
||||
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
|
||||
@ -278635,7 +278638,7 @@ CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca9
|
||||
CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000
|
||||
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
|
||||
CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000
|
||||
CVE-2025-23084,0,0,3eb9b1b6f9bb179ab9a29b725c978bec728033a30bf279f15395efb6094f00e4,2025-01-28T05:15:11.267000
|
||||
CVE-2025-23084,0,1,5f743e4152aa1396e90a03cddd28c1d417d67f631ccbc3bbb7bfb90db72a87f6,2025-01-28T16:15:40.827000
|
||||
CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000
|
||||
CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000
|
||||
CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000
|
||||
@ -278666,6 +278669,9 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f
|
||||
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
|
||||
CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
|
||||
CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000
|
||||
CVE-2025-23211,1,1,006f5a7ce38277883e5ec8e22df55c9d550b638bdc53265d7e1846c3d7038b43,2025-01-28T16:15:40.937000
|
||||
CVE-2025-23212,1,1,bd594dbd158738f9322e80e1196e25d70ccf44f6ed0dfe2452c4e50dfc5a5d02,2025-01-28T16:15:41.080000
|
||||
CVE-2025-23213,1,1,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000
|
||||
CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000
|
||||
CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000
|
||||
CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000
|
||||
@ -278676,6 +278682,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
|
||||
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
|
||||
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
|
||||
CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
|
||||
CVE-2025-23385,1,1,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000
|
||||
CVE-2025-23422,0,0,0bfcbffa99a5b85a71c8ee37755dbd0aca82e1025173efce8505c4ff37c6deb2,2025-01-24T11:15:09.987000
|
||||
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
|
||||
CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000
|
||||
@ -279047,68 +279054,68 @@ CVE-2025-24027,0,0,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bd
|
||||
CVE-2025-24030,0,0,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000
|
||||
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
|
||||
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
|
||||
CVE-2025-24085,0,0,c14028dc84daee9d90020a98a98eab2b31ec934ec9b6933876856177a5f6f4b0,2025-01-27T22:15:14.990000
|
||||
CVE-2025-24085,0,1,cd6eaca5b429f80fb0a35bc2d721227de78643291355f6b6fe912a9dcce479cf,2025-01-28T16:15:41.540000
|
||||
CVE-2025-24086,0,0,7c5dca39e6ccd2231eef6bf1dd5f599552abe1ede3ec1541e3a2ac0474eb97aa,2025-01-27T22:15:15.080000
|
||||
CVE-2025-24087,0,0,835732cf3eefe74b8ac13f2a4025988b418c0a20b7f315efff16a3050e6ed224,2025-01-27T22:15:15.180000
|
||||
CVE-2025-24092,0,0,d9a8d44da95886fec6e8ccce9614e643a214860b6ea08f6de6640d3577ec027b,2025-01-27T22:15:15.267000
|
||||
CVE-2025-24093,0,0,95657131e09c206793fd530c0fc80d357c2b135e7c8257f69d778887a02ee6c8,2025-01-27T22:15:15.350000
|
||||
CVE-2025-24092,0,1,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65cbb0,2025-01-28T16:15:41.697000
|
||||
CVE-2025-24093,0,1,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000
|
||||
CVE-2025-24094,0,0,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46b2e,2025-01-27T22:15:15.450000
|
||||
CVE-2025-24096,0,0,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000
|
||||
CVE-2025-24100,0,0,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000
|
||||
CVE-2025-24101,0,0,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000
|
||||
CVE-2025-24102,0,1,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
|
||||
CVE-2025-24103,0,0,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000
|
||||
CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
|
||||
CVE-2025-24103,0,1,b855906b195c4dc587795824d73768dd8eb50f59e5ebd39c191f21e7d50f830d,2025-01-28T16:15:41.990000
|
||||
CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000
|
||||
CVE-2025-24106,0,1,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000
|
||||
CVE-2025-24106,0,0,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000
|
||||
CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000
|
||||
CVE-2025-24108,0,0,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000
|
||||
CVE-2025-24109,0,0,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000
|
||||
CVE-2025-24112,0,0,1d2969d6d80d7a4b29f11c091a804966e89ceb608d695ab0187a156e13995338,2025-01-27T22:15:16.433000
|
||||
CVE-2025-24113,0,0,e3165632c8b4ddab1258ba856efb494e13b0ebef36ddf947b35aaf4ec3db0771,2025-01-27T22:15:16.530000
|
||||
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
|
||||
CVE-2025-24115,0,0,c95e3395453557e5b431aefc85034f76f0c8b1b69d0a1fcb1a61c73ba0c35f9c,2025-01-27T22:15:16.713000
|
||||
CVE-2025-24115,0,1,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
|
||||
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
|
||||
CVE-2025-24117,0,0,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000
|
||||
CVE-2025-24118,0,0,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000
|
||||
CVE-2025-24118,0,1,c4c7cf0ccae327f1e2910a4df7950a5f148425468f8ed5cf85ce2f00e56e9e3f,2025-01-28T16:15:42.293000
|
||||
CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000
|
||||
CVE-2025-24121,0,1,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
|
||||
CVE-2025-24122,0,0,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000
|
||||
CVE-2025-24123,0,0,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000
|
||||
CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
|
||||
CVE-2025-24122,0,1,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000
|
||||
CVE-2025-24123,0,1,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000
|
||||
CVE-2025-24124,0,0,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000
|
||||
CVE-2025-24126,0,1,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
|
||||
CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
|
||||
CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000
|
||||
CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000
|
||||
CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000
|
||||
CVE-2025-24130,0,1,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
|
||||
CVE-2025-24130,0,0,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
|
||||
CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000
|
||||
CVE-2025-24134,0,0,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000
|
||||
CVE-2025-24135,0,0,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000
|
||||
CVE-2025-24134,0,1,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000
|
||||
CVE-2025-24135,0,1,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000
|
||||
CVE-2025-24136,0,0,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000
|
||||
CVE-2025-24137,0,0,5b657031fc0d48278d9bcd3c281388e4962e50effbbb855d3f7f9bc7f3ab725c,2025-01-27T22:15:18.433000
|
||||
CVE-2025-24138,0,0,71fd490bb69478196eafb3b55c96daeb767ba26484dc123dd17ce73d9d828684,2025-01-27T22:15:18.530000
|
||||
CVE-2025-24139,0,0,699ab002de103a9fc6370545e2866b9dc1d733dd6b9058c60c5b4f122324b8d4,2025-01-27T22:15:18.627000
|
||||
CVE-2025-24138,0,1,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000
|
||||
CVE-2025-24139,0,1,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000
|
||||
CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000
|
||||
CVE-2025-24141,0,0,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000
|
||||
CVE-2025-24143,0,0,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000
|
||||
CVE-2025-24145,0,0,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000
|
||||
CVE-2025-24146,0,1,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000
|
||||
CVE-2025-24149,0,0,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000
|
||||
CVE-2025-24146,0,0,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000
|
||||
CVE-2025-24149,0,1,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeecc11,2025-01-28T16:15:43.387000
|
||||
CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000
|
||||
CVE-2025-24151,0,1,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
|
||||
CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
|
||||
CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000
|
||||
CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000
|
||||
CVE-2025-24154,0,0,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000
|
||||
CVE-2025-24154,0,1,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000
|
||||
CVE-2025-24156,0,0,b31e860ae0f287a4e55d80ce5295e8b216141d9744778e55fcbf70961f9196e0,2025-01-27T22:15:19.710000
|
||||
CVE-2025-24158,0,0,958ab24a351c08ae2d37d82aa9a58131653fdda58ef39d0038d1a6bcd29d13cb,2025-01-27T22:15:19.800000
|
||||
CVE-2025-24159,0,0,1b9aba57afa1c7268c6f0a356b044e00ee89cb5b596c74f23398ec84262146ee,2025-01-27T22:15:19.897000
|
||||
CVE-2025-24160,0,0,1b6ff2d4bc9c9beb4ec9901d4c44f5db885014d9dffe1fb867c9b5f4c3925fc6,2025-01-27T22:15:19.987000
|
||||
CVE-2025-24158,0,1,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000
|
||||
CVE-2025-24159,0,1,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000
|
||||
CVE-2025-24160,0,1,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000
|
||||
CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000
|
||||
CVE-2025-24162,0,0,9463e44df647b566fdc6d77ad9aa2961be851ffbe1b612e2da53bb5785b9c7b6,2025-01-27T22:15:20.167000
|
||||
CVE-2025-24163,0,0,91fc2f170654ac01d435f8f1dbaf7034d0eee62c47dae1f32a2cb5960eca0c04,2025-01-27T22:15:20.267000
|
||||
CVE-2025-24162,0,1,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000
|
||||
CVE-2025-24163,0,1,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000
|
||||
CVE-2025-24166,0,0,9ca035738a2e0b4c88133f181378b4ebabcfdd0e45c248150891735b95780aa9,2025-01-27T22:15:20.357000
|
||||
CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000
|
||||
CVE-2025-24174,0,0,c4428cb0ae7d4247d293b4a79c4936682809d79d5f83a3777284666b7ed6f45f,2025-01-27T22:15:20.547000
|
||||
CVE-2025-24176,0,0,093d4bc1cead3fb3eb26eee3735d4f5a8e3bd4316b3fc0d2d6afa3b52cddf359,2025-01-27T22:15:20.643000
|
||||
CVE-2025-24174,0,1,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000
|
||||
CVE-2025-24176,0,1,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
|
||||
CVE-2025-24177,0,0,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000
|
||||
CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
|
||||
CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
|
||||
@ -279280,7 +279287,8 @@ CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651f
|
||||
CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000
|
||||
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
|
||||
CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000
|
||||
CVE-2025-24783,0,0,3767ef322fc0c20fd082201a2ac0c7b57ed64f90c79baef6c1c88b7b021b0a09,2025-01-27T19:15:29.637000
|
||||
CVE-2025-24783,0,1,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
|
||||
CVE-2025-24800,1,1,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000
|
||||
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
|
||||
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
|
||||
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user