mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-07T19:00:20.325723+00:00
This commit is contained in:
parent
5d58920b43
commit
8bedbb0982
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-27059",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-03-11T16:15:17.583",
|
||||
"lastModified": "2024-11-21T05:57:16.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T17:12:53.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36400",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2023-03-06T22:15:09.547",
|
||||
"lastModified": "2024-11-21T06:13:41.120",
|
||||
"lastModified": "2025-03-07T18:15:34.827",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36401",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2023-03-06T22:15:09.620",
|
||||
"lastModified": "2024-11-21T06:13:41.230",
|
||||
"lastModified": "2025-03-07T18:15:35.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36402",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2023-03-06T23:15:10.473",
|
||||
"lastModified": "2024-11-21T06:13:41.343",
|
||||
"lastModified": "2025-03-07T18:15:35.320",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-36403",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2023-03-06T23:15:10.540",
|
||||
"lastModified": "2024-11-21T06:13:41.453",
|
||||
"lastModified": "2025-03-07T18:15:35.547",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-38734",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2023-03-02T18:15:09.477",
|
||||
"lastModified": "2024-11-21T07:17:00.363",
|
||||
"lastModified": "2025-03-07T18:15:35.860",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45552",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T13:15:10.803",
|
||||
"lastModified": "2024-11-21T07:29:26.583",
|
||||
"lastModified": "2025-03-07T18:15:36.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45553",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T13:15:10.867",
|
||||
"lastModified": "2024-11-21T07:29:26.757",
|
||||
"lastModified": "2025-03-07T18:15:36.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-01T16:15:09.580",
|
||||
"lastModified": "2024-11-21T07:29:28.860",
|
||||
"lastModified": "2025-03-07T18:15:36.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45988",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T15:15:10.737",
|
||||
"lastModified": "2024-11-21T07:30:02.777",
|
||||
"lastModified": "2025-03-07T17:15:14.773",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46973",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T22:15:09.427",
|
||||
"lastModified": "2024-11-21T07:31:21.717",
|
||||
"lastModified": "2025-03-07T17:15:15.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47664",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T15:15:10.887",
|
||||
"lastModified": "2024-11-21T07:32:20.380",
|
||||
"lastModified": "2025-03-07T17:15:16.053",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T15:15:10.960",
|
||||
"lastModified": "2024-11-21T07:32:20.507",
|
||||
"lastModified": "2025-03-07T17:15:16.230",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23313",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T22:15:09.690",
|
||||
"lastModified": "2024-11-21T07:45:58.963",
|
||||
"lastModified": "2025-03-07T17:15:16.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-01T21:15:10.723",
|
||||
"lastModified": "2024-11-21T07:47:24.847",
|
||||
"lastModified": "2025-03-07T17:15:16.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24641",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T19:15:11.117",
|
||||
"lastModified": "2024-11-21T07:48:15.673",
|
||||
"lastModified": "2025-03-07T17:15:16.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24642",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T19:15:11.197",
|
||||
"lastModified": "2024-11-21T07:48:15.823",
|
||||
"lastModified": "2025-03-07T17:15:17.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24763",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-06T20:15:09.797",
|
||||
"lastModified": "2024-11-21T07:48:23.160",
|
||||
"lastModified": "2025-03-07T17:15:17.230",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25360",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-02T15:15:10.530",
|
||||
"lastModified": "2024-11-21T07:49:26.480",
|
||||
"lastModified": "2025-03-07T17:15:17.390",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25361",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-02T16:15:14.480",
|
||||
"lastModified": "2024-11-21T07:49:26.613",
|
||||
"lastModified": "2025-03-07T17:15:17.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25403",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T23:15:12.140",
|
||||
"lastModified": "2024-11-21T07:49:28.890",
|
||||
"lastModified": "2025-03-07T17:15:17.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
56
CVE-2023/CVE-2023-358xx/CVE-2023-35894.json
Normal file
56
CVE-2023/CVE-2023-358xx/CVE-2023-35894.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-35894",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-07T17:15:17.897",
|
||||
"lastModified": "2025-03-07T17:15:17.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Control Center 6.2.1 through 6.3.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-644"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7185101",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2023/CVE-2023-430xx/CVE-2023-43052.json
Normal file
86
CVE-2023/CVE-2023-430xx/CVE-2023-43052.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2023-43052",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-07T17:15:18.060",
|
||||
"lastModified": "2025-03-07T17:15:18.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Control Center 6.2.1 through 6.3.1 is vulnerable to an external service interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-435"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-435"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7185102",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-129xx/CVE-2024-12975.json
Normal file
86
CVE-2024/CVE-2024-129xx/CVE-2024-12975.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-12975",
|
||||
"sourceIdentifier": "product-security@silabs.com",
|
||||
"published": "2025-03-07T17:15:18.263",
|
||||
"lastModified": "2025-03-07T17:15:18.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overread can occur in the CPC application when operating in full duplex SPI upon receiving an invalid packet over the SPI interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.silabs.com/069Vm00000LWXMeIAP",
|
||||
"source": "product-security@silabs.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SiliconLabs/simplicity_sdk/releases",
|
||||
"source": "product-security@silabs.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-130xx/CVE-2024-13086.json
Normal file
56
CVE-2024/CVE-2024-130xx/CVE-2024-13086.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-13086",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:18.430",
|
||||
"lastModified": "2025-03-07T17:15:18.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An exposure of sensitive information vulnerability has been reported to affect product. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQTS 5.2.0.2851 build 20240808 and later\nQuTS hero h5.2.0.2851 build 20240808 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-25-03",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-12T03:15:32.770",
|
||||
"lastModified": "2024-11-21T09:01:18.840",
|
||||
"lastModified": "2025-03-07T18:15:39.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -89,6 +89,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://web.git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/mtd/ubi/vtbl.c?h=v6.6.24&id=d1b505c988b7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.spinics.net/lists/kernel/msg5074816.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26767",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:52.747",
|
||||
"lastModified": "2025-02-27T14:34:43.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:40.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/070fda699dfdce560755379bc428d9edada7a54e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/71783d1ff65204d69207fd156d4b2eb1d3882375",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26982",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-01T06:15:15.610",
|
||||
"lastModified": "2024-11-21T09:03:32.917",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-07T18:15:40.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,139 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: Squashfs: comprobar que el n\u00famero de inodo no sea el valor no v\u00e1lido de cero. Syskiller ha producido un acceso fuera de los l\u00edmites en fill_meta_index(). Ese acceso fuera de los l\u00edmites se debe en \u00faltima instancia a que el inodo tiene un n\u00famero de inodo con un valor no v\u00e1lido de cero, que no se verific\u00f3. La raz\u00f3n por la que esto causa el acceso fuera de los l\u00edmites se debe a la siguiente secuencia de eventos: 1. Se llama a Fill_meta_index() para asignar (a trav\u00e9s de vac\u00edo_meta_index()) y completar un \u00edndice de metadatos. Sin embargo, sufre un error de lectura de datos y se cancela, invalidando el \u00edndice de metadatos vac\u00edo reci\u00e9n devuelto. Para ello, establece el n\u00famero de inodo del \u00edndice en cero, lo que significa que no se utiliza (cero no es un n\u00famero de inodo v\u00e1lido). 2. Cuando posteriormente se vuelve a llamar a fill_meta_index() en otra operaci\u00f3n de lectura, localizar_meta_index() devuelve el \u00edndice anterior porque coincide con el n\u00famero de inodo de 0. Debido a que este \u00edndice ha sido devuelto, se espera que se haya completado, y porque no lo ha hecho. Si no lo ha sido, se realiza un acceso fuera de los l\u00edmites. Este parche agrega una verificaci\u00f3n de cordura que verifica que el n\u00famero de inodo no sea cero cuando se crea el inodo y devuelve -EINVAL si lo es. [phillip@squashfs.org.uk: correcci\u00f3n de espacios en blanco] Enlace: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.6.30",
|
||||
"matchCriteriaId": "196E040A-AF21-452C-8854-D6205D31F0BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.8.8",
|
||||
"matchCriteriaId": "673B3328-389D-41A4-9617-669298635262"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29079",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-11-13T21:15:16.027",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -93,12 +113,43 @@
|
||||
"value": "CWE-691"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.6.0.3001",
|
||||
"matchCriteriaId": "26FF4705-B44E-422C-8357-D07294E6C6E7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html",
|
||||
"source": "secure@intel.com"
|
||||
"source": "secure@intel.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32485",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2024-11-13T21:15:18.520",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -93,12 +113,43 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.6.0.2003",
|
||||
"matchCriteriaId": "E1BDD171-A498-4D34-B99F-4934FEA5AA97"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01154.html",
|
||||
"source": "secure@intel.com"
|
||||
"source": "secure@intel.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36983",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.257",
|
||||
"lastModified": "2024-11-21T09:22:58.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,93 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.0.10",
|
||||
"matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.5",
|
||||
"matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.2",
|
||||
"matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2308",
|
||||
"versionEndExcluding": "9.1.2308.207",
|
||||
"matchCriteriaId": "D220E842-2B15-416F-960B-397166883F9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312",
|
||||
"versionEndExcluding": "9.1.2312.109",
|
||||
"matchCriteriaId": "F2E66C0D-BD3A-46CE-9578-068401F094C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36984",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.480",
|
||||
"lastModified": "2024-11-21T09:22:58.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,79 @@
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.0.10",
|
||||
"matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.5",
|
||||
"matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.2",
|
||||
"matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36985",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:06.703",
|
||||
"lastModified": "2024-11-21T09:22:58.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,79 @@
|
||||
"value": "CWE-687"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.0.10",
|
||||
"matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.5",
|
||||
"matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.2",
|
||||
"matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/8598f9de-bba8-42a4-8ef0-12e1adda4131",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36997",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-07-01T17:15:09.143",
|
||||
"lastModified": "2024-11-21T09:23:00.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,86 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.0.0",
|
||||
"versionEndExcluding": "9.0.10",
|
||||
"matchCriteriaId": "09264EE5-FA8A-49C5-AB1F-AEAC16CDC591"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.5",
|
||||
"matchCriteriaId": "565039EE-74F6-451C-AFB3-F6C9F7AA0EEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.2",
|
||||
"matchCriteriaId": "B1342052-4733-49BB-95F0-A89B07A3F2E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312",
|
||||
"versionEndExcluding": "9.1.2312.100",
|
||||
"matchCriteriaId": "6F3B2826-B4B5-4A28-9E8E-0159803CC851"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/ed1209ef-228d-4dab-9856-be9369925a5c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Tool Signature"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-386xx/CVE-2024-38638.json
Normal file
78
CVE-2024/CVE-2024-386xx/CVE-2024-38638.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-38638",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:18.707",
|
||||
"lastModified": "2025-03-07T17:15:18.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nQTS 5.2.x/QuTS hero h5.2.x are not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.9.2954 build 20241120 and later\nQuTS hero h5.1.9.2954 build 20241120 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-52",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38705",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-20T08:15:11.243",
|
||||
"lastModified": "2024-11-21T09:26:40.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.5",
|
||||
"matchCriteriaId": "6558D0EC-322F-4AAF-9A08-53BAD1C93A91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40973",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:18.890",
|
||||
"lastModified": "2024-11-21T09:31:58.917",
|
||||
"lastModified": "2025-03-07T18:15:40.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,6 +91,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eeb62bb4ca22db17f7dfe8fb8472e0442df3d92f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f066882293b5ad359e44c4ed24ab1811ffb0b354",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43133",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-12T23:15:17.560",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-shortcodes/wordpress-themify-shortcodes-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themify:themify_shortcodes:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.2",
|
||||
"matchCriteriaId": "7BE7F44D-1CDD-4CFB-A6EE-E4F874AA92DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-shortcodes/wordpress-themify-shortcodes-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44953",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-04T19:15:30.297",
|
||||
"lastModified": "2024-09-06T16:37:33.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:40.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -83,6 +83,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a4921b76bc9421d3838e167f6a17ea3112d8fe62",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f13f1858a28c68b7fc0d72c2008d5c1f80d2e8d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45292",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-07T20:15:05.857",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-r8w8-74ww-j4wh",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.29.2",
|
||||
"matchCriteriaId": "9FB20F02-0DCA-4875-B1AF-E6969820AD9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.1.1",
|
||||
"matchCriteriaId": "79F5B018-FDB7-40DC-9B67-7312ED70808F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "4B62CAAE-2E1E-42A2-9152-2DB7E3DA36A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-r8w8-74ww-j4wh",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45293",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-07T20:15:06.100",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,58 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.29.1",
|
||||
"matchCriteriaId": "520A70B7-2C60-4064-B452-538ED7A8D30E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.1.1",
|
||||
"matchCriteriaId": "79F5B018-FDB7-40DC-9B67-7312ED70808F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "4B62CAAE-2E1E-42A2-9152-2DB7E3DA36A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-6hwr-6v2f-3m88",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47630",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-05T14:15:04.183",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.8",
|
||||
"matchCriteriaId": "64E72A24-D81C-4456-8BC1-031C68B61E27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/elementinvader-addons-for-elementor/wordpress-elementinvader-addons-for-elementor-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47754",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.377",
|
||||
"lastModified": "2024-10-22T16:10:21.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:41.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d48890ef8765001caff732ac6ec80a3b2e470215",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47873",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-18T17:15:11.973",
|
||||
"lastModified": "2024-11-19T21:57:56.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,74 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.29.4",
|
||||
"matchCriteriaId": "9D7D4C48-5455-494C-962A-B8386CA53A62"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.1.3",
|
||||
"matchCriteriaId": "18AFC177-DDB6-4C8C-96C7-F299CFA6C96D"
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.3.2",
|
||||
"matchCriteriaId": "A7B91E75-3DDC-4395-B48C-A77147597F21"
|
||||
},
|
||||
{
|
||||
"url": "https://www.w3.org/TR/xml/#sec-guessing-no-ext-info",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3.0",
|
||||
"versionEndExcluding": "3.4.0",
|
||||
"matchCriteriaId": "14F9EC71-3B04-4765-8437-4BEFBDEA8673"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.w3.org/TR/xml/#sec-guessing-no-ext-info",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-488xx/CVE-2024-48864.json
Normal file
78
CVE-2024/CVE-2024-488xx/CVE-2024-48864.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-48864",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:18.850",
|
||||
"lastModified": "2025-03-07T17:15:18.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A files or directories accessible to external parties vulnerability has been reported to affect File Station 5. If exploited, the vulnerability could allow remote attackers to read/write files or directories.\n\nWe have already fixed the vulnerability in the following versions:\nFile Station 5 5.5.6.4741 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-55",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48917",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-18T20:15:05.403",
|
||||
"lastModified": "2024-11-19T21:57:56.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,18 +71,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.29.4",
|
||||
"matchCriteriaId": "9D7D4C48-5455-494C-962A-B8386CA53A62"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-7cc9-j4mv-vcjp",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.1.3",
|
||||
"matchCriteriaId": "18AFC177-DDB6-4C8C-96C7-F299CFA6C96D"
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.2.0",
|
||||
"versionEndExcluding": "2.3.2",
|
||||
"matchCriteriaId": "A7B91E75-3DDC-4395-B48C-A77147597F21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3.0",
|
||||
"versionEndExcluding": "3.4.0",
|
||||
"matchCriteriaId": "14F9EC71-3B04-4765-8437-4BEFBDEA8673"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-7cc9-j4mv-vcjp",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50066",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-23T06:15:10.467",
|
||||
"lastModified": "2024-11-25T15:15:07.570",
|
||||
"lastModified": "2025-03-07T17:15:18.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -147,6 +147,14 @@
|
||||
{
|
||||
"url": "https://project-zero.issues.chromium.org/issues/371047675",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-50066-kernel-detection-vulnerability",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-50066-kernel-mitigation-vulnerability",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-503xx/CVE-2024-50390.json
Normal file
82
CVE-2024/CVE-2024-503xx/CVE-2024-50390.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-50390",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:19.180",
|
||||
"lastModified": "2025-03-07T17:15:19.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-25-01",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-503xx/CVE-2024-50394.json
Normal file
78
CVE-2024/CVE-2024-503xx/CVE-2024-50394.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-50394",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:19.327",
|
||||
"lastModified": "2025-03-07T17:15:19.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper certificate validation vulnerability has been reported to affect Helpdesk. If exploited, the vulnerability could allow remote attackers to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nHelpdesk 3.3.3 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-25-05",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
114
CVE-2024/CVE-2024-504xx/CVE-2024-50405.json
Normal file
114
CVE-2024/CVE-2024-504xx/CVE-2024-50405.json
Normal file
@ -0,0 +1,114 @@
|
||||
{
|
||||
"id": "CVE-2024-50405",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:19.470",
|
||||
"lastModified": "2025-03-07T18:15:41.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-93"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53053",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T18:15:25.443",
|
||||
"lastModified": "2024-11-22T17:09:28.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:42.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -96,6 +96,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9aa1f0da237d6b16e36e0a0cc9f746d1d78396ed",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a128cfec44709ab1bd1f01d158569bcb2386f54f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53067",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T18:15:26.490",
|
||||
"lastModified": "2024-11-25T21:00:06.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:43.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,6 +114,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6e34b9d7caa5a4c831b74bdfed5ef86fa0c03316",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53166",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:23.703",
|
||||
"lastModified": "2025-02-10T18:15:26.717",
|
||||
"lastModified": "2025-03-07T18:15:43.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -129,6 +129,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ada4ca5fd5a9d5212f28164d49a4885951c979c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dcaa738afde55085ac6056252e319479cf23cde2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
114
CVE-2024/CVE-2024-536xx/CVE-2024-53692.json
Normal file
114
CVE-2024/CVE-2024-536xx/CVE-2024-53692.json
Normal file
@ -0,0 +1,114 @@
|
||||
{
|
||||
"id": "CVE-2024-53692",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:19.703",
|
||||
"lastModified": "2025-03-07T17:15:19.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
118
CVE-2024/CVE-2024-536xx/CVE-2024-53693.json
Normal file
118
CVE-2024/CVE-2024-536xx/CVE-2024-53693.json
Normal file
@ -0,0 +1,118 @@
|
||||
{
|
||||
"id": "CVE-2024-53693",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:19.910",
|
||||
"lastModified": "2025-03-07T17:15:19.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to modify application data.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-93"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-536xx/CVE-2024-53694.json
Normal file
78
CVE-2024/CVE-2024-536xx/CVE-2024-53694.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-53694",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.103",
|
||||
"lastModified": "2025-03-07T17:15:20.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A time-of-check time-of-use (TOCTOU) race condition vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local attackers who have gained user access to gain access to otherwise unauthorized resources.\n\nWe have already fixed the vulnerability in the following versions:\nQVPN Device Client for Mac 2.2.5 and later\nQsync for Mac 5.1.3 and later\nQfinder Pro Mac 7.11.1 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-51",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-536xx/CVE-2024-53695.json
Normal file
82
CVE-2024/CVE-2024-536xx/CVE-2024-53695.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-53695",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.250",
|
||||
"lastModified": "2025-03-07T17:15:20.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been reported to affect HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nHBS 3 Hybrid Backup Sync 25.1.4.952 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-25-06",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-536xx/CVE-2024-53696.json
Normal file
78
CVE-2024/CVE-2024-536xx/CVE-2024-53696.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-53696",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.390",
|
||||
"lastModified": "2025-03-07T17:15:20.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A server-side request forgery (SSRF) vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers who have gained administrator access to read application data.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.7.0.829 ( 2024/10/01 ) and later\nQuLog Center 1.8.0.888 ( 2024/10/15 ) and later\nQTS 4.5.4.2957 build 20241119 and later\nQuTS hero h4.5.4.2956 build 20241119 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-53",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-536xx/CVE-2024-53697.json
Normal file
78
CVE-2024/CVE-2024-536xx/CVE-2024-53697.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-53697",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.527",
|
||||
"lastModified": "2025-03-07T17:15:20.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-536xx/CVE-2024-53698.json
Normal file
78
CVE-2024/CVE-2024-536xx/CVE-2024-53698.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-53698",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.667",
|
||||
"lastModified": "2025-03-07T17:15:20.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A double free vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-536xx/CVE-2024-53699.json
Normal file
78
CVE-2024/CVE-2024-536xx/CVE-2024-53699.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-53699",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.813",
|
||||
"lastModified": "2025-03-07T17:15:20.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.3.3006 build 20250108 and later\nQuTS hero h5.2.3.3006 build 20250108 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-24-54",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-537xx/CVE-2024-53700.json
Normal file
82
CVE-2024/CVE-2024-537xx/CVE-2024-53700.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-53700",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2025-03-07T17:15:20.957",
|
||||
"lastModified": "2025-03-07T17:15:20.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@qnapsecurity.com.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.qnap.com/en/security-advisory/qsa-25-07",
|
||||
"source": "security@qnapsecurity.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56621",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T15:15:21.637",
|
||||
"lastModified": "2025-01-08T16:44:53.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:45.237",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/57479e37d3f69efee2f0678568274db773284bc8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-57972",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T21:15:14.687",
|
||||
"lastModified": "2025-03-06T23:15:11.993",
|
||||
"lastModified": "2025-03-07T18:15:45.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The pairing API request handler in Microsoft HoloLens 1 (Windows Holographic) through 10.0.17763.3046 and HoloLens 2 (Windows Holographic) through 10.0.22621.1244 allows remote attackers to cause a Denial of Service (resource consumption and device unusability) by sending many requests through the Device Portal framework."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El controlador de solicitudes de API de emparejamiento en Microsoft HoloLens 1 (Windows Holographic) hasta 10.0.17763.3046 y HoloLens 2 (Windows Holographic) hasta 10.0.22621.1244 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de recursos e inutilizaci\u00f3n del dispositivo) mediante el env\u00edo de muchas solicitudes a trav\u00e9s del framework del Portal del dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/tania-silva/Hololens",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tania-silva/Hololens",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57977",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T02:15:10.890",
|
||||
"lastModified": "2025-02-27T13:15:11.053",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T18:15:45.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a09d56e1682c951046bf15542b3e9553046c9f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46576834291869457d4772bb7df72d7c2bb3d57f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-58002",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T03:15:11.180",
|
||||
"lastModified": "2025-03-06T12:42:22.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:46.417",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ac18d781466252cd35a3e311e0a4b264260fd927",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-58005",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T03:15:11.480",
|
||||
"lastModified": "2025-03-06T12:42:22.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T18:15:46.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -106,6 +106,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/77779d1258a287f2c5c2c6aeae203e0996209c77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a3a860bc0fd6c07332e4911cf9a238d20de90173",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-58079",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-03-06T17:15:21.360",
|
||||
"lastModified": "2025-03-06T17:15:21.360",
|
||||
"lastModified": "2025-03-07T18:15:47.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix crash during unbind if gpio unit is in use\n\nWe used the wrong device for the device managed functions. We used the\nusb device, when we should be using the interface device.\n\nIf we unbind the driver from the usb interface, the cleanup functions\nare never called. In our case, the IRQ is never disabled.\n\nIf an IRQ is triggered, it will try to access memory sections that are\nalready free, causing an OOPS.\n\nWe cannot use the function devm_request_threaded_irq here. The devm_*\nclean functions may be called after the main structure is released by\nuvc_delete.\n\nLuckily this bug has small impact, as it is only affected by devices\nwith gpio units and the user has to unbind the device, a disconnect will\nnot trigger this error."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Se corrige el fallo durante la desvinculaci\u00f3n si la unidad gpio est\u00e1 en uso. Usamos el dispositivo incorrecto para las funciones administradas por el dispositivo. Usamos el dispositivo usb, cuando deber\u00edamos estar usando el dispositivo de interfaz. Si desvinculamos el controlador de la interfaz usb, las funciones de limpieza nunca se llaman. En nuestro caso, la IRQ nunca se deshabilita. Si se activa una IRQ, intentar\u00e1 acceder a secciones de memoria que ya est\u00e1n libres, lo que provocar\u00e1 un OOPS. No podemos usar la funci\u00f3n devm_request_threaded_irq aqu\u00ed. Las funciones de limpieza devm_* pueden llamarse despu\u00e9s de que uvc_delete libere la estructura principal. Afortunadamente, este error tiene un impacto peque\u00f1o, ya que solo se ve afectado por dispositivos con unidades gpio y el usuario tiene que desvincular el dispositivo, una desconexi\u00f3n no activar\u00e1 este error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -17,6 +21,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/0b5e0445bc8384c18bd35cb9fe87f6258c6271d9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3c00e94d00ca079bef7906d6f39d1091bccfedd3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5d2e65cbe53d0141ed095cf31c2dcf3d8668c11d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6316",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T08:15:12.270",
|
||||
"lastModified": "2024-11-21T09:49:25.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zealousweb:generate_pdf_using_contact_form_7:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.1.3",
|
||||
"matchCriteriaId": "68FAD9A6-E232-47A2-BC0E-86D76804B801"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L72",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52cce49b-49b3-49b0-9f18-4829f07a420f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6317",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-09T08:15:12.470",
|
||||
"lastModified": "2024-11-21T09:49:25.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-07T16:48:11.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zealousweb:generate_pdf_using_contact_form_7:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.1.3",
|
||||
"matchCriteriaId": "68FAD9A6-E232-47A2-BC0E-86D76804B801"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/generate-pdf-using-contact-form-7/tags/4.0.6/inc/templates/cf7-pdf-generation.admin.html.php#L74",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/455b9695-e140-4bdb-b626-5c1695518563?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-01xx/CVE-2025-0162.json
Normal file
56
CVE-2025/CVE-2025-01xx/CVE-2025-0162.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0162",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-07T17:15:21.110",
|
||||
"lastModified": "2025-03-07T17:15:21.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7185096",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1121",
|
||||
"sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f",
|
||||
"published": "2025-03-07T00:15:34.360",
|
||||
"lastModified": "2025-03-07T02:15:37.977",
|
||||
"lastModified": "2025-03-07T18:15:47.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -14,7 +14,7 @@
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/b/336153054",
|
||||
"url": "https://issuetracker.google.com/issues/336153054",
|
||||
"source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f"
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21333",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-01-14T18:15:58.530",
|
||||
"lastModified": "2025-01-15T20:57:37.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-07T17:15:21.473",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -133,6 +133,14 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-detection-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21333-elevated-privilege-exposure-in-windows-hyper-v-by-microsoft-mitigation-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21702",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-18T15:15:18.530",
|
||||
"lastModified": "2025-02-18T15:15:18.530",
|
||||
"lastModified": "2025-03-07T18:15:47.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/020ecb76812a0526f4130ab5aeb6dc7c773e7ab9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/647cef20e649c576dff271e018d5d15d998b629d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21712",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-27T02:15:14.863",
|
||||
"lastModified": "2025-02-27T13:15:12.043",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T18:15:47.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/032fa54f486eac5507976e7e31f079a767bc13a8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/237e19519c8ff6949f0ef57c4a0243f5b2b0fa18",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-21838",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-03-07T09:15:16.810",
|
||||
"lastModified": "2025-03-07T09:15:16.810",
|
||||
"lastModified": "2025-03-07T18:15:47.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: core: flush gadget workqueue after device removal\n\ndevice_del() can lead to new work being scheduled in gadget->work\nworkqueue. This is observed, for example, with the dwc3 driver with the\nfollowing call stack:\n device_del()\n gadget_unbind_driver()\n usb_gadget_disconnect_locked()\n dwc3_gadget_pullup()\n\t dwc3_gadget_soft_disconnect()\n\t usb_gadget_set_state()\n\t schedule_work(&gadget->work)\n\nMove flush_work() after device_del() to ensure the workqueue is cleaned\nup."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: core: vaciar la cola de trabajo de gadget despu\u00e9s de la eliminaci\u00f3n del dispositivo device_del() puede provocar que se programe un nuevo trabajo en la cola de trabajo gadget->work. Esto se observa, por ejemplo, con el controlador dwc3 con la siguiente pila de llamadas: device_del() gadget_unbind_driver() usb_gadget_disconnect_locked() dwc3_gadget_pullup() dwc3_gadget_soft_disconnect() usb_gadget_set_state() schedule_work(&gadget->work) Mueva flush_work() despu\u00e9s de device_del() para garantizar que se limpie la cola de trabajo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -25,6 +29,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/97695b5a1b5467a4f91194db12160f56da445dfe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e3bc1a9a67ce33a2e761e6e7b7c2afc6cb9b7266",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f894448f3904d7ad66fecef8f01fe0172629e091",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T15:15:17.443",
|
||||
"lastModified": "2025-03-06T15:15:17.443",
|
||||
"lastModified": "2025-03-07T17:15:21.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the deactivation of the activated second factor to the /session endpoint"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante remoto escale privilegios a trav\u00e9s de la desactivaci\u00f3n del segundo factor activado al endpoint /session"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T15:15:17.553",
|
||||
"lastModified": "2025-03-06T15:15:17.553",
|
||||
"lastModified": "2025-03-07T17:15:21.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a physically proximate attacker to escalate privileges via the \"2fa_authorized\" Local Storage key"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante f\u00edsicamente pr\u00f3ximo escale privilegios a trav\u00e9s de la clave de almacenamiento local \"2fa_authorized\""
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T15:15:17.667",
|
||||
"lastModified": "2025-03-06T15:15:17.667",
|
||||
"lastModified": "2025-03-07T17:15:21.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the \"/user\" endpoint"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 y anteriores permite que un atacante remoto escale privilegios a trav\u00e9s del endpoint \"/user\""
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://piuswalter.de/blog/2fa-bypass-and-deactivation-attack-in-mytaag/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25617",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-07T16:15:38.543",
|
||||
"lastModified": "2025-03-07T16:15:38.543",
|
||||
"lastModified": "2025-03-07T18:15:47.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Incorrect Access Control in Unifiedtransform 2.X leads to Privilege Escalation allowing teachers to create syllabus."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/armaansidana2003/CVE-2025-25617",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/changeweb/Unifiedtransform",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/armaansidana2003/CVE-2025-25617",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.650",
|
||||
"lastModified": "2025-03-03T19:15:35.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T17:15:22.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "OpenID Connect Core a trav\u00e9s del conjunto de erratas 1.0 2 permite la inyecci\u00f3n de audiencia en determinadas situaciones. Cuando se utiliza el mecanismo de autenticaci\u00f3n private_key_jwt, un servidor de autorizaci\u00f3n malintencionado podr\u00eda enga\u00f1ar a un cliente para que escriba valores controlados por el atacante en la audiencia, incluidos endpoints de token o identificadores de emisor de otros servidores de autorizaci\u00f3n. El servidor de autorizaci\u00f3n malintencionado podr\u00eda entonces utilizar estos JWT de clave privada para hacerse pasar por el cliente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -48,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OWASP/ASVS/issues/2678",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openid.net/notice-of-a-security-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.850",
|
||||
"lastModified": "2025-03-03T19:15:35.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-07T17:15:22.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ciertas especificaciones relacionadas con OAuth 2.0 de IETF, cuando se utiliza el mecanismo de autenticaci\u00f3n de cliente JSON Web Token Profile for OAuth 2.0, existen ambig\u00fcedades en los valores de audiencia de los JWT enviados a los servidores de autorizaci\u00f3n. Las RFC afectadas pueden incluir RFC 7523, y tambi\u00e9n RFC 7521, RFC 7522, RFC 9101 (JAR) y RFC 9126 (PAR)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -48,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OWASP/ASVS/issues/2678",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openid.net/notice-of-a-security-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27508",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-05T22:15:35.867",
|
||||
"lastModified": "2025-03-05T22:15:35.867",
|
||||
"lastModified": "2025-03-07T18:15:48.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Emissary es un motor de flujo de trabajo basado en datos P2P. La clase ChecksumCalculator permite la generaci\u00f3n de sumas de comprobaci\u00f3n y hash, pero incluye o utiliza de forma predeterminada algoritmos que ya no se recomiendan para casos de uso criptogr\u00e1fico seguro (por ejemplo, SHA-1, CRC32 y SSDEEP). Estos algoritmos, si bien pueden ser v\u00e1lidos para ciertas tareas no cr\u00edticas para la seguridad, pueden exponer a los usuarios a riesgos de seguridad si se utilizan en escenarios en los que se requieren garant\u00edas criptogr\u00e1ficas s\u00f3lidas. Este problema se solucion\u00f3 en 8.24.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NationalSecurityAgency/emissary/security/advisories/GHSA-hw43-fcmm-3m5g",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27597",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:39.893",
|
||||
"lastModified": "2025-03-07T16:15:39.893",
|
||||
"lastModified": "2025-03-07T18:15:48.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,7 +60,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
{
|
||||
"url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intlify/vue-i18n/security/advisories/GHSA-p2ph-7g93-hw3m",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27603",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T16:15:40.037",
|
||||
"lastModified": "2025-03-07T16:15:40.037",
|
||||
"lastModified": "2025-03-07T18:15:48.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-6qvp-39mm-95v8",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-276xx/CVE-2025-27604.json
Normal file
60
CVE-2025/CVE-2025-276xx/CVE-2025-27604.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27604",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T17:15:22.290",
|
||||
"lastModified": "2025-03-07T17:15:22.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. The homepage of the application is public which enables a guest to download the package which might contain sensitive information. This vulnerability is fixed in 1.11.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/commit/6ced42b1f341fd0ce6734fc58c7d694da5f365fb",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwikisas/application-confluence-migrator-pro/security/advisories/GHSA-3w9f-2pph-j5vc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-276xx/CVE-2025-27607.json
Normal file
68
CVE-2025/CVE-2025-276xx/CVE-2025-27607.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-27607",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-07T17:15:22.433",
|
||||
"lastModified": "2025-03-07T18:15:48.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nhairs/python-json-logger/commit/2548e3a2e3cedf6bef3ee7c60c55b7c02d1af11a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nhairs/python-json-logger/commit/e7761e56edb980cfab0165e32469d5fd017a5d72",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nhairs/python-json-logger/security/advisories/GHSA-wmxh-pxcx-9w24",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
90
README.md
90
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-07T17:00:20.214746+00:00
|
||||
2025-03-07T19:00:20.325723+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-07T16:15:40.287000+00:00
|
||||
2025-03-07T18:15:48.483000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284484
|
||||
284505
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
- [CVE-2025-2088](CVE-2025/CVE-2025-20xx/CVE-2025-2088.json) (`2025-03-07T15:15:14.833`)
|
||||
- [CVE-2025-2089](CVE-2025/CVE-2025-20xx/CVE-2025-2089.json) (`2025-03-07T15:15:15.033`)
|
||||
- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-03-07T15:15:15.220`)
|
||||
- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T16:15:38.543`)
|
||||
- [CVE-2025-27152](CVE-2025/CVE-2025-271xx/CVE-2025-27152.json) (`2025-03-07T16:15:38.773`)
|
||||
- [CVE-2025-27518](CVE-2025/CVE-2025-275xx/CVE-2025-27518.json) (`2025-03-07T16:15:39.187`)
|
||||
- [CVE-2025-27519](CVE-2025/CVE-2025-275xx/CVE-2025-27519.json) (`2025-03-07T16:15:39.623`)
|
||||
- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T16:15:39.893`)
|
||||
- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T16:15:40.037`)
|
||||
- [CVE-2023-35894](CVE-2023/CVE-2023-358xx/CVE-2023-35894.json) (`2025-03-07T17:15:17.897`)
|
||||
- [CVE-2023-43052](CVE-2023/CVE-2023-430xx/CVE-2023-43052.json) (`2025-03-07T17:15:18.060`)
|
||||
- [CVE-2024-12975](CVE-2024/CVE-2024-129xx/CVE-2024-12975.json) (`2025-03-07T17:15:18.263`)
|
||||
- [CVE-2024-13086](CVE-2024/CVE-2024-130xx/CVE-2024-13086.json) (`2025-03-07T17:15:18.430`)
|
||||
- [CVE-2024-38638](CVE-2024/CVE-2024-386xx/CVE-2024-38638.json) (`2025-03-07T17:15:18.707`)
|
||||
- [CVE-2024-48864](CVE-2024/CVE-2024-488xx/CVE-2024-48864.json) (`2025-03-07T17:15:18.850`)
|
||||
- [CVE-2024-50390](CVE-2024/CVE-2024-503xx/CVE-2024-50390.json) (`2025-03-07T17:15:19.180`)
|
||||
- [CVE-2024-50394](CVE-2024/CVE-2024-503xx/CVE-2024-50394.json) (`2025-03-07T17:15:19.327`)
|
||||
- [CVE-2024-50405](CVE-2024/CVE-2024-504xx/CVE-2024-50405.json) (`2025-03-07T17:15:19.470`)
|
||||
- [CVE-2024-53692](CVE-2024/CVE-2024-536xx/CVE-2024-53692.json) (`2025-03-07T17:15:19.703`)
|
||||
- [CVE-2024-53693](CVE-2024/CVE-2024-536xx/CVE-2024-53693.json) (`2025-03-07T17:15:19.910`)
|
||||
- [CVE-2024-53694](CVE-2024/CVE-2024-536xx/CVE-2024-53694.json) (`2025-03-07T17:15:20.103`)
|
||||
- [CVE-2024-53695](CVE-2024/CVE-2024-536xx/CVE-2024-53695.json) (`2025-03-07T17:15:20.250`)
|
||||
- [CVE-2024-53696](CVE-2024/CVE-2024-536xx/CVE-2024-53696.json) (`2025-03-07T17:15:20.390`)
|
||||
- [CVE-2024-53697](CVE-2024/CVE-2024-536xx/CVE-2024-53697.json) (`2025-03-07T17:15:20.527`)
|
||||
- [CVE-2024-53698](CVE-2024/CVE-2024-536xx/CVE-2024-53698.json) (`2025-03-07T17:15:20.667`)
|
||||
- [CVE-2024-53699](CVE-2024/CVE-2024-536xx/CVE-2024-53699.json) (`2025-03-07T17:15:20.813`)
|
||||
- [CVE-2024-53700](CVE-2024/CVE-2024-537xx/CVE-2024-53700.json) (`2025-03-07T17:15:20.957`)
|
||||
- [CVE-2025-0162](CVE-2025/CVE-2025-01xx/CVE-2025-0162.json) (`2025-03-07T17:15:21.110`)
|
||||
- [CVE-2025-27604](CVE-2025/CVE-2025-276xx/CVE-2025-27604.json) (`2025-03-07T17:15:22.290`)
|
||||
- [CVE-2025-27607](CVE-2025/CVE-2025-276xx/CVE-2025-27607.json) (`2025-03-07T17:15:22.433`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `49`
|
||||
Recently modified CVEs: `66`
|
||||
|
||||
- [CVE-2023-26213](CVE-2023/CVE-2023-262xx/CVE-2023-26213.json) (`2025-03-07T16:15:37.243`)
|
||||
- [CVE-2023-3359](CVE-2023/CVE-2023-33xx/CVE-2023-3359.json) (`2025-03-07T16:15:37.470`)
|
||||
- [CVE-2023-33979](CVE-2023/CVE-2023-339xx/CVE-2023-33979.json) (`2025-03-07T15:30:57.390`)
|
||||
- [CVE-2024-10266](CVE-2024/CVE-2024-102xx/CVE-2024-10266.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-12837](CVE-2024/CVE-2024-128xx/CVE-2024-12837.json) (`2025-03-07T16:15:37.893`)
|
||||
- [CVE-2024-33489](CVE-2024/CVE-2024-334xx/CVE-2024-33489.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33490](CVE-2024/CVE-2024-334xx/CVE-2024-33490.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33491](CVE-2024/CVE-2024-334xx/CVE-2024-33491.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33492](CVE-2024/CVE-2024-334xx/CVE-2024-33492.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-33493](CVE-2024/CVE-2024-334xx/CVE-2024-33493.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34771](CVE-2024/CVE-2024-347xx/CVE-2024-34771.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34772](CVE-2024/CVE-2024-347xx/CVE-2024-34772.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-34773](CVE-2024/CVE-2024-347xx/CVE-2024-34773.json) (`2025-03-07T14:55:12.087`)
|
||||
- [CVE-2024-37158](CVE-2024/CVE-2024-371xx/CVE-2024-37158.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-37159](CVE-2024/CVE-2024-371xx/CVE-2024-37159.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-39696](CVE-2024/CVE-2024-396xx/CVE-2024-39696.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-07T15:15:13.750`)
|
||||
- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-57982](CVE-2024/CVE-2024-579xx/CVE-2024-57982.json) (`2025-03-07T15:07:16.373`)
|
||||
- [CVE-2024-57983](CVE-2024/CVE-2024-579xx/CVE-2024-57983.json) (`2025-03-07T15:07:16.373`)
|
||||
- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2025-03-07T14:55:48.130`)
|
||||
- [CVE-2024-9458](CVE-2024/CVE-2024-94xx/CVE-2024-9458.json) (`2025-03-07T15:15:14.370`)
|
||||
- [CVE-2025-26331](CVE-2025/CVE-2025-263xx/CVE-2025-26331.json) (`2025-03-07T16:15:38.650`)
|
||||
- [CVE-2025-27795](CVE-2025/CVE-2025-277xx/CVE-2025-27795.json) (`2025-03-07T16:15:40.187`)
|
||||
- [CVE-2025-27796](CVE-2025/CVE-2025-277xx/CVE-2025-27796.json) (`2025-03-07T16:15:40.287`)
|
||||
- [CVE-2024-53053](CVE-2024/CVE-2024-530xx/CVE-2024-53053.json) (`2025-03-07T18:15:42.883`)
|
||||
- [CVE-2024-53067](CVE-2024/CVE-2024-530xx/CVE-2024-53067.json) (`2025-03-07T18:15:43.577`)
|
||||
- [CVE-2024-53166](CVE-2024/CVE-2024-531xx/CVE-2024-53166.json) (`2025-03-07T18:15:43.973`)
|
||||
- [CVE-2024-56621](CVE-2024/CVE-2024-566xx/CVE-2024-56621.json) (`2025-03-07T18:15:45.237`)
|
||||
- [CVE-2024-57972](CVE-2024/CVE-2024-579xx/CVE-2024-57972.json) (`2025-03-07T18:15:45.673`)
|
||||
- [CVE-2024-57977](CVE-2024/CVE-2024-579xx/CVE-2024-57977.json) (`2025-03-07T18:15:45.997`)
|
||||
- [CVE-2024-58002](CVE-2024/CVE-2024-580xx/CVE-2024-58002.json) (`2025-03-07T18:15:46.417`)
|
||||
- [CVE-2024-58005](CVE-2024/CVE-2024-580xx/CVE-2024-58005.json) (`2025-03-07T18:15:46.880`)
|
||||
- [CVE-2024-58079](CVE-2024/CVE-2024-580xx/CVE-2024-58079.json) (`2025-03-07T18:15:47.040`)
|
||||
- [CVE-2024-6316](CVE-2024/CVE-2024-63xx/CVE-2024-6316.json) (`2025-03-07T16:48:11.150`)
|
||||
- [CVE-2024-6317](CVE-2024/CVE-2024-63xx/CVE-2024-6317.json) (`2025-03-07T16:48:11.150`)
|
||||
- [CVE-2025-1121](CVE-2025/CVE-2025-11xx/CVE-2025-1121.json) (`2025-03-07T18:15:47.253`)
|
||||
- [CVE-2025-21333](CVE-2025/CVE-2025-213xx/CVE-2025-21333.json) (`2025-03-07T17:15:21.473`)
|
||||
- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-03-07T18:15:47.370`)
|
||||
- [CVE-2025-21712](CVE-2025/CVE-2025-217xx/CVE-2025-21712.json) (`2025-03-07T18:15:47.507`)
|
||||
- [CVE-2025-21838](CVE-2025/CVE-2025-218xx/CVE-2025-21838.json) (`2025-03-07T18:15:47.713`)
|
||||
- [CVE-2025-25450](CVE-2025/CVE-2025-254xx/CVE-2025-25450.json) (`2025-03-07T17:15:21.640`)
|
||||
- [CVE-2025-25451](CVE-2025/CVE-2025-254xx/CVE-2025-25451.json) (`2025-03-07T17:15:21.803`)
|
||||
- [CVE-2025-25452](CVE-2025/CVE-2025-254xx/CVE-2025-25452.json) (`2025-03-07T17:15:21.947`)
|
||||
- [CVE-2025-25617](CVE-2025/CVE-2025-256xx/CVE-2025-25617.json) (`2025-03-07T18:15:47.840`)
|
||||
- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-03-07T17:15:22.083`)
|
||||
- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-03-07T17:15:22.190`)
|
||||
- [CVE-2025-27508](CVE-2025/CVE-2025-275xx/CVE-2025-27508.json) (`2025-03-07T18:15:48.033`)
|
||||
- [CVE-2025-27597](CVE-2025/CVE-2025-275xx/CVE-2025-27597.json) (`2025-03-07T18:15:48.163`)
|
||||
- [CVE-2025-27603](CVE-2025/CVE-2025-276xx/CVE-2025-27603.json) (`2025-03-07T18:15:48.293`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
263
_state.csv
263
_state.csv
@ -149687,7 +149687,7 @@ CVE-2020-14716,0,0,70d66e7d8e80fb4d43f94bf54c1dc7b730315a1924c7d9ae759bc161cfff9
|
||||
CVE-2020-14717,0,0,1b1936ab258b5ca2f69f41c8a28f5de330c564737f80d45b1d2ba8c5299ad536,2024-11-21T05:03:58.007000
|
||||
CVE-2020-14718,0,0,47b3847c8e0ad7e1cf65e84d8ff206d05b95ba08016fc9fc25c80fe989838ad3,2024-11-21T05:03:58.150000
|
||||
CVE-2020-14719,0,0,2519153b65f7a2eaa8802944bcab1a17ff477cbea89f414b1ba913633e831e3e,2024-11-21T05:03:58.290000
|
||||
CVE-2020-1472,0,1,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000
|
||||
CVE-2020-1472,0,0,b72a9ecfcd03c267f7bce3a13be6accb11bc64e8013b0518e167e76f3f444c9d,2025-03-07T14:57:32.833000
|
||||
CVE-2020-14720,0,0,a6a4dd928dc73ee3a2223498ff7ec3a434a9d87196fb0bba33306609b9652f67,2024-11-21T05:03:58.443000
|
||||
CVE-2020-14721,0,0,677e040400c6b37d2d28fe5fe9e0570e19e78317804c8f50ac90977a0fba7930,2024-11-21T05:03:58.587000
|
||||
CVE-2020-14722,0,0,bfc5f9939bc9c5fbdfa5f30f7afbd4ba716c6cfa243c24942ad536f2e510aab2,2024-11-21T05:03:58.743000
|
||||
@ -151898,7 +151898,7 @@ CVE-2020-17457,0,0,304666ebed82001d08af7fb6abc759208104ca1d7c7e0e0b188d0cfb6c453
|
||||
CVE-2020-17458,0,0,25cd994ed4882520597cb423f48aadd4e5bb2fac882054daf1ab25aeb596c24b,2024-11-21T05:08:09.513000
|
||||
CVE-2020-1746,0,0,5ade46611c222a1c9d0844bd94b21ff8c5e86579026017bbfd7a5cd2ec833167,2024-11-21T05:11:17.757000
|
||||
CVE-2020-17462,0,0,dec14e35b954be98e4f456b3da60cf7ea2601d7108dbc0df7cf9c9630fd61564,2024-11-21T05:08:09.663000
|
||||
CVE-2020-17463,0,1,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000
|
||||
CVE-2020-17463,0,0,4391018d22f98751d40a26c9571d42677a09b80cf8e97a898de71d13d64b25e3,2025-03-07T14:57:32.833000
|
||||
CVE-2020-17464,0,0,e860379cc0b2b1fe9b1929183acf4fefa76c4c56161d2bb20eef1936bf91b085,2023-11-07T03:19:11.557000
|
||||
CVE-2020-17465,0,0,6fa34c2a07df8f06e1ed6962dc93c0567cc563e0eaa10999b4977a3c63529215,2024-11-21T05:08:09.990000
|
||||
CVE-2020-17466,0,0,d223484e1c0a2bec6302370e40313a4d5cb6ebf8c1a04b6cfa404cbad72f30df,2024-11-21T05:08:10.137000
|
||||
@ -161321,8 +161321,8 @@ CVE-2020-5842,0,0,dcb0f27f4317979c203b2c51bfab7cda27207ed5b71ee1c718a48e678a9f1e
|
||||
CVE-2020-5843,0,0,8378e8ca1d755c52b556a28b9a03d7cb9bb7f46e105c7df46b82ac95ec1f9c73,2024-11-21T05:34:41.133000
|
||||
CVE-2020-5844,0,0,b894bec74321616318be63acacbc6a64ba72f10a231dbf6aa0116c83f7aecd7d,2024-11-21T05:34:41.263000
|
||||
CVE-2020-5846,0,0,d2f3ffda68de3ecb9a5597e60cdc311709fce66834c02bfdd0ee4735d05b664e,2024-11-21T05:34:41.400000
|
||||
CVE-2020-5847,0,1,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5849,0,1,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5847,0,0,34ccdb6d72b8ca8fcd32452fac41ff2b78e0ca6c58e23e044f457ea306457914,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5849,0,0,2c52de0cd50d3a058884f98676c2182f5a17e4d18933a8b3a9d94ea961e53052,2025-03-07T14:57:32.833000
|
||||
CVE-2020-5851,0,0,0e6b8a980d42461bdeef132eb484123c19dc7a4e5f253f6abcd12b6bfeb3765c,2024-11-21T05:34:41.807000
|
||||
CVE-2020-5852,0,0,a0d14d33aa5d76474940760e02808323b0255fdfa7ef7263fbf5fb39b4b3f9c4,2024-11-21T05:34:41.950000
|
||||
CVE-2020-5853,0,0,ec5939c37c53e690929c801d26a949d22ea000c2d5657b7eea502e2f09c386d8,2024-11-21T05:34:42.357000
|
||||
@ -163716,15 +163716,15 @@ CVE-2020-8637,0,0,2217c7386170afe6b12de345c9c160276185b7c89e0dcda019627a55f9fb85
|
||||
CVE-2020-8638,0,0,32c95e1823a3ea2f35b4d4087afa45e38f0aa3a6d2ec116bb344b25d3aabb7c5,2024-11-21T05:39:10.230000
|
||||
CVE-2020-8639,0,0,8f89ab272a0ef46c31d75a3858f8022a4d9111848565bd65e9343b97ffd6fd3f,2024-11-21T05:39:10.353000
|
||||
CVE-2020-8641,0,0,0d1c513fef1a173802745a61846ead8e61fdbfe5801ff740fb1aca89505c7ddb,2024-11-21T05:39:10.483000
|
||||
CVE-2020-8644,0,1,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8644,0,0,6699f4a4d3287b46c781e1bf807fac477aa3031f06514bd6ac7715a440adba31,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8645,0,0,2a03db6fa2b770ea0a59249c2f2585abe34df165b555d7ac782ed537d96c9f97,2024-11-21T05:39:10.747000
|
||||
CVE-2020-8647,0,0,f068f0e57339478200309cb959bd7fd17a53a6b7117775a657951595e793600e,2024-11-21T05:39:10.877000
|
||||
CVE-2020-8648,0,0,8fdc221d2ebb6dc8fb93bf4742dc8dfa23ef56dd805cde8998884f9ff56ef701,2024-11-21T05:39:11.030000
|
||||
CVE-2020-8649,0,0,37c65f7d0c74c220929895992a0c92fb2e2d2fac5e634773795c784a74ea10b0,2024-11-21T05:39:11.190000
|
||||
CVE-2020-8654,0,0,a3a76c24f693047768fb5b923623c39d10ba6a5e4698aa407fa5faf6a5f662ed,2024-11-21T05:39:11.347000
|
||||
CVE-2020-8655,0,1,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8655,0,0,f1c95c88753d3d16552cd7daa09296dcd47add39441a3500157aa1b54da141db,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8656,0,0,4786fc01a1c7dfdec763b31be079dfcb520c2439d320352e6b9d715294d319ca,2024-11-21T05:39:12.467000
|
||||
CVE-2020-8657,0,1,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8657,0,0,21cc6e2fca78849f9eb37a67557dbd519ddbcaa70b66849c92a73399d1ee678f,2025-03-07T14:57:32.833000
|
||||
CVE-2020-8658,0,0,4573f49c55d9f3879273cc4a97630ce9e9cf8aae9a1c623e533e4c3238f46259,2024-11-21T05:39:12.757000
|
||||
CVE-2020-8659,0,0,0058e06c3c4af6d2c2f20fc9f830318b2a5c5c55545999cea86f50e52d91077f,2024-11-21T05:39:12.880000
|
||||
CVE-2020-8660,0,0,c8eb75df1246ad70e7d88e25da868f2489d66b14a433ad144d2fcc75766974f8,2024-11-21T05:39:13.013000
|
||||
@ -166303,7 +166303,7 @@ CVE-2021-1643,0,0,4060b809fead12bb9d67f78be5df56a37d87ee4646fa6e6df86052c1df4b14
|
||||
CVE-2021-1644,0,0,efef402905230983da5bdfdf12143b0e50435ebe4d4fb21c1fe5c122d402ef18,2024-11-21T05:44:47.930000
|
||||
CVE-2021-1645,0,0,25258a77695180ba77c99bd2c6823d73e5a5f58b3767fb51d6c767a59a2b7412,2024-11-21T05:44:48.047000
|
||||
CVE-2021-1646,0,0,dd5db096be9e6e8c998f36cbbb20089c7e8840cca55aeece215ab90e471c3d0d,2024-11-21T05:44:48.180000
|
||||
CVE-2021-1647,0,1,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000
|
||||
CVE-2021-1647,0,0,87d09d2cb40689d4f471fd16109ded43e06a72f38412364390db010339190dc6,2025-03-07T14:57:32.833000
|
||||
CVE-2021-1648,0,0,442992d9469b43ae43cc0ca7fd4e0fc4dea65be20b3af1ea5c7d4bd9dcb9c3fd,2024-11-21T05:44:48.457000
|
||||
CVE-2021-1649,0,0,b02803d777e0231640dee4f5831d7188c99fb48f5d6a9a75e7a6945731355893,2024-11-21T05:44:48.590000
|
||||
CVE-2021-1650,0,0,bf70b4a3c0b73b36f07cd9c7e86a8dc7f79730c1ed3fc35784abee243ce739fe,2024-11-21T05:44:48.727000
|
||||
@ -172381,9 +172381,9 @@ CVE-2021-26843,0,0,e22c85b76cfecdfffe08cb6d2ad5cbb9f4c9a7db43ad8249c84af125becc2
|
||||
CVE-2021-26844,0,0,02cc15f895219c53d39be6e1f4c6a51757746b0bf8fffc23217ee117f819801d,2024-11-21T05:56:53.557000
|
||||
CVE-2021-26845,0,0,d16f5d1bf8b70b13ab07460aba2ea681026589dea89b8756fa7229f826d22ecf,2024-11-21T05:56:53.713000
|
||||
CVE-2021-26854,0,0,c4bcbb9b671013b7c4c294d860d3419f36080d16f644917d5e58ee1c30b46045,2024-11-21T05:56:53.857000
|
||||
CVE-2021-26855,0,1,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26857,0,1,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26858,0,1,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26855,0,0,82eef1ea1dcf7b87167d6339ae95c4211ea22a903a4f24d1a0c402d60ef4484d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26857,0,0,f1ef4184851d849e45fb3d9244e9e9c89a24574190789defe06436232b960133,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26858,0,0,3c1680445727f793521d31ba2cdd0ddcc98d4eef3a6b6d6f1c25fb9ade0374d8,2025-03-07T14:57:32.833000
|
||||
CVE-2021-26859,0,0,5355f8a65fd9a2daa85a7f9efe95e508d18de450153222105a4194499f856cab,2024-11-21T05:56:54.420000
|
||||
CVE-2021-26860,0,0,cb9bc2194420b618bd81851fe6d2a08a1be6a880c0edf922353c2faf291197c9,2024-11-21T05:56:54.547000
|
||||
CVE-2021-26861,0,0,6f3d935057cf053b76c7041731ccc09d592a8c11b4860b84ecf1bdff18fea857,2024-11-21T05:56:54.663000
|
||||
@ -172561,7 +172561,7 @@ CVE-2021-27055,0,0,616bae98d63b41814c216210e09e8dbc281ce177c697d375df0d4e6593d89
|
||||
CVE-2021-27056,0,0,1ae7cb984b6e5ffbd786f70b551ed29c115f46e7cd4faa9f6ce540825c96f616,2024-11-21T05:57:15.847000
|
||||
CVE-2021-27057,0,0,8f2f3d4b30cdba051b36fab8acee9657b759db551f41d2444c75ef8c4fab0c88,2024-11-21T05:57:15.980000
|
||||
CVE-2021-27058,0,0,511db4da3ab9a085092b3cee2e2af3e9fcda564a270ba6a5dbfc106fefb07f7d,2024-11-21T05:57:16.110000
|
||||
CVE-2021-27059,0,0,6d412a55534452efc390bd6857c6db28f716be93f1482cd5a25b37cdc8f3b2ea,2024-11-21T05:57:16.223000
|
||||
CVE-2021-27059,0,1,cd8ba5f6b68e01a976d3dbb06fa94f939fafb032626f7e96cc761e950c7dbb21,2025-03-07T17:12:53.023000
|
||||
CVE-2021-27060,0,0,be6470ec524b2e0b81148df626176f17bffb934ccbf2a3c5e0ad5201f718a021,2024-11-21T05:57:16.370000
|
||||
CVE-2021-27061,0,0,a9bdd3d791d056a27907bdad7344847b96066a4fd806441d6f5b216747a5720b,2024-11-21T05:57:16.500000
|
||||
CVE-2021-27062,0,0,5b4986eb03cf9aaf2ef6354c0c80821b8b5d7fd5b9cd15eb5a5836d99382168a,2024-11-21T05:57:16.620000
|
||||
@ -173152,9 +173152,9 @@ CVE-2021-27859,0,0,993f7636ab44f63e13208197998ae7db16b9d062167251918517bbcbfe7e1
|
||||
CVE-2021-27860,0,0,dfab7aeaff73bc97888f133c03739b011132bd10ea3c893619d85892c04dedfc,2025-02-04T20:15:42.070000
|
||||
CVE-2021-27861,0,0,2e874793f7920b781935eba26fcbb236ca8c4ecce3e14a7ee776186e960e718b,2024-11-21T05:58:39.770000
|
||||
CVE-2021-27862,0,0,fc7e14948885397a858c226d74b5728d90a6f062785c550fae571d5169db34ae,2024-11-21T05:58:39.887000
|
||||
CVE-2021-27876,0,1,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27877,0,1,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27878,0,1,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27876,0,0,5c1d91787499264ea3edb235dcbcb80ea3ffd4aba3d324f30c3c9507cd24c8e9,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27877,0,0,30e6df20bed423f34061c37a0e429b456e97fa5dfe1b0da9d1cf0639270db987,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27878,0,0,f9b363734fa59a9b3feae62a7a73206d19473629e0fb7fae011be73490311081,2025-03-07T14:57:32.833000
|
||||
CVE-2021-27884,0,0,07ef68bb7a49a5e41de55ecdb94a5317031927a7badddc4c1dcd133b77daf30c,2024-11-21T05:58:41.470000
|
||||
CVE-2021-27885,0,0,6846b02647cb7751bb45d0264c610c218765b765257a96f038efde08963f4d38,2024-11-21T05:58:41.690000
|
||||
CVE-2021-27886,0,0,c596fb96a9799b2965bc5d05f26e95b1ee896238a8a7188e7a76c1cda9de11e8,2024-11-21T05:58:41.943000
|
||||
@ -175649,7 +175649,7 @@ CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b
|
||||
CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000
|
||||
CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000
|
||||
CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000
|
||||
CVE-2021-3129,0,1,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-3129,0,0,15d80ec6db70349d178178692cf64fc15957fcf1adbccf70e2c4addc23dcab1d,2025-03-07T14:57:32.833000
|
||||
CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000
|
||||
CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000
|
||||
CVE-2021-31294,0,0,d4eb37e109e629565a20435c105b1449a6efda6d20165a8248479e9ceb3a9e5b,2024-11-21T06:05:24.390000
|
||||
@ -179429,10 +179429,10 @@ CVE-2021-36397,0,0,eebf3717bb6d7a75919581e9690ded27175cc43d0e0ae84aad7e9fc635ccc
|
||||
CVE-2021-36398,0,0,a15925e7e8302adc45445e0e6a65d8200cc01053000945d2c340fe144e385a65,2024-11-21T06:13:40.903000
|
||||
CVE-2021-36399,0,0,c1c77e13ccc41082e659facaf679a4d1b66ebebbe068780edf8992260be97673,2024-11-21T06:13:41.013000
|
||||
CVE-2021-3640,0,0,3a80df1344714725e984ce863309234fe897070436443f5efb4f41085f65a0c9,2024-11-21T06:22:03.073000
|
||||
CVE-2021-36400,0,0,c368f06d082ff5a0504764ceac92042624aef4e93ef5f545066b88a7592506cf,2024-11-21T06:13:41.120000
|
||||
CVE-2021-36401,0,0,45512c8c71be4a29fc9bb288ee850fb706bcf4c084639a721339de185701c62f,2024-11-21T06:13:41.230000
|
||||
CVE-2021-36402,0,0,c3de4796ae57ff742ff715c98a8ec52227364287a170eb20fa6d5355e809a82f,2024-11-21T06:13:41.343000
|
||||
CVE-2021-36403,0,0,d1413d541c083a0a015186ac59d8be70ed7f6008778bdf077f6b026e0bebbe20,2024-11-21T06:13:41.453000
|
||||
CVE-2021-36400,0,1,d9f1a10d143ba21ec79162cc67c1b4b2251dd89f9d228e4ea5342378f97cba20,2025-03-07T18:15:34.827000
|
||||
CVE-2021-36401,0,1,34a05e6559df94d5e55f00592ecd158ff75a267c3e6d8d79e4ff2518af3cde5e,2025-03-07T18:15:35.090000
|
||||
CVE-2021-36402,0,1,956f250b96529b015507a70b0188f411c950b33c3c5aaa245cfd0050f35b9223,2025-03-07T18:15:35.320000
|
||||
CVE-2021-36403,0,1,381e5fe7222d53ff999ecd102e7c25f9589ffc2074befb284ce3fe60e3d4629b,2025-03-07T18:15:35.547000
|
||||
CVE-2021-36408,0,0,3f8a9b1a87671235c6fcb130acfce43f1298c1436dedb5039d784b193a27d74b,2024-11-21T06:13:41.567000
|
||||
CVE-2021-36409,0,0,4a8ed4b1f9fb08e1f7f8ec09708da4871da44ffc1dfd70a5c7eac39ad0d279dd,2024-11-21T06:13:41.720000
|
||||
CVE-2021-3641,0,0,3b76f4fad6c4fccef01a7c5862d69fc2f97305c2fcd42656e424a5133f77fb4d,2024-11-21T06:22:03.300000
|
||||
@ -179564,7 +179564,7 @@ CVE-2021-3671,0,0,2e98707d05a3d5dd6bb82a24011add61bf4093e9d7d7c0ef54e15be3c44712
|
||||
CVE-2021-36710,0,0,30d3f6219f02843c7db6762f93c7bb35bf6a07d0e6a066f808321a415ace3d4c,2024-11-21T06:13:57.340000
|
||||
CVE-2021-36711,0,0,ff91331951413364cc0c150d1e96e169d83ffdc9156d5799838288065cb37de3,2024-11-21T06:13:57.510000
|
||||
CVE-2021-36712,0,0,86f9316723405930d5e8c829281e4fa6d3291043cf5a570cded38ee796a6d85d,2024-11-21T06:13:57.670000
|
||||
CVE-2021-36713,0,1,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000
|
||||
CVE-2021-36713,0,0,48abbf68a85829c6354d416f3bc4a77c6417c6c1dce252fa0139fa613deecadd,2025-03-07T16:15:34.533000
|
||||
CVE-2021-36716,0,0,5662ce55ac5c83778feb49af51a4a7a09a851153e5c2c010efd65d93cb4fdbba,2024-11-21T06:13:57.973000
|
||||
CVE-2021-36717,0,0,ec369d3ecfa389c0148878e8348c016478ec723b90d9011f790f892d64463eba,2024-11-21T06:13:58.143000
|
||||
CVE-2021-36718,0,0,775941130e24c7529766d8f19f5e9007abe25d5d504a9926d5087c9e9f872619,2024-11-21T06:13:58.283000
|
||||
@ -200879,7 +200879,7 @@ CVE-2022-32765,0,0,288c46848ca90bc0970228e4c106898962265fe5ef966fdb621059ec6e48a
|
||||
CVE-2022-32766,0,0,f8af3e288bc19c30281a1d0ccfabd1595b6500716a3aad9106452d2f8828a86f,2024-11-21T07:06:55.190000
|
||||
CVE-2022-32768,0,0,c7d4fb2b17fec1c41f721ec7f12f58d3dd128594cc56036f151ab10b94ff5402,2024-11-21T07:06:55.320000
|
||||
CVE-2022-32769,0,0,2bcd9e4801c613d9c501665e694fc1ccc87f19f08f4bfd7ec0020d43aabddf84,2024-11-21T07:06:55.457000
|
||||
CVE-2022-3277,0,1,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000
|
||||
CVE-2022-3277,0,0,8a9b431d993f9f5c2db0c94e53e0daf84800b986f5713d4bb98791a12dd6ef51,2025-03-07T16:15:35.637000
|
||||
CVE-2022-32770,0,0,2117cde9ddfe9fc4190507bbd939b0b74257bcc2e26270c25a9c72ab9762f3d1,2024-11-21T07:06:55.587000
|
||||
CVE-2022-32771,0,0,71c6f498ac24328dd596adccf278375f0d0157867acd5b6c9e0a42d0130dfd43,2024-11-21T07:06:55.717000
|
||||
CVE-2022-32772,0,0,e3b68231aad472dc58151c5e29625a9adae7c2eb8114c08e61c9139b03dce259,2024-11-21T07:06:55.860000
|
||||
@ -204363,7 +204363,7 @@ CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40
|
||||
CVE-2022-37067,0,0,073a63c94609fb61c3c7478f5894b6cef5a4e645ffd2533f7feff90902f4bfe5,2024-11-21T07:14:23.250000
|
||||
CVE-2022-37068,0,0,bfbc21ac6f627e851e0b40b7ed324b42c9a2dd81234107a167e1ea24c57dec94,2024-11-21T07:14:23.400000
|
||||
CVE-2022-37069,0,0,dc864251b7b1e5b3758cf4caaf549434af36e31ac4247583a5727ca221971dd0,2024-11-21T07:14:23.567000
|
||||
CVE-2022-3707,0,1,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000
|
||||
CVE-2022-3707,0,0,6d636742d21f135d79614d2088d0752d5b2fe8d422c8f35e90798011a904d1b6,2025-03-07T16:15:35.833000
|
||||
CVE-2022-37070,0,0,e2c0503dbb97f457cda6fc0db7f472cd6525c918effd3957023eb8ec3528183a,2024-11-21T07:14:23.730000
|
||||
CVE-2022-37071,0,0,5425191f63dc698190eb62d1acf953318f967db9b131d7887dfce006cb96572c,2024-11-21T07:14:23.867000
|
||||
CVE-2022-37072,0,0,246171d66413946e2e9259efcef4d1da86ac9de1e57e619f1e332302396b624c,2024-11-21T07:14:24.013000
|
||||
@ -205541,7 +205541,7 @@ CVE-2022-38730,0,0,300c336561da45308ac6ec1adeba6d7f701849eeb6e5c41e2af9a5786c375
|
||||
CVE-2022-38731,0,0,e1e8c202028e7c3837e4ad31be40f813300a4270817eeee7747539807e8539e9,2024-11-21T07:16:59.993000
|
||||
CVE-2022-38732,0,0,7a75851ca1470c647bbd7f34211aa0c5b615748353b50a5546371503d9daf959,2024-11-21T07:17:00.147000
|
||||
CVE-2022-38733,0,0,674cc1a631b85cdd4d1cf504dcf5baa7d840252de2c63bc09ccee76a967f8f85,2024-11-21T07:17:00.260000
|
||||
CVE-2022-38734,0,0,e6aed38be0b0cb4ff9fb7505ba8132fcfcf669f8c819b18fabcea75ebff712f7,2024-11-21T07:17:00.363000
|
||||
CVE-2022-38734,0,1,f435132f751c484c01cc26dc002c3598b4c01e6ab4eab1d4fb1d044fe1784b5f,2025-03-07T18:15:35.860000
|
||||
CVE-2022-38735,0,0,5f44613c824fadb1e5fa65ec5e09fcccbbf678b94c575a508ba9dd04e45021ef,2023-11-07T03:50:12.130000
|
||||
CVE-2022-38736,0,0,a0674f204cbdea0303470e0055bdcfc196ea10a061afd218aa904dcd6f0e6765,2023-11-07T03:50:12.430000
|
||||
CVE-2022-38737,0,0,375460f6a56948cefeac86257ff0b9e553009fc7024ed0e14414972ac7bea09f,2023-11-07T03:50:12.837000
|
||||
@ -207254,7 +207254,7 @@ CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6
|
||||
CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000
|
||||
CVE-2022-41080,0,0,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000
|
||||
CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000
|
||||
CVE-2022-41082,0,1,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000
|
||||
CVE-2022-41082,0,0,bacce64e0b280da5f156e142a58830a5455252c0deb1121df1aef02417ddb3f3,2025-03-07T16:15:36.047000
|
||||
CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000
|
||||
CVE-2022-41085,0,0,35c4c18282b9684b5665eb1e13ff5ce57fc93a683cf80152d18b94ba8a2944e0,2024-11-21T07:22:34.880000
|
||||
CVE-2022-41086,0,0,4aa86b9ce801b11663f0efd2ca3a318416479c6adfa1c5be19f6a824db3bafc8,2024-11-21T07:22:35.003000
|
||||
@ -207941,7 +207941,7 @@ CVE-2022-41859,0,0,d7fddb015ce8a0ef2f9a3d1b5b02e117163f8e04fd79fce2bb8d303b5ea5f
|
||||
CVE-2022-4186,0,0,a065f65e44e81acbb6156b41d02f078148d8a8ce8b985b43a5a4cbc8cf2e82b3,2024-11-21T07:34:44.520000
|
||||
CVE-2022-41860,0,0,3902c9c181b31779a24cf74edb67fc91cfafe626663e3b5347822186d946f0ad,2024-11-21T07:23:57.257000
|
||||
CVE-2022-41861,0,0,5444bba71b3cc5fb61cb2dfa5e4122b78a7ec8e4b4721212a077748536b0c745,2024-11-21T07:23:57.380000
|
||||
CVE-2022-41862,0,1,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000
|
||||
CVE-2022-41862,0,0,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000
|
||||
CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000
|
||||
CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000
|
||||
CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000
|
||||
@ -210552,7 +210552,7 @@ CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad
|
||||
CVE-2022-45444,0,0,1736f84af1e8d6be5b87c093b476858cb887a76f64a4541456744ecee16a04db,2024-11-21T07:29:16.193000
|
||||
CVE-2022-45447,0,0,a35b72702d02411ca46ea3d545d14aabce504b1f9568059496312d6204dc9ae6,2024-11-21T07:29:16.310000
|
||||
CVE-2022-45448,0,0,4b408da5623e0a9a8ac025dd7bf23c3be5cb22912a8a89fc4b77c90403c45e46,2024-11-21T07:29:16.430000
|
||||
CVE-2022-45449,0,1,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000
|
||||
CVE-2022-45449,0,0,693193209e7dfd5071a2860afa54c00978a4a7b14fa5e98a9f840fa0647cf00d,2025-03-07T14:55:48.130000
|
||||
CVE-2022-4545,0,0,99841b6aae53e9700cdfd19011146a18beac019ddefac29bac4f0b93aa4a600f,2024-11-21T07:35:27.730000
|
||||
CVE-2022-45450,0,0,10807ece3e9bcf2fc5ccd536611b4109567c86ce879f198b22eb5e71ab4b3d2b,2024-11-21T07:29:16.690000
|
||||
CVE-2022-45451,0,0,babdf1f68675ba1122cfc123381c85b707d524135469ca63a3f91cff227ec4d8,2024-11-21T07:29:16.817000
|
||||
@ -210643,8 +210643,8 @@ CVE-2022-45548,0,0,e95a0b1f599986c19a82840fd26c1ada5e6cfb5cd55dee60741d610dc0fe0
|
||||
CVE-2022-4555,0,0,ab9573e8007e94879618723fe294ad8ddef575de9e9b6c5e7923556dd3555888,2024-11-21T07:35:28.900000
|
||||
CVE-2022-45550,0,0,547c8bb332eedbeb52103741d5d16740a06bf4a7179e1dfd6e4ad53c93d1f4f4,2024-11-21T07:29:26.290000
|
||||
CVE-2022-45551,0,0,c3e2ff173685837cb5f02972064f49df34d340f6660f9412785ff40c333c35aa,2024-11-21T07:29:26.427000
|
||||
CVE-2022-45552,0,0,5f9db4b60942f7e138767da9b31f0635b22b3d2d5c2df124b3ca6dad31aa35e6,2024-11-21T07:29:26.583000
|
||||
CVE-2022-45553,0,0,62ca2e0cddd75af6e914501579b4d3bb43d8b610b60bff71a0ac351cddd4aa47,2024-11-21T07:29:26.757000
|
||||
CVE-2022-45552,0,1,cc0d2e0061f1a0a2ac9801b49129df629937065a2b27678cf05db36eccb47bd2,2025-03-07T18:15:36.307000
|
||||
CVE-2022-45553,0,1,a3b2c354c931598a5629ee8628449e43eb4a82c8d377e393f721e42a93c32f75,2025-03-07T18:15:36.460000
|
||||
CVE-2022-45557,0,0,eb992f12bdba5a9ed395677530ec85c0d605b8f3ec4bba6943db3924eb1dd000,2024-11-21T07:29:26.930000
|
||||
CVE-2022-45558,0,0,d98b93236eba488bbb2e418bc6b17c8d1bd74f35a46583bc1b4f8929e43c77ac,2024-11-21T07:29:27.073000
|
||||
CVE-2022-4556,0,0,9adec6c9326c8a3f5d9680569d2e1dfac8713bbee8aaff4a3d4c1bc0302c5acc,2024-11-21T07:35:29.017000
|
||||
@ -210663,7 +210663,7 @@ CVE-2022-45598,0,0,5d92fe063374988f9bda6d36dd5b69c21957a39318293406ccba1b4baf6f2
|
||||
CVE-2022-45599,0,0,547b46c2dd6086e714707d71beb4523c1585e37c63266acecd715148f33a4b4e,2024-11-21T07:29:28.553000
|
||||
CVE-2022-4560,0,0,0e11ff69f9a0e32903cd534b58a4b6d5f5858d1fa11382434c1bb83d9d09ad5d,2024-11-21T07:35:29.530000
|
||||
CVE-2022-45600,0,0,56553aca3adf5fe59c4a2341a05175dcd597457d7e3b42b643e8d284559f355f,2024-11-21T07:29:28.703000
|
||||
CVE-2022-45608,0,0,fa716a16ec8ba8a29f83e05cffc48c4ac894810d2e61a3ea405e39151929e9f9,2024-11-21T07:29:28.860000
|
||||
CVE-2022-45608,0,1,7166df0ab73bff25f68021172b375d2bd2b01295da078185dfd752ed4c67eda9,2025-03-07T18:15:36.600000
|
||||
CVE-2022-4561,0,0,bf468782691054d6d44934e6fbf08b309101dce74edfd907332b90b8b681d475,2024-11-21T07:35:29.687000
|
||||
CVE-2022-45611,0,0,443385561b6532c714a472c9950b68b27d18afa8516d9013dda794d040a5d678,2024-11-21T07:29:29.017000
|
||||
CVE-2022-45613,0,0,788ed998768a6ce492ffa28a04fefa8906093e7e113f6e1463ea5c78c6884a9e,2024-11-21T07:29:29.183000
|
||||
@ -210933,7 +210933,7 @@ CVE-2022-45979,0,0,29f1a05bed527d76f6abadef19bd038baeaa5012d5be2703a612315616020
|
||||
CVE-2022-4598,0,0,30d850eb20a135185c5b68aafbac5f46e3329159b950dd7a2f19dce2def78ed3,2024-11-21T07:35:34.227000
|
||||
CVE-2022-45980,0,0,ec0da2daa3e3f554d7b901b4be8d96ed7dd60d46533069fd4cb58fe96e6fe17b,2024-11-21T07:30:02.440000
|
||||
CVE-2022-45982,0,0,70aa481ee4b6563497da3040092518bce21db4acbf51ac40e1c83ba492acb4e1,2024-11-21T07:30:02.610000
|
||||
CVE-2022-45988,0,0,b88ccea4b1172af436306eb70dd4615d8ee95861d9fde2a8992a986902f8f661,2024-11-21T07:30:02.777000
|
||||
CVE-2022-45988,0,1,2191f8bbbf8d239ddf30397145fdd13d40e62fec70edb8e22034a0f41c071432,2025-03-07T17:15:14.773000
|
||||
CVE-2022-4599,0,0,b1c692040b7873a7c4127dfde8a6f89c63a5d457054525c409da9357855b74b5,2024-11-21T07:35:34.343000
|
||||
CVE-2022-45990,0,0,49f36bdcf1672f4737437f303412dd6da7b773fc548eb726d92ff24d951e8986,2024-11-21T07:30:02.960000
|
||||
CVE-2022-45995,0,0,0eabc74e7031f4a56253ed61f028d22977542ef2c1ae2e8377d3caed094eb7a1,2024-11-21T07:30:03.107000
|
||||
@ -211657,7 +211657,7 @@ CVE-2022-46966,0,0,070bf64185beec1d346f1eb3fcc535a9f501d6d7759507c69e62ea1dfb763
|
||||
CVE-2022-46967,0,0,7b5e0d7e72e3dba5d588a35fb64ffdf40088372a48d9222c2905273c82086be6,2024-11-21T07:31:21.360000
|
||||
CVE-2022-46968,0,0,c503254a3e5c4d42a758af6f17024297295ac5fa736be3573aab667842fa96ca,2024-11-21T07:31:21.537000
|
||||
CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000
|
||||
CVE-2022-46973,0,0,63a6c9cf4ba1af494250acff2cd788f73165ea19b6cb0864c29ebeb119adb2c2,2024-11-21T07:31:21.717000
|
||||
CVE-2022-46973,0,1,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000
|
||||
CVE-2022-4698,0,0,9e5ab78a249ff3e087fd9d324461bc5aecebd3784012e2baea9fa468c24d13c6,2024-11-21T07:35:45.450000
|
||||
CVE-2022-4699,0,0,348453cf60ca73dac7c7362e5688b4af38b8b30693e6d4cd3906b2f3918ebde4,2024-11-21T07:35:45.567000
|
||||
CVE-2022-46996,0,0,984b54bc9341b35701fe20f31b56222296aa8090a9e5105f4e5975e85a224e16,2024-11-21T07:31:22.417000
|
||||
@ -212131,8 +212131,8 @@ CVE-2022-47660,0,0,b2a26f29f398eb0cca1c2cff097486503776c909512ef7ca9cf227f700eaa
|
||||
CVE-2022-47661,0,0,02ffc1e351796980778efe4ee704ca9cd42e058cf5ac3e54fb890ffa48f85085,2024-11-21T07:32:19.893000
|
||||
CVE-2022-47662,0,0,b770298610741dd4f9df8051a20d93a25058a92f2614f2cbc5f3a50a18663cb7,2024-11-21T07:32:20.077000
|
||||
CVE-2022-47663,0,0,2a94ebb2cbb6c5b6b670b58eb6ff8b6727f0711d086dabe3ab02d2621bc31e81,2024-11-21T07:32:20.247000
|
||||
CVE-2022-47664,0,0,47763453d161beaddf54991f097aa341c1896f419bf56ec1d8254c7936117952,2024-11-21T07:32:20.380000
|
||||
CVE-2022-47665,0,0,26da2ae8f6cbe2cc19fe097ffa7826744e2258276d6bc28dee353baf3a198d28,2024-11-21T07:32:20.507000
|
||||
CVE-2022-47664,0,1,47517e746ba03e9b1c10021eb3b69e3257e75b17e7a30f875d08d410b8db3897,2025-03-07T17:15:16.053000
|
||||
CVE-2022-47665,0,1,21cf94b97ea1f5f409a582e565160c1b87d64cb464ada14046deb282357fb61d,2025-03-07T17:15:16.230000
|
||||
CVE-2022-4767,0,0,fc160306c6ef32e90c268535f0a2efd97e6f08151d7748ce2bbbdfa1010102db,2024-11-21T07:35:54.057000
|
||||
CVE-2022-47673,0,0,20347fd0a92b366106f719a65b040c39066d53f4fc286abd40fbaa008b63075b,2024-11-21T07:32:20.647000
|
||||
CVE-2022-4768,0,0,6957e3cdf4174c08f5a6c86aa2a134dec1508a1480840d7b83763fcbbe37d41d,2024-11-21T07:35:54.170000
|
||||
@ -218008,7 +218008,7 @@ CVE-2023-22419,0,0,c1dd2f72f61814803cdf63bcf8dca22320a762690c8cf4b60f814521f088e
|
||||
CVE-2023-2242,0,0,4a937452ab57b5296438a1ae14dc38bfed91efb6c5653c71648121b31c6163c1,2024-11-21T07:58:13.417000
|
||||
CVE-2023-22421,0,0,c679e58c8416e77061e0c043851f1c9eb505ade7b79525a95ca89620b33fbb40,2024-11-21T07:44:47.053000
|
||||
CVE-2023-22422,0,0,1b35c84e2fb89995518f67e9309c4c9dbec4b7abbbf1d9cf247ec0366eeb4240,2024-11-21T07:44:47.157000
|
||||
CVE-2023-22424,0,1,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000
|
||||
CVE-2023-22424,0,0,af19024b50fe31d03335170237c4c761454fecbcf3430948fe1f24a682eb9eec,2025-03-07T16:15:36.670000
|
||||
CVE-2023-22425,0,0,2d237c6de59422283df9a7c8f88cb08b1ea8054670ffba4dcb711a39f4fb4683,2024-11-21T07:44:47.387000
|
||||
CVE-2023-22427,0,0,f490e42af5d94874676af58f877fe1ac393f7611b6800a738a6ae9c18e557f30,2024-11-21T07:44:47.500000
|
||||
CVE-2023-22428,0,0,b3eeca8a1daaffa1f36da6254dfad723add1cced54ccf9190fb4f8dda34204b0,2024-11-21T07:44:47.613000
|
||||
@ -218610,7 +218610,7 @@ CVE-2023-23304,0,0,a05e299daf0bc4c5856f511bb40c36b26587f6169fbb6209dae939d3d8970
|
||||
CVE-2023-23305,0,0,ff17ec9af4062b97397cee611c9685514d35dba9f51128bc58a054c71e77f188,2025-01-31T14:15:28.603000
|
||||
CVE-2023-23306,0,0,014d2967b491cf39d3d136cce38fda47905e7e3919118ff4237b7c6c0104db7f,2025-01-31T14:15:28.793000
|
||||
CVE-2023-2331,0,0,7350bf9c3fc1604ca4a1b4da0dbc3bce3b57a1f51947ccfab63c30c1d8075b0d,2024-11-21T07:58:24.147000
|
||||
CVE-2023-23313,0,0,f8ec11bb48f2f9fb538d3943f3d45ed11223fcc4635f2314b87dd441f19816d9,2024-11-21T07:45:58.963000
|
||||
CVE-2023-23313,0,1,8690fdd8af8ba0a5642bf3ef23488081a088f7856971972de3ffae0cfe33994d,2025-03-07T17:15:16.473000
|
||||
CVE-2023-23314,0,0,c2a2dfdd71bcbe7884c465cfc2e67185e3890b73a95126224cb787a55733f2fa,2024-11-21T07:45:59.203000
|
||||
CVE-2023-23315,0,0,7f211b20f8879185076392acff7b806e30e631935376086702fbcab39b12a939,2024-11-21T07:45:59.340000
|
||||
CVE-2023-2332,0,0,da44be4c9a914607350af7cdf1b1da16efda7b342df7dcfe63c493c785f8f06b,2024-11-19T15:55:24.137000
|
||||
@ -219362,7 +219362,7 @@ CVE-2023-24107,0,0,cfa2007347f58b9314bbc4117ca2ab04e67a97970e1eb9bc1050cd7d7908e
|
||||
CVE-2023-24108,0,0,aef70f73d56b6d18ff55fb4dfbd92c1419c67b181b553728caa0c072ada07315,2024-11-21T07:47:24.560000
|
||||
CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000
|
||||
CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000
|
||||
CVE-2023-24117,0,0,032d66a7cc5099bebe845729f389df8a7f1e892c2ac33c3eda852ab9ed2d136f,2024-11-21T07:47:24.847000
|
||||
CVE-2023-24117,0,1,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000
|
||||
CVE-2023-24118,0,0,3c79b883389ae8318792486fcf8cfbd157c6b3b80e4d307cc578ded3347be31f,2024-11-21T07:47:24.993000
|
||||
CVE-2023-24119,0,0,1903b9ff7063822f9f1eee7d8f6bda33bdffcec3b850172360906c6ff45cb020,2024-11-21T07:47:25.137000
|
||||
CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000
|
||||
@ -219779,8 +219779,8 @@ CVE-2023-24625,0,0,031358c3cce9ece3e30c39fd1b6a6435b4b4b6ec9c94eaf2c55f80be98ffa
|
||||
CVE-2023-24626,0,0,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000
|
||||
CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000
|
||||
CVE-2023-2464,0,0,b8ae76a72e47db531a3bbe43222f04869a83359178fae5aa13a60312ce5c538a,2024-11-21T07:58:40.250000
|
||||
CVE-2023-24641,0,0,7076d9df7f61967daef18368ab239a82191782b3edcfa4f944c828be11b4f242,2024-11-21T07:48:15.673000
|
||||
CVE-2023-24642,0,0,e7646885975b6776627fb197fcee14f28b5f0be499b1cb6744dc3b4b1ef5ecd2,2024-11-21T07:48:15.823000
|
||||
CVE-2023-24641,0,1,593e0d6b0fb3847f0e2d539cf4646c1bc52db6ecf2778e086f76a1911174da8b,2025-03-07T17:15:16.910000
|
||||
CVE-2023-24642,0,1,7f4951fb2ed1b9f086299b9229af617455bfd453d0bbe59f7a808f5724059350,2025-03-07T17:15:17.070000
|
||||
CVE-2023-24643,0,0,ea144aa9aa076b631d7006d077f801e06c8b084342b5db38a6fb8036447f94e3,2024-11-21T07:48:15.970000
|
||||
CVE-2023-24646,0,0,d1a442ce7864479512c8fe6ab09faa0757c0ff18bf1c24a2e1724cfe374e86a3,2024-11-21T07:48:16.110000
|
||||
CVE-2023-24647,0,0,97ec42b52dfa4f5d755188fee73924996a4b78591b876b6d5191063d70015aab,2024-11-21T07:48:16.253000
|
||||
@ -219837,12 +219837,12 @@ CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f010
|
||||
CVE-2023-24754,0,0,42885f8db3ea1d2ab38e7fd061eee4daf1de514fe3c8843b43f6d2b02ce3d3d6,2024-11-21T07:48:22.170000
|
||||
CVE-2023-24755,0,0,c88f7e592135bce8a4a5ea2bfd86138da220b85446e7ae5773d7d7fa6bfa0910,2024-11-21T07:48:22.310000
|
||||
CVE-2023-24756,0,0,dc204becde6645b45c0da365ffdacca71444ef90cbef402419c82247d10a38d3,2024-11-21T07:48:22.457000
|
||||
CVE-2023-24757,0,1,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000
|
||||
CVE-2023-24757,0,0,a757f05c087d4dce9fb9934b1c13fe1b3dac3419c91c9e75c2e7e14e3ec03dad,2025-03-07T16:15:36.850000
|
||||
CVE-2023-24758,0,0,441e45920579ec0bfea433f0388c75e94eda4c0aa96df2e80a289332a4894341,2024-11-21T07:48:22.733000
|
||||
CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a48,2024-11-21T07:58:41.490000
|
||||
CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000
|
||||
CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2bba,2025-03-03T20:15:38.170000
|
||||
CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4bc2,2024-11-21T07:48:23.160000
|
||||
CVE-2023-24763,0,1,2a90297b759d351a75bd275d5b38707d137212e854f8f294548b00c5f9c99d39,2025-03-07T17:15:17.230000
|
||||
CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000
|
||||
CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000
|
||||
CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000
|
||||
@ -220337,10 +220337,10 @@ CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94
|
||||
CVE-2023-25350,0,0,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000
|
||||
CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000
|
||||
CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000
|
||||
CVE-2023-25358,0,1,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000
|
||||
CVE-2023-25358,0,0,f7c8e79656a372417c7f5af119c5e10297d21152215c2e878bf6a62dad879182,2025-03-07T16:15:37.037000
|
||||
CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000
|
||||
CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000
|
||||
CVE-2023-25361,0,0,d8143811fa2fbed2aa47a7bb1803e2898e8970fe423990f5709306cbdb47446e,2024-11-21T07:49:26.613000
|
||||
CVE-2023-25360,0,1,4d515a7c353ec1bc9fa249341372f58f8ec3f3949eed604d29fbc6748ac508db,2025-03-07T17:15:17.390000
|
||||
CVE-2023-25361,0,1,c3270213ad0f7bbc788a8c7a0c4853eae1c14f60cd4010621b5c00ec9f2507b4,2025-03-07T17:15:17.560000
|
||||
CVE-2023-25362,0,0,54a7584d73fe770bb4b6a778bf39100b69fcd447dfd780e09c48eeda355d0dce,2024-11-21T07:49:26.760000
|
||||
CVE-2023-25363,0,0,a13e12e2d521248bb56a1f4c931835a614aa9c58a3850209d3d076c4362a4633,2024-11-21T07:49:26.910000
|
||||
CVE-2023-25364,0,0,18e074f726c1a7bbb7f4b7c4f618e112147b7df67e3764dd5918c3fb79f094a5,2024-11-21T07:49:27.050000
|
||||
@ -220359,7 +220359,7 @@ CVE-2023-25396,0,0,e475663fc0a46c87716c9e0defab7475b5b2abaf3dfd6dea25345a034a1f2
|
||||
CVE-2023-25399,0,0,4f7886e32efae7286432d7e25de8fe81da245b0b7fde26600280b3335bd9f4fa,2024-11-21T07:49:28.527000
|
||||
CVE-2023-2540,0,0,8e21455c2a3f0d656f8d6f76a29bf92197f7443bdfdeb3a5c1418acc0a6c6510,2023-11-07T04:12:51.453000
|
||||
CVE-2023-25402,0,0,4a3622604011bd1fc4584e1bdf0495944586b74d2dac6dbcfd2edebbf48306e6,2025-03-06T21:15:13.417000
|
||||
CVE-2023-25403,0,0,12ca1f55d3be83dfe89447eeb843d9d0ebbea4a10e7ea2445c02dae22da0d50d,2024-11-21T07:49:28.890000
|
||||
CVE-2023-25403,0,1,5a388dc86f3be061dcb1dc09ef3ff8f874be816d5154a435d460bc1b20feb965,2025-03-07T17:15:17.727000
|
||||
CVE-2023-25407,0,0,201c5c62d509a0d107a8478376efc425bc84a87e5e99be3c005354869311dab5,2025-02-11T17:15:17.473000
|
||||
CVE-2023-25409,0,0,160062236c36118eef430dff4025d868a0e4be574d30de0b9757af7a5069e22f,2025-02-11T17:15:17.643000
|
||||
CVE-2023-2541,0,0,9bb2c3027f762943e143c16e20cbc24b58cf60f2090ec0abc272f5af4f4f2851,2024-11-21T07:58:47.883000
|
||||
@ -221082,7 +221082,7 @@ CVE-2023-26209,0,0,a892a2695c5017ffca11881763f9e45ffa97f8d9fd3ef81673d2b4d81967e
|
||||
CVE-2023-2621,0,0,46a71fd277c5850785baccb07629db57c3e33b88c0c891670a7f4746f333c8ea,2024-11-21T07:58:56.940000
|
||||
CVE-2023-26210,0,0,cff846cd67a5a35fa3e637daa5ff5bdd937c3bb148638f94b660d6d39a4c1002,2024-11-21T07:50:55.397000
|
||||
CVE-2023-26211,0,0,2897b6dc315159754280f41b845c9d643bdf880c647aea6dd22c04e3e9c54f3d,2024-08-22T14:33:54.453000
|
||||
CVE-2023-26213,0,1,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000
|
||||
CVE-2023-26213,0,0,c9e06122b93a7003990c18bcc2bffa462c18084d91a8395a4cf71433226d12f4,2025-03-07T16:15:37.243000
|
||||
CVE-2023-26214,0,0,65bfc30b19349471612a339a2f0a2c8ac02b628541170d4c50c44d616817d2de,2024-11-21T07:50:55.787000
|
||||
CVE-2023-26215,0,0,b8697a02e250b0432f0b1a043ae407fa62492d5d2eca25b8293d65277b87ef7e,2025-01-16T19:15:27.577000
|
||||
CVE-2023-26216,0,0,18a515fe7d4d6259263cc789f0a9f06ab2026ea7a7b498b9489d4dc46b7b8ef0,2024-11-21T07:50:56.063000
|
||||
@ -226961,7 +226961,7 @@ CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726
|
||||
CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000
|
||||
CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000
|
||||
CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000
|
||||
CVE-2023-3359,0,1,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000
|
||||
CVE-2023-3359,0,0,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000
|
||||
CVE-2023-33591,0,0,ff986afc0316a9e18af2b67e930a74090c24895de581e443e4716ade8f2865dd,2024-12-06T18:15:21.610000
|
||||
CVE-2023-33592,0,0,8922d2c6a40eff40aef481311ec4cf8aae1ed6d293035442c831315c238899fb,2024-11-21T08:05:45.073000
|
||||
CVE-2023-33595,0,0,1bfc607aeb14ad4037561ccdc7e1d651e1c4e212d60ea37d1fe5cb863b850c2c,2024-11-21T08:05:45.207000
|
||||
@ -227252,7 +227252,7 @@ CVE-2023-33974,0,0,531e41d5b879646dc4c7aa0d04a15823a13b7b33472a4070b6d3df6d25837
|
||||
CVE-2023-33975,0,0,2fa415f380f19ec93055bc47f99763c1a62ccb69b74cc7e124876cbb580a8af1,2024-11-21T08:06:19.843000
|
||||
CVE-2023-33976,0,0,89ad541a1971f4e6c687199980a0c351ef4f09e89d264cf9da92848cc8d79bd3,2024-11-21T08:06:19.983000
|
||||
CVE-2023-33977,0,0,7f9ae9cf63258eb45b3160b45e0b54f8cf115775476935085e3f3f6ae5de4077,2024-11-21T08:06:20.147000
|
||||
CVE-2023-33979,0,1,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000
|
||||
CVE-2023-33979,0,0,4f9ff6c91b88978410813b657588df7419f62c4f3a17085703aa04de41c45c70,2025-03-07T15:30:57.390000
|
||||
CVE-2023-3398,0,0,ac532334ebc2ea5d377a047eed3a69a21b57b1a2389b634cb5b7a8c9c83c1db6,2024-11-21T08:17:11.240000
|
||||
CVE-2023-33980,0,0,b711df1691783ee08c058e35e642804a3b9c96d290c14ba311f8a31f13881963,2025-01-16T16:15:30.280000
|
||||
CVE-2023-33981,0,0,1b80f20492609165165bcb0710c37d0eb63e70c48a11fc8a6a92dff7de8524f9,2025-01-16T16:15:30.487000
|
||||
@ -228550,6 +228550,7 @@ CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3b
|
||||
CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000
|
||||
CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000
|
||||
CVE-2023-35893,0,0,3e1a9f843ae6516de41665b3a634658c0fb6fc2675d275c8b872f9f02eb5402c,2024-11-21T08:08:56.353000
|
||||
CVE-2023-35894,1,1,a0066b5bc2c9df5623b63e3528082cca1fb9bede82debca48e7b807364324a8f,2025-03-07T17:15:17.897000
|
||||
CVE-2023-35895,0,0,83ce1443b6655dab60e0c4caf8c50745fccee066f0b72d30b018dbb22010bc59,2024-11-21T08:08:56.503000
|
||||
CVE-2023-35896,0,0,083027e8b7b9991862f226b808efa00e9c54a1aded5738c59c832ee7a839eaa3,2024-11-21T08:08:56.640000
|
||||
CVE-2023-35897,0,0,4441d4b616892b6bf61b7f55516939aaa11e282b69fa205360a8598d1c288ddf,2024-11-21T08:08:56.773000
|
||||
@ -234301,6 +234302,7 @@ CVE-2023-43043,0,0,4ec93aa82436dc86b4ccb1b3684f50d48aedc5bdc1d93f254412bd4b2a651
|
||||
CVE-2023-43044,0,0,c700e000c93a60d18aeeabd55f0025926f6f0c9fba18f1ec754ac13e08b3d371,2024-11-21T08:23:38.910000
|
||||
CVE-2023-43045,0,0,692f22dbc4dc19c089253751109b93bb0e5cefd8359cd7675e66e51e06c8d3dd,2024-11-21T08:23:39.040000
|
||||
CVE-2023-43051,0,0,ed0b2315886b0d02ae69e50125a4e57219197c24e1340da2f4eb30f9896d5010,2024-12-17T18:08:08.027000
|
||||
CVE-2023-43052,1,1,a0caf5bb58a6bd916fd9e96049098647f2de2177d4d3aeca18bc0d905d802889,2025-03-07T17:15:18.060000
|
||||
CVE-2023-43054,0,0,160b9682e5bec73380f263a77e3ebbeba23b48fbec834d03025c28d701ba1820,2024-12-23T17:29:02.930000
|
||||
CVE-2023-43057,0,0,01fddeae7f9538027c931e3e992d44ad1edd38b1d8fac1c202a9cab42dc2359d,2024-11-21T08:23:39.433000
|
||||
CVE-2023-43058,0,0,a2df93f61b20e82bd3917a094411dc8a8f78a1f838adb628292a86116ce01de3,2024-11-21T08:23:39.570000
|
||||
@ -244483,7 +244485,7 @@ CVE-2024-10261,0,0,6398f8d67bdd17ab366f9416d4ddf7ff0254d493e1fa2fab241a87e725ac9
|
||||
CVE-2024-10262,0,0,add19e2fcba0a76b4f55d50a9b33f08613e1e5f1357baaf037df077d6af3f079,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10263,0,0,abb589a024b0b89accc3172395633ef61ac017b2b3496ca69d055e1d2f622685,2024-11-08T15:59:41.633000
|
||||
CVE-2024-10265,0,0,a1409991e3c1a34c8be494233016f11fca3e0685babfe23ddc7087c470ce46d1,2024-11-14T15:17:47.947000
|
||||
CVE-2024-10266,0,1,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000
|
||||
CVE-2024-10266,0,0,0d8d5650cf56757af0044cbd05b3950684d6693fa4cff79b3d800db872812365,2025-03-07T14:55:48.130000
|
||||
CVE-2024-10268,0,0,d0402bfb3091ce685faa51f2c4c40b45ff8d34a58666307c0eb05cdde79cb95c,2025-01-17T14:57:54.120000
|
||||
CVE-2024-10269,0,0,bb2a3cab40a3b831fa7114c2862087ff1fd138065989f0b23db24140c8ebf733,2024-11-13T17:59:27.717000
|
||||
CVE-2024-1027,0,0,88d0ec1849f0d05d69fb41d518f3d3eea7fd3db3a17e6bfa013ac44746536bf0,2024-11-21T08:49:37.867000
|
||||
@ -246854,7 +246856,7 @@ CVE-2024-12833,0,0,677c1333060f073d8c9581aaa17178e60be70e85d81a38adf3dadf4f16429
|
||||
CVE-2024-12834,0,0,9d855bd25c1d291aaca2a1196845782e4c8b81bd75f8902c21c35235a7b76d46,2024-12-30T17:15:07.857000
|
||||
CVE-2024-12835,0,0,61e801a58a12e0766f14e15450c7bdf98b6608319b2a731da450210aba4cb9b0,2024-12-30T17:15:08
|
||||
CVE-2024-12836,0,0,843a56b09da0c28e0918e32d624f4627092618eb4aaba75a32ed38667ea7390e,2024-12-30T17:15:08.137000
|
||||
CVE-2024-12837,0,1,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000
|
||||
CVE-2024-12837,0,0,77c7ac4ac020f3cb84caf812c46656df939946b3dd6a86f6cd042bd9d74d5757,2025-03-07T16:15:37.893000
|
||||
CVE-2024-12838,0,0,fc3344bbd1594d72170abe3c3de711c6b7f403390fed0595079fc59c585ebbdd,2024-12-31T02:15:05.877000
|
||||
CVE-2024-12839,0,0,4b3b3f59193ccbe4e75ecac88630587384ac9969398e35c448d95021f675007c,2024-12-31T02:15:06.110000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
@ -246971,6 +246973,7 @@ CVE-2024-12968,0,0,352f3215ed40719a7a3c8fe635fe1584f3733d062304c5ff3d490633f3693
|
||||
CVE-2024-12969,0,0,96938b98061df41a07f7d7458298190ea191c6a72f4ab846d1adca80ab0a48d2,2024-12-27T17:15:07.993000
|
||||
CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000
|
||||
CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000
|
||||
CVE-2024-12975,1,1,c4a1b95614dddf14b5cbc9cdad494c24e3786480fbc262a6470a7a2af3e1b9db,2025-03-07T17:15:18.263000
|
||||
CVE-2024-12976,0,0,a7896141b08b975c59cc02fb56de4b5b8fb1f07cc8194762ff5a1f544ab3be60,2024-12-27T19:15:08
|
||||
CVE-2024-12977,0,0,a3d393b71af82518afafbd1c679660f25331ee3d2ea0704ebcda5ffbe8610a8d,2024-12-27T19:15:08.130000
|
||||
CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000
|
||||
@ -247079,6 +247082,7 @@ CVE-2024-13082,0,0,dd86cc2dbd0bc89ca24f8652438ba65c25dacf6f914e34b241ffb1d5cb882
|
||||
CVE-2024-13083,0,0,9baf862c4a01e16469f726f0f2436d28244783672ca85ea8f1f89819371703f3,2025-01-06T14:45:40.307000
|
||||
CVE-2024-13084,0,0,f2c72f4c09d45c5cd33a8dc82e8e6f76fce41bba98f78ae1d6ecedd64730d79d,2025-01-06T14:44:57.910000
|
||||
CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40fedb,2025-01-06T14:43:13.437000
|
||||
CVE-2024-13086,1,1,1efbd7c3b567f211462158c13680e0e7f13169a058f6b87b5c7b05a0756ba0cc,2025-03-07T17:15:18.430000
|
||||
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
|
||||
CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000
|
||||
CVE-2024-13092,0,0,a29686b1694224a9f1b539d3106df56569cbff4d775b5a640a3744ebfbd486b2,2025-01-06T21:15:14.273000
|
||||
@ -252851,7 +252855,7 @@ CVE-2024-25735,0,0,9fdea3ad6de7f4f83bd747335b88ba4bc80cbb63cb46a203f3f828d80e36a
|
||||
CVE-2024-25736,0,0,831650ee2b289fa09d115f05113a0521c5f85fe00e3f4a57b362a744d6e20323,2024-11-21T09:01:18.197000
|
||||
CVE-2024-25737,0,0,4bf6de89cebe09aa2368df8de50a16d59403650b4e336a34b7d2536eee9a53ba,2024-11-21T09:01:18.417000
|
||||
CVE-2024-25738,0,0,104f8fb5616d4b0fc4a70325425b561419d44b0dc6df45cc5ada7cb95d562c2f,2024-11-21T09:01:18.627000
|
||||
CVE-2024-25739,0,0,3c706a17add34350e9cf827e766f3bbf1b14a8aa3ef17092c57f8fb63d79383b,2024-11-21T09:01:18.840000
|
||||
CVE-2024-25739,0,1,c1fda310465c653b2915c0b7e5dfad87965080e10aad84c2518d6d00c6114175,2025-03-07T18:15:39.947000
|
||||
CVE-2024-2574,0,0,42ab3d86f020fc690af2a2e85cb665f1d9747c0eafe41f89be4b8b85e352c03d,2025-02-20T18:10:50.230000
|
||||
CVE-2024-25740,0,0,d6d3c8770d2c76a0fc3555da9c432136eb7575e28d8f6e4a82b40609ff87844a,2024-11-21T09:01:18.993000
|
||||
CVE-2024-25741,0,0,1d23ef34ccb35d014111342476db8a5b6563966ba18b74c74ec859aa07028c90,2024-11-21T09:01:19.140000
|
||||
@ -253655,7 +253659,7 @@ CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe
|
||||
CVE-2024-26764,0,0,182584c1b22dec918cc3c58a7bf9ff6e42e4473d6f7b976355d13ff4ba65cc27,2024-11-21T09:03:01.100000
|
||||
CVE-2024-26765,0,0,86639deee47c82199c185bbb9e529948404a232a3b8d78621e9c695bf46ea544,2024-11-21T09:03:01.213000
|
||||
CVE-2024-26766,0,0,f8d8707040c45d2d4a25e3df9b45f731ca8a389770a89c102e506c6842929d2f,2025-02-27T21:59:09.400000
|
||||
CVE-2024-26767,0,0,3e5c80746b7511c9f6aeb36b1c8b59eb41a7b9be4ad7426cc19cb790b7c56f61,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26767,0,1,5772b82c429246618f54341350bcba6909fc1b320104e1434b760823236efcdb,2025-03-07T18:15:40.147000
|
||||
CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000
|
||||
CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000
|
||||
CVE-2024-2677,0,0,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095fea,2025-02-21T16:16:38.053000
|
||||
@ -253892,7 +253896,7 @@ CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709
|
||||
CVE-2024-2698,0,0,92caf5de1a4db3d2766017db2b8c2c83c4ffe4ed3a628a64f14163835fb45ff5,2024-11-24T17:15:04.170000
|
||||
CVE-2024-26980,0,0,c664518d666b8dc60398076a7315aa316908c8287d246e166912ba77399e9ec0,2024-11-21T09:03:32.600000
|
||||
CVE-2024-26981,0,0,e3d85d4378a3dedaa0ea4ee82c134e38e306ef680bd7e72d630d02192612620c,2024-12-23T20:42:57.277000
|
||||
CVE-2024-26982,0,0,99e3484c80d4819e68a803f586d0923fc70637779d8a9d041c3ed758ec197b84,2024-11-21T09:03:32.917000
|
||||
CVE-2024-26982,0,1,d14028f4f107c9606f85706a913319b8bfeb59fe440b365c959c15681df88ff9,2025-03-07T18:15:40.423000
|
||||
CVE-2024-26983,0,0,668befa1524b84eb804e032a2857d5c5316ec13983095bd9d2f5e231c1910c36,2024-12-23T14:53:02.043000
|
||||
CVE-2024-26984,0,0,d5fba52a36226feb49bb95128fa870f8c609ab762c84661aa0776867387cbc6c,2024-11-21T09:03:33.177000
|
||||
CVE-2024-26985,0,0,828c1d0fb4c1394a0226e133cac1cf8633b8aef9bacbe1c0d4677aeab25a0507,2024-11-21T09:03:33.427000
|
||||
@ -255510,7 +255514,7 @@ CVE-2024-29075,0,0,c54939fdf2711f44320d1fc65a243f37f96762abe83d15bb484ae46355a45
|
||||
CVE-2024-29076,0,0,3322157c3e4d7c4ea336c6ec7e6b71fce636a644cfd118399c650de884afd218,2024-11-15T14:00:09.720000
|
||||
CVE-2024-29077,0,0,9515ec8469d3e60fa9b1d5cb6e10f297f2055104bc59b61ad071a5618ed7c4a8,2024-11-15T14:00:09.720000
|
||||
CVE-2024-29078,0,0,3768ba713f72f2f684f19527702d5f143dab089741d088ff15b26b44c84d8755,2024-11-21T09:07:30.583000
|
||||
CVE-2024-29079,0,0,482d971e19d4d4bfb6c183b3b01adbf378927853a1ec5a4c3b985f309db7612b,2024-11-15T14:00:09.720000
|
||||
CVE-2024-29079,0,1,4a9d90aa930cb8796b57db900247f0ddac7ad20fa7c538100c5ccaf7dcc7a116,2025-03-07T16:48:11.150000
|
||||
CVE-2024-2908,0,0,0f897bf0ecb82f969317f5289095fed1d55005c4541e36f10c7884c67015bd9f,2024-11-21T09:10:48.650000
|
||||
CVE-2024-29080,0,0,82b257cc34f2d47570a26c77d23ec313af395c66d00eb161eb280d2ae50d1a45,2024-11-21T09:07:30.820000
|
||||
CVE-2024-29082,0,0,e898b9c196187a95c2e78cea8d6fd4eae6c65b2d1e98c42a8b9e23f327d118eb,2024-08-20T17:11:31.787000
|
||||
@ -257999,7 +258003,7 @@ CVE-2024-32481,0,0,04e9af9bf4e958551ff5b9ab44674cfd14049e81d175c17656409aed3c42b
|
||||
CVE-2024-32482,0,0,522b777247914831e62e413386cb4671fbd87cce86fa96f638265994ccb940e0,2024-11-21T09:15:00.140000
|
||||
CVE-2024-32483,0,0,b30d6e0a3706a53dcfe036dfdf50108c32320dc8f8de91e271a9318984dbe9f5,2024-11-15T14:00:09.720000
|
||||
CVE-2024-32484,0,0,7896b2cfd633e1dc14fe53779f321e78cba2d01b173f70e24cc07a477ecc39d0,2024-11-21T09:15:00.430000
|
||||
CVE-2024-32485,0,0,32b9e8068a8ede9bfc4e1790ee1b5b7fd39c8615e906f1b9bae4b90d4fb9fd74,2024-11-15T14:00:09.720000
|
||||
CVE-2024-32485,0,1,df9e49e166288465942b1938c6f42a6bed8cb07a5dc47a877c97a21555e19edf,2025-03-07T16:48:11.150000
|
||||
CVE-2024-32487,0,0,740bfb2b93fa2adf41f7a285c565b0d800696203d50b3829c2ab3e82d867a22e,2024-11-21T09:15:00.647000
|
||||
CVE-2024-32488,0,0,2f484005a13a4aed3193e91e8fdda1bd74b6aee19d2af8f4b5e430f9104402a0,2024-11-21T09:15:00.873000
|
||||
CVE-2024-32489,0,0,bff0362e336c6b4218d6a194c573710c58986e44dcf72d3acc17da6dae0ef4ce,2024-11-21T09:15:01.137000
|
||||
@ -258780,12 +258784,12 @@ CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d
|
||||
CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000
|
||||
CVE-2024-3348,0,0,3b807323ebce92e9b3b40f3f60d800602a40200c443d0436148410ee0c605804,2025-02-11T14:42:51.353000
|
||||
CVE-2024-33485,0,0,5751924042ec18ca26c59e12f67b6f868f04b8c9d386bcb9a4978361ed711846,2024-11-21T09:17:00.733000
|
||||
CVE-2024-33489,0,1,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33489,0,0,bc7bda3e707b81cb476577f23574aad96018900ed97fe2f9073b0656f502b4a9,2025-03-07T14:55:12.087000
|
||||
CVE-2024-3349,0,0,77627706952ed9b21bd8fe86802e39c3a79b47bff5aa5a4099e6b50f2da27242,2025-02-11T14:43:45.883000
|
||||
CVE-2024-33490,0,1,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33491,0,1,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33492,0,1,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33493,0,1,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33490,0,0,d8a93ecc315295cbb1740a0d12ebbe75966dddc61bbeef53b9493adad86c9d12,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33491,0,0,dcb064a3601f20bdcd6e94699cc6409bb26392b9db5fd2a10a3c1be8a1ab5e6d,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33492,0,0,7de354210a6a3482d33cef146b3d9081c8fe054c245654d454ecccd59a5c572f,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33493,0,0,77c5af85134e3384e9bcd1f8585c5b2d9190d6519d6d73c1a712a323be2693bd,2025-03-07T14:55:12.087000
|
||||
CVE-2024-33494,0,0,59f5d90daeffa43cbbfaba78c93fa678a165d69a45e730b3cc8593deb34df95b,2024-11-21T09:17:01.577000
|
||||
CVE-2024-33495,0,0,57b81efae96a7f5a9931902412b22bf475f5cadbad96517560fbcc807d2b75f3,2024-11-21T09:17:01.720000
|
||||
CVE-2024-33496,0,0,3e0339b75603b80172a8dd08f9727b029d985209c64e779cc52c646d8e6027ce,2024-11-21T09:17:01.867000
|
||||
@ -259861,9 +259865,9 @@ CVE-2024-34768,0,0,122aedd59e31e48a56ad710685bb6533235243d414fc7e290a06ce6d6cc4a
|
||||
CVE-2024-34769,0,0,3c2f1272178b3b6e353d841f83e074297c6d5f4141a14cdf348eacec94220a7a,2024-11-21T09:19:21.920000
|
||||
CVE-2024-3477,0,0,cf4b1436c4c461043c3987d62f2e8d0acf573a972238f622147187fc4c991e53,2024-11-21T09:29:41.263000
|
||||
CVE-2024-34770,0,0,f311204a876d7479498b4139e8f6eb341a3f3254560f9a986afb14673942e4f9,2024-11-21T09:19:22.040000
|
||||
CVE-2024-34771,0,1,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34772,0,1,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34773,0,1,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34771,0,0,f00cc3a61ea44737399497c5e807e73c5d427da6a15829ec41b4489de2197fe0,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34772,0,0,0be06749e38a6604e10c7c3a23e2ed96919ab3b61627b5daded2206a999a7549,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34773,0,0,800b69d7c2cdd8acf5030dc0fc71704ab28c6e813717eb1a038dfa70af8da8df,2025-03-07T14:55:12.087000
|
||||
CVE-2024-34776,0,0,f2c5ba4cb7d9ffd8fda0ddd53e1e2fd3ea07d2711e5f4284af93231494d0351f,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34777,0,0,be880f5d9300a5088e13fa19ac10c6b025c3dca9069c4c291fa2fac13a210544,2024-11-21T09:19:22.627000
|
||||
CVE-2024-34779,0,0,e889ed02ebbf7be7a3483cdba1d97a550775f3fedf135fa003cb98fb6ad367f2,2024-09-12T22:35:06.133000
|
||||
@ -261515,9 +261519,9 @@ CVE-2024-3698,0,0,12147dc3bb2f5a1fc18fded0f33005cb94125941e45c1ded7e56b93ab8c7f4
|
||||
CVE-2024-36980,0,0,089f8099ecabd03482da3a8897aab642ab783b7442198cf7a4c02463e209b50a,2024-09-26T20:53:57.597000
|
||||
CVE-2024-36981,0,0,4ef7db0d01c8ae7f95bdcef9bc0bd36c40a986a629272624fe257c629fcdfd83,2024-09-26T20:55:39.783000
|
||||
CVE-2024-36982,0,0,cc4a220fdd8a42e8aad7f2c8c8b02865c677b908a7047d3d5f217be9bc0ea725,2024-11-21T09:22:58.247000
|
||||
CVE-2024-36983,0,0,eb53b4f036eea81efe9607e22c368523abeefdc5c91f56072e8871da6f6ffb60,2024-11-21T09:22:58.390000
|
||||
CVE-2024-36984,0,0,ddabae24e3a6e47af4ad0814cdd5ebd069ab1f064a67b99cabd771e38f7aaa53,2024-11-21T09:22:58.517000
|
||||
CVE-2024-36985,0,0,01ed38568e0bb1c3d1a271aa1d6f71c0a86e801d836e9314e8bf15cfea88ab71,2024-11-21T09:22:58.640000
|
||||
CVE-2024-36983,0,1,7c327280de13c56faa0c86514b9c86ea1b680859b5d05011bb5a5bdb5f850428,2025-03-07T16:48:11.150000
|
||||
CVE-2024-36984,0,1,aadd2a0956da4c042f95ddb67cc43ff3cbcbb80f03933838e51074d950166f19,2025-03-07T16:48:11.150000
|
||||
CVE-2024-36985,0,1,b555ff5bac11a1d59d4c6dd9b65f1f5635248d92bd480b602f510a0f44720c7e,2025-03-07T16:48:11.150000
|
||||
CVE-2024-36986,0,0,6171be6e726f563ccaa9f4e95f354cbb3f398a584112b7c348b97cc1f2873e12,2024-11-21T09:22:58.763000
|
||||
CVE-2024-36987,0,0,2a177ddfb0ad1ed8451058008e2f729ba11b7a19f464c2d679b71cf8d8cb6f78,2024-11-21T09:22:58.897000
|
||||
CVE-2024-36989,0,0,12e451674a72a486cf884a3b99bb279fbbbdec54b7e8608f5263c20d98ef01b3,2024-11-21T09:22:59.027000
|
||||
@ -261529,7 +261533,7 @@ CVE-2024-36993,0,0,42d720890d3b45924e92f33bc5db1ad66de8be2f7e6bc7f669a295af42dbe
|
||||
CVE-2024-36994,0,0,6ae6427754234d6ed256fc2331a8aa393d98984850d7174f5f368ebaf97165a5,2024-11-21T09:22:59.757000
|
||||
CVE-2024-36995,0,0,73cd553f65536ac335f1c0746a6d405c1387e249d311b60b01b74411ff471384,2024-11-21T09:22:59.907000
|
||||
CVE-2024-36996,0,0,59bb280a47ec504c1079da292d01df99037a869afd9838585b9a937a0dfbe247,2024-11-21T09:23:00.057000
|
||||
CVE-2024-36997,0,0,d16bf8b387fe3b9d665adcd4b222a22e88b0512aa442c11d99217d1cc1ac56c9,2024-11-21T09:23:00.207000
|
||||
CVE-2024-36997,0,1,5e61d0747434495a6647e49703498b4551b63571e73048415e98cdde987e8673,2025-03-07T16:48:11.150000
|
||||
CVE-2024-36999,0,0,0ac26c45718774a5aac17dfd03fb5764d9aedbf616fce220cbaca06163c9bf91,2025-02-10T21:15:18.677000
|
||||
CVE-2024-3700,0,0,aa45601f8be27c755b4915734976ba5d62a48c50c90edbc080613b6a4f600cee,2024-11-21T09:30:12.350000
|
||||
CVE-2024-37000,0,0,f4c69baf3a5167528d99b97f298822f7b3831e8369b08557282b4a963e5e0dc2,2025-01-27T21:15:12.133000
|
||||
@ -261684,8 +261688,8 @@ CVE-2024-37154,0,0,79775441c2eac00a4330a7a5e5b73461a1a9196f77dbc6e682df7449a12cc
|
||||
CVE-2024-37155,0,0,b64b10d4f3bfab5a241476c1430f4fb48ba0becbf0c72ddd7e46dc818d9094aa,2024-11-18T17:11:17.393000
|
||||
CVE-2024-37156,0,0,dac23b1f9b67044aa940bd86b87f0ac85f528cbc7705b6e02fdd636e0fbbb72e,2024-11-21T09:23:19.323000
|
||||
CVE-2024-37157,0,0,f123e154f72f95c70fb532ccb3be9c3091e85c6c7168a37d5a92176024575c9c,2024-11-21T09:23:19.470000
|
||||
CVE-2024-37158,0,1,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000
|
||||
CVE-2024-37159,0,1,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000
|
||||
CVE-2024-37158,0,0,a939d524825c6f6fd225581d3bfbff7f713cdbade28befc732e5c941e1528cb6,2025-03-07T14:55:48.130000
|
||||
CVE-2024-37159,0,0,426185558639f1efeb6742b791b77d0d4afe1332139716874933671afa1d3a56,2025-03-07T14:55:48.130000
|
||||
CVE-2024-3716,0,0,4b71d5ba535c42cc283dea213305e512fbc720e962e0192e392dc5bde3992d22,2024-11-21T09:30:13.927000
|
||||
CVE-2024-37160,0,0,6414b8b350b31d55bc4edd745def1a7729a5325ae725ec744bcff78c20daab50,2024-11-21T09:23:19.910000
|
||||
CVE-2024-37161,0,0,35a0542c09b5a4bb782093598c1f55a02994aa8378ec44fc91263a93ad8859f3,2024-11-21T09:23:20.060000
|
||||
@ -263003,6 +263007,7 @@ CVE-2024-38634,0,0,069e9770c3e27677816270653e1104efb46dd73f59ad93690e8ad0f92b514
|
||||
CVE-2024-38635,0,0,327ebe255f111748ccc3b39969e4e0cbc6b66d5c4259fae8aea4b849153a6587,2024-11-21T09:26:32.623000
|
||||
CVE-2024-38636,0,0,0524f90fd2a47148b005b80306d9bc52fc1e23ffb39b5d42f99dd3c39ac72c23,2024-11-21T09:26:32.753000
|
||||
CVE-2024-38637,0,0,b09e5d9967b78fc753bcb8611d452d07bb4d9e6be77cb0ab61cf099df2c19451,2024-11-21T09:26:32.887000
|
||||
CVE-2024-38638,1,1,fb084aadd03358ef51bf581c7a9dca0e01b9b93b119c668eb38a6b4a9aad9160,2025-03-07T17:15:18.707000
|
||||
CVE-2024-3864,0,0,3271dcbd9974a4b6eba4e5f89efcb4e2480b28b6cb831e16674df7deca2899fc,2024-11-21T09:30:35.093000
|
||||
CVE-2024-38640,0,0,99476650ee793e5ea6ecd4c44c7e3c5e951d6acda74411920c56ad884fc79c1c,2024-09-16T12:27:22.747000
|
||||
CVE-2024-38641,0,0,4f90c85b92940ff2ac351ca39686e5704a699044d9908e513f2b89f705d8204b,2024-09-16T12:35:23.713000
|
||||
@ -263074,7 +263079,7 @@ CVE-2024-38701,0,0,ab53804bd7f862443190673e1ab00a59d838aebb91b605e2e7d23b18eecde
|
||||
CVE-2024-38702,0,0,3c4ba50317487924492ca168213a6ee8861658b1d8d73d68f67a1a5b824fdd0e,2024-11-01T20:24:53.730000
|
||||
CVE-2024-38703,0,0,9f71f0f66667eee4520111e7a817856cbe4d6451b74cfba72f2fc8a8035bfc74,2024-11-21T09:26:39.793000
|
||||
CVE-2024-38704,0,0,6d591c3940acd82eb3086f3502463b71238833bc6dbf15a99e173863eacb12f6,2024-11-21T09:26:39.920000
|
||||
CVE-2024-38705,0,0,2e6fa924bb5a44b6a89df1e9f147b9f7b1bcdfec97187c47f022b257e9fc1d3a,2024-11-21T09:26:40.053000
|
||||
CVE-2024-38705,0,1,7191feb6eaf480e8e6eb550f5f5e32f4856c4cf833ff627401b0e3864b0665d4,2025-03-07T16:48:11.150000
|
||||
CVE-2024-38706,0,0,c793ed8b05a090829196219a03d730391cc7aba0d3d23364466dd55abd11ba86,2025-02-05T15:19:38.287000
|
||||
CVE-2024-38707,0,0,d25d2c2c7d62aacc0617f006ea134a5267f10e5cde18b065e9091e448d5d2e62,2024-11-01T20:24:53.730000
|
||||
CVE-2024-38708,0,0,83a10221309c2fcddbeb73d8601ccc5f941fc01f69e9577d48e2e4f826bcf18e,2024-11-21T09:26:40.387000
|
||||
@ -263831,7 +263836,7 @@ CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138
|
||||
CVE-2024-39693,0,0,2a0c67223a67a4cd6565b19d41f2906bca2653f8f96542a5b62429b6479c76d0,2024-11-21T09:28:14.067000
|
||||
CVE-2024-39694,0,0,b33f1bc6cdf86d31af1545130725483f2391aa4c76f60be75b33572bad66ef8f,2024-08-01T12:42:36.933000
|
||||
CVE-2024-39695,0,0,4c6a4448c06a4c8d6ff6c2304228798d4d4aaab51edb52346088ef9cd9927593,2024-11-21T09:28:14.270000
|
||||
CVE-2024-39696,0,1,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000
|
||||
CVE-2024-39696,0,0,1df3cecb28b54b705d887706ff8d4d395d84c8a93acc0dc15f5fc9b5908bf381,2025-03-07T14:55:48.130000
|
||||
CVE-2024-39697,0,0,f3a7cdaaf41d6cf05c77fea55d7ff9924821768d6a8fc884c5523aed59207e8a,2024-11-21T09:28:14.540000
|
||||
CVE-2024-39698,0,0,118caf2e6cd58e2f99a9fe181f4d1112f02ddf5bbdd7ff18cf94ce3936612acc,2024-11-21T09:28:14.690000
|
||||
CVE-2024-39699,0,0,09c189588d9dd611b59094ba3bc24c1b4e450d4d41ea906404b5a63c4aa31b07,2024-11-21T09:28:14.827000
|
||||
@ -264614,7 +264619,7 @@ CVE-2024-4097,0,0,028ac85c723d578a83d0df3ee04b5f87b583751d336fa4736a761030481871
|
||||
CVE-2024-40970,0,0,8898c4049fa14396e223dbd774a10ef0716916d7e318a3cdb9e8a5d50ee417bd,2024-11-21T09:31:58.550000
|
||||
CVE-2024-40971,0,0,604d56931c3387a7fa332d2b88d504a7175928f4e84d73064a010be7e73550e5,2024-11-21T09:31:58.680000
|
||||
CVE-2024-40972,0,0,d7fd09a5c425015a6740d8f1abebe58d7bfcaf5db2c8d1774ec7d74d0dfdb64b,2025-02-03T15:43:00.767000
|
||||
CVE-2024-40973,0,0,6294b18460ef7514ce928be54d821826732b56b0e5313e7c7b2fbf639665332b,2024-11-21T09:31:58.917000
|
||||
CVE-2024-40973,0,1,4f11562d6cc2a837e14cf106b956dc0c08293e2d2fe3a28fc7b89b61ae29f009,2025-03-07T18:15:40.783000
|
||||
CVE-2024-40974,0,0,b6a51bc421f4858319d1d11b535e9f0c7c1e0cc032cbf31bdaa70aca77cf9b0d,2024-11-21T09:31:59.047000
|
||||
CVE-2024-40975,0,0,c95634b99ac5de870c313480d060cfdc3b3cfad72080543bf85013daecfbc46e,2024-12-09T13:10:01.607000
|
||||
CVE-2024-40976,0,0,9d6f95cbcd7cc30b63959e63e7cf081c28a7c5898438c1286ef736954c419546,2024-11-21T09:31:59.313000
|
||||
@ -266217,7 +266222,7 @@ CVE-2024-4313,0,0,7d942770a1a4dc49c5d51e9696d69566959c4a585714bdbe873813ae04ebf9
|
||||
CVE-2024-43130,0,0,1e591c9775a6b821f95179556691b7dbf7fca248e7b7a0986bc948da7925664a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43131,0,0,a79ea17d741ce6c2427f437a6617d744634b4ab5c4d8cb1114509eab166bbb0a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43132,0,0,a7e41eb29c7b0038ae266f989e98ee8056ba3594c845a171ae27ce35413128c9,2024-09-13T21:07:55.330000
|
||||
CVE-2024-43133,0,0,e41ce36fae7cc63e1e6e10348b9718e55cc92c6a030f6e29dbf11844e381a1bc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43133,0,1,0b22a5961055d89cc8b6547c5a82d2e424b8939dd8490aba085486c3c97804cd,2025-03-07T16:48:11.150000
|
||||
CVE-2024-43134,0,0,e697a5405745c13967c582276615fed22c7922a3bed422fc074db4155fec68f1,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43135,0,0,a0469d70766a9d4d4a709a18b34213e7343b06f9f8a4b5b19c9b4341aa7968ba,2024-09-12T21:18:15.773000
|
||||
CVE-2024-43136,0,0,1582518c745838c877399638da3c98ad2cdac482e1c2cf80f200ccc232862960,2024-11-01T20:24:53.730000
|
||||
@ -267594,7 +267599,7 @@ CVE-2024-4495,0,0,6e709f9ace414769d9cc3ea8289e9243ed8a2c8061b26956dc3b3654ccc408
|
||||
CVE-2024-44950,0,0,27e2180bd27b63f0d75864bb94426d70ed574ad49ccac5abe47c96450a1c2433,2024-12-14T21:15:24.140000
|
||||
CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000
|
||||
CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000
|
||||
CVE-2024-44953,0,0,4dded2bb37acfb6eff4acd77c8806d5d13ef508d26de37379bffc5ecd90fdbbd,2024-09-06T16:37:33.650000
|
||||
CVE-2024-44953,0,1,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000
|
||||
CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000
|
||||
CVE-2024-44955,0,0,2bc6b0d941fdfccf3c93972ebd5efd5058cb7c721673095ebdd7739bcf15a6cb,2024-12-09T13:10:03.600000
|
||||
CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000
|
||||
@ -267915,8 +267920,8 @@ CVE-2024-45289,0,0,d31a3e4a36b107e8a8e404759b2708654eea754f2b61637eee7237099c255
|
||||
CVE-2024-4529,0,0,19a4b561c0dfb2c4c5ee51c74d6ef4dd1802fbdec551260281d22055a8f00c6b,2024-11-21T09:43:02.493000
|
||||
CVE-2024-45290,0,0,5fec04f279aa2b7bef2db505872b58e2ca6543c1d2f496f9632044c158031133,2024-10-16T19:54:53.397000
|
||||
CVE-2024-45291,0,0,db9f913cc87f43195dd179b7bba5ebd58dd0cc5f21f21ba4f27ee72528ead67f,2024-10-16T19:09:52.697000
|
||||
CVE-2024-45292,0,0,4bbbea9efaef28cba408c6ba944bc233f9f2c92b0520b2d3dae5e889f91e038a,2024-10-10T12:57:21.987000
|
||||
CVE-2024-45293,0,0,d3d493d8f8cb34c8eb46baece93bb38ae502ffd95bfac3aab404a1304b9ee887,2024-10-10T12:57:21.987000
|
||||
CVE-2024-45292,0,1,3f56d87a1522c0674da82db13d85b4bb359599e41f46a9bce86cdfc34925b5d6,2025-03-07T16:48:11.150000
|
||||
CVE-2024-45293,0,1,0cc74a1d1c1b8456f24111e1b0cd98af3c5c52264be47db7d739ba825d01b614,2025-03-07T16:48:11.150000
|
||||
CVE-2024-45294,0,0,c892336db6e97945729784698a30c4434775db08a35a5ad837741c623dcd4529,2024-09-06T17:15:16.977000
|
||||
CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000
|
||||
CVE-2024-45296,0,0,486e7f952c7eaae5bc2a0d9b313f98272bcfc325a472d908193b2678eaa8854c,2025-01-24T20:15:32.680000
|
||||
@ -269567,7 +269572,7 @@ CVE-2024-47627,0,0,eac568ce436a3c1e102e5798cb9b7d1795efa5c186cda626629d9650036a4
|
||||
CVE-2024-47628,0,0,9d16ab34229dc7bdccc3dd2d0ef807eebf1526c12b182e2b7d23a0067ade62dd,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47629,0,0,6009b1526d22693480b805802e3e602ff608254d5b6838fb0f05645a5caf41c7,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4763,0,0,d9796f072cf5e3c46cb27da90b305b960b1393d62677a8f197641fe0723c5aac,2024-08-19T13:00:23.117000
|
||||
CVE-2024-47630,0,0,f20fe5ed2fdb81ffd8034059037fdb3d1da00dd04bc1b25c67896f4b0d35d591,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47630,0,1,6688a3e4d3d19abab9a907fcdcde7eb4c19983229d4564f138664ae41c15471d,2025-03-07T16:48:11.150000
|
||||
CVE-2024-47631,0,0,fc0671434abf129fe4a07da97f07fda78db508487080c3e74ad908ca721c023d,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47632,0,0,836cbbbcdecb032969ab43cb200ee2d9e9f527b4559baf95003ce2243541d560,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47633,0,0,b0928e299bfedbee2cda8ee029fcd82fb0924d77e9ef1fe1ac6c1b7e2fc89853,2024-10-07T17:47:48.410000
|
||||
@ -269703,7 +269708,7 @@ CVE-2024-47750,0,0,77c938e831fc298a4864be73d8faa815c5ecd1e1f7df019cd77676d105ec7
|
||||
CVE-2024-47751,0,0,376896741f561252675c3b7f5567e8d9710d560baa434f67f31cd19bc85f698c,2024-10-23T17:33:52.440000
|
||||
CVE-2024-47752,0,0,918cca47f4cabc53f1ef5f2243c96b36643fd61acaf3b0419e24062a34c5efee,2024-10-22T16:11:09.037000
|
||||
CVE-2024-47753,0,0,bfd9a232a5f64bf53f2572bd574cad3ddaf8e02c73855ec0c1535a7e51c101f7,2024-10-22T16:10:40.380000
|
||||
CVE-2024-47754,0,0,15efe46b5acd24e6a048863fe4e659f9670882dda2e519b1e7e7ce2228e3bf0d,2024-10-22T16:10:21.907000
|
||||
CVE-2024-47754,0,1,edf7d3a667b4046cfc07e7f22040c75fc409488e9b68087ca879d42283b2affb,2025-03-07T18:15:41.160000
|
||||
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
|
||||
CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000
|
||||
CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000
|
||||
@ -269806,7 +269811,7 @@ CVE-2024-4787,0,0,b7cc2ef631ed95f84e10cd73fd49ce38a2c2ecb8c447df5fbb2486dc5ffb36
|
||||
CVE-2024-47870,0,0,9997eff64a8710817a7dcbc6ad59fedb1e7d5013abeaacff155b5c70fadb6cc1,2024-10-17T16:57:02.283000
|
||||
CVE-2024-47871,0,0,c1f86b165ca70bde1db92973f4bfde4834cadf6700a886455612b2dde919ac98,2024-10-17T17:11:31.150000
|
||||
CVE-2024-47872,0,0,e450eb43d077cdd12f4fb05ac26c70a02bba670db7b952b25f1ae77092a943ef,2024-10-17T16:54:34.383000
|
||||
CVE-2024-47873,0,0,e046b6930e39a494ea7f938419ec7450a28fab6911a5fe546c93b90a0d8e9486,2024-11-19T21:57:56.293000
|
||||
CVE-2024-47873,0,1,35587fced2f8a1cfc140a3ba143a74f0439640aa0d2d224444749f2e0102e5da,2025-03-07T16:48:11.150000
|
||||
CVE-2024-47874,0,0,901c896d9499d8ec01c36bae77d3a309c31e148b996e907cd99ebd3207fbfb03,2024-11-21T17:15:17.990000
|
||||
CVE-2024-47875,0,0,3327b34723dbb94d555f6a00e7b89ed291e8000417cf00e197a32e0c0c01d95d,2024-10-15T12:58:51.050000
|
||||
CVE-2024-47876,0,0,aef469092b2ed3a37de28546014df59bbfedc9e07b86c5ad5df2edccfd6bd8aa,2024-11-21T17:15:18.227000
|
||||
@ -270301,6 +270306,7 @@ CVE-2024-48860,0,0,5019a6e5ad855b42ba7a0382529136c2e078d26be8e3341136aaeae311f54
|
||||
CVE-2024-48861,0,0,f2e56e74772e56409fc2807a1473087052bb0f47a879527c35ea32b9a7cb30e9,2024-11-22T16:15:28.483000
|
||||
CVE-2024-48862,0,0,34011f3d825da8e353de6ce07fcd70a7205f097b533b31757cbbc7381a7840b6,2024-11-22T16:15:28.623000
|
||||
CVE-2024-48863,0,0,578a6f80749eb5a4d4232ec8ddda758d5aadd2e01991d40a39ced5ff791ab5f8,2024-12-06T17:15:08.533000
|
||||
CVE-2024-48864,1,1,33930bb5f90c6e24d85b46ba43ff76bd9ed4149008630a9769a32425f0567d79,2025-03-07T17:15:18.850000
|
||||
CVE-2024-48865,0,0,247cc50c39d361aaec0dcad80786890e51d625f736d6b603da14a8203a55d7b5,2024-12-06T17:15:08.653000
|
||||
CVE-2024-48866,0,0,723d77d7068b76827cfe6cdcef62bcad806888aec64cd00702023106e7b314bf,2024-12-06T17:15:08.800000
|
||||
CVE-2024-48867,0,0,13129fdca7601277c3e567a9a828b6a10df15286823bb97275156f37dd622a7a,2024-12-06T17:15:08.940000
|
||||
@ -270343,7 +270349,7 @@ CVE-2024-48912,0,0,2bba8940b92e3253641c425098235f3e7518de3923b07dbd26d0ac61dd545
|
||||
CVE-2024-48913,0,0,27febbef07f52d15082822a078467473fe159291b0acb1f4d5bbfdd00e1f7d37,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48914,0,0,06e6403f67b46df13be7d3307b268a340a7b5ecc4c110c41c7ad7a6e410813ce,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48915,0,0,22b831e4b76f3ff1bbf21dd69a4b74295f2c021ffd6565d2fbc637ebd54bb2d0,2024-11-21T17:15:20.387000
|
||||
CVE-2024-48917,0,0,1f86ead059500276c78b17cbe120360ead3484a8b53b48351179b6e8075ff832,2024-11-19T21:57:56.293000
|
||||
CVE-2024-48917,0,1,8aadd8407cd56abf96fe596e35986e1aed7a4dd7db0f5ef3b531963fff11bac3,2025-03-07T16:48:11.150000
|
||||
CVE-2024-48918,0,0,cfae4446d62adc80a48f2ad18619403b9e405854ec4cb3c0b0fcd077c6f1add6,2024-10-18T12:53:04.627000
|
||||
CVE-2024-48919,0,0,16efdb2b06ecb55d9885e13fd3da6695a4858f71e0605b88abf088c1c21e44e2,2024-10-23T15:12:34.673000
|
||||
CVE-2024-4892,0,0,6afbad4df2bbec8e37756a6be046aab9281ae5b67f5cee15e3ed187ab73c9fa9,2024-11-21T09:43:48.390000
|
||||
@ -271295,7 +271301,7 @@ CVE-2024-50062,0,0,d50f044e8938707dae39384ec96cd77ececb8faa96071400b106a3c62189f
|
||||
CVE-2024-50063,0,0,3b5ab46f8320ec86decbfb8639e1b1e04d84924116cd0ee6210d300fde89b93d,2024-11-22T17:26:31.070000
|
||||
CVE-2024-50064,0,0,2a0293833921e1332bfd350afcf732a34eb77b0abeb7f463e77d57b5bdb3f081,2024-10-23T21:49:29.423000
|
||||
CVE-2024-50065,0,0,84caec01af79e694589460b1fd2d22181973d74a594b1014f17ab14d35b8559b,2024-11-20T20:07:01.320000
|
||||
CVE-2024-50066,0,0,5152114954b2ad4e8ec7b5c3a842d9a276a29bd9316bf6303fcd414599f10b2d,2024-11-25T15:15:07.570000
|
||||
CVE-2024-50066,0,1,f8cbeb952d27740648470cb34786d680aee0eb2b11c0988fbc6b4e4ca35c50e9,2025-03-07T17:15:18.990000
|
||||
CVE-2024-50067,0,0,9104176565a799c30e4b5ab08e38eb10316f89060bebb875ebb360b27e4a0cc0,2024-12-11T15:15:10.943000
|
||||
CVE-2024-50068,0,0,165746773322f9f91c4968723b044a9f5e9e5ffc592c2389d486be015509505a,2024-10-30T16:57:35.427000
|
||||
CVE-2024-50069,0,0,1a3ff5e2e3c7d29ac1d15dff8ac05d381a9c14cbc1952960fbfe43f9fea6d99e,2024-10-30T16:58:19.983000
|
||||
@ -271641,7 +271647,9 @@ CVE-2024-50387,0,0,acfec5d4d4cc80fa5f6348d5ec56946ae7c6740c84044c594d2169b0248e1
|
||||
CVE-2024-50388,0,0,ceaae89a7584b9dc450bb8edc74105b925067d554de9f0a5040b1238d634d613,2024-12-06T17:15:09.373000
|
||||
CVE-2024-50389,0,0,63dd94c3355eb3b3a91e43e3e7656c4ce50024a7bbe4320fb7ef8cfba9d0187c,2024-12-06T17:15:09.510000
|
||||
CVE-2024-5039,0,0,ca1a5b478adf545bef605821aa52dfdc080c393ef724b76b86d058944594ebdf,2024-11-21T09:46:50.100000
|
||||
CVE-2024-50390,1,1,ce917a41c0c8b5742b3d68e64479acb303dfd7a5742c49315f99fd3a209e9c05,2025-03-07T17:15:19.180000
|
||||
CVE-2024-50393,0,0,ca657ca85a79d216d0254451add3fb18d94c238bddd9ad73bcfcbb175121b2e8,2024-12-06T17:15:09.637000
|
||||
CVE-2024-50394,1,1,4872132123299b87b7615918a5203592c67449af3d5e500763ed479755acce8a,2025-03-07T17:15:19.327000
|
||||
CVE-2024-50395,0,0,a9ce7b3214bbae373a52ec1c7ed313fdc2a9cdee82d64882b0bdaf1203e223c8,2024-11-22T16:15:32.417000
|
||||
CVE-2024-50396,0,0,4c0401f45da1156ccdcdf92aaf5d1c0a638cbdb1ba495db37a24b8dfe8cb7ddf,2024-11-22T16:15:32.540000
|
||||
CVE-2024-50397,0,0,569cf2d0a93629e6552b4fdd82fb311970394a2b2fc90725a9defd0bb5b1ef0e,2024-11-22T16:15:32.700000
|
||||
@ -271653,6 +271661,7 @@ CVE-2024-50401,0,0,04e2ffb3123800a23312ebfe719d56ec98fa2857b5c8a044cd1d7d3d23bdd
|
||||
CVE-2024-50402,0,0,28472c7defbbac1b7ee91e0374b734ad9c07484f87a0834b751e8761f9fd2774,2024-12-06T17:15:09.757000
|
||||
CVE-2024-50403,0,0,a4aa183b6f66c4ffb2fd1f183c9279ee43b63cdcaf8bd051b52907975e4618c5,2024-12-06T17:15:09.900000
|
||||
CVE-2024-50404,0,0,b5b2cf7f4bf1d6f93ea84548591911fd77b0383a18caa9c4b41e9f2a677f47b0,2024-12-06T17:15:10.043000
|
||||
CVE-2024-50405,1,1,b6c1851e75be0d40c8a7dc0a4486c6f42b40df7ed00c60588d6d5369c6f004d6,2025-03-07T18:15:41.860000
|
||||
CVE-2024-50407,0,0,9866052bb59192baca2967b3bc2111164d6bd7872bf340b1aca3f2c160296628,2024-11-07T20:28:22.860000
|
||||
CVE-2024-50408,0,0,58a47a84acdf0f836c9f8a5fa3c21e90b2d2f3c587c1b70e5c24f5387d6b7c59,2024-10-29T16:01:08.447000
|
||||
CVE-2024-50409,0,0,d098af286ab64a0110f5be7e77620539ec040083e43f27de87ded5e888586c5d,2024-11-07T20:28:43.577000
|
||||
@ -271848,7 +271857,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c
|
||||
CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000
|
||||
CVE-2024-50600,0,1,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000
|
||||
CVE-2024-50600,0,0,810cb03893c9e0e755613e442beab145d3f3a3065934d5d0b5b83fe52a3ba4f0,2025-03-07T15:15:13.750000
|
||||
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
|
||||
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
|
||||
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
|
||||
@ -273454,7 +273463,7 @@ CVE-2024-5305,0,0,37acecdce381251b4cf8d54680a176668d6b3042c421ee215ace13103ef148
|
||||
CVE-2024-53050,0,0,df6b1c1016049cbc511c8b398cb2977c96026e0cd49f48682799d74d7cec0bfc,2024-11-20T16:17:12.003000
|
||||
CVE-2024-53051,0,0,7bce6750344e15670478c9634ff864d215bae73a5591d86df30f0e74940d9128,2024-11-20T16:16:15.217000
|
||||
CVE-2024-53052,0,0,f31738c767ce7baf113b651a03cbc6b38394a89a9d81a5ec6a6eac9e76fe85fc,2024-11-22T17:08:07.560000
|
||||
CVE-2024-53053,0,0,8df42326d26038cc637648740f856a1650c6e80e4e422314078ed2b335523fa4,2024-11-22T17:09:28.773000
|
||||
CVE-2024-53053,0,1,00053a3b7a0ffb584e8e635f0dcb3d1f0c0ec532322ef8f44c2d41c2da1d31d9,2025-03-07T18:15:42.883000
|
||||
CVE-2024-53054,0,0,cf02ae7016d759ad466bd88de5cb08bce1aa8d7fd0df4ecdba05b4b1db2f1123,2024-11-28T17:15:48.820000
|
||||
CVE-2024-53055,0,0,bdd2e409b84d1a5d2e2b4cf3650bbb080f228be966d252bdce6ddbd4360cd02c,2024-11-22T17:18:33.563000
|
||||
CVE-2024-53056,0,0,ae5d112fd3aea822f75e2eb7364bd3e220e1ab500a2b5942a4ede94a922319d9,2024-11-22T17:55:51.830000
|
||||
@ -273469,7 +273478,7 @@ CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3
|
||||
CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000
|
||||
CVE-2024-53065,0,0,c5c6de1dc34956135702b6505991c2e7ff92bc704a59b87713633a300daa61a4,2024-11-25T21:04:38.343000
|
||||
CVE-2024-53066,0,0,0c86d7ce5fb53df5464e6f073cc19a2aa67ae25292a1f6583a1478ef90016ea3,2024-11-25T21:03:09.620000
|
||||
CVE-2024-53067,0,0,d8942bf1aa909e21d0b48cd870079e0183034b36b3a36833f5334c885e8856cb,2024-11-25T21:00:06.237000
|
||||
CVE-2024-53067,0,1,53449440d4d3a5506538aa7c05924a7362ce8c674e9a82ba91662a5e4ff45db1,2025-03-07T18:15:43.577000
|
||||
CVE-2024-53068,0,0,d5cdc1fd5d7fb0c7952a4dc84ce274e8dc2accbd15fa1ffb9e28901e55263200,2025-03-06T17:15:19.957000
|
||||
CVE-2024-53069,0,0,2f8d2bb328ae06bfbd9a5aaf3e45bed4d90c0f43106ef8f4e009f680b4cec49c,2024-11-22T22:26:20.310000
|
||||
CVE-2024-5307,0,0,5865308c4abde936d7b931374475ba3a6f8b899b5f443fa0d8a4411dbf222652,2024-11-21T09:47:24.087000
|
||||
@ -273577,7 +273586,7 @@ CVE-2024-53162,0,0,13791b79bfd48cf5f925f39149cd282969ff08c3caf8fc15af9672577fe9c
|
||||
CVE-2024-53163,0,0,ca051451cb062f472005eea53a1981cf99673d16fa9b3fbe27a6088714c52748,2025-03-06T12:42:52.363000
|
||||
CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000
|
||||
CVE-2024-53165,0,0,a4943f78f99297463146bf300537cb48a621a1dff9c540e1bec71a9d3b2949f4,2025-02-11T16:15:40.500000
|
||||
CVE-2024-53166,0,0,6b47b227a3c2839f79bbaeaa4f5e16e222ce5bbd89cad0bd429474bf1b6f91e1,2025-02-10T18:15:26.717000
|
||||
CVE-2024-53166,0,1,df1e2e2134692327c93f8c4b149b3eee4d7945b0cf559d41ecd431fd06521650,2025-03-07T18:15:43.973000
|
||||
CVE-2024-53167,0,0,cb8147677dfafa0aff01cf4cd8a22b9d4f82e5ca11b808b017228795731965bc,2024-12-27T14:15:23.820000
|
||||
CVE-2024-53168,0,0,2322d9bd473d53a376f45fd30f738149c190f220f68b45bc44ac680f0a0c5524,2025-02-10T18:15:26.970000
|
||||
CVE-2024-53169,0,0,7a8f616983e90fab9da24cf74210604a973474b01aef0abb6badfb91bb61b143,2024-12-27T14:15:24.057000
|
||||
@ -273855,7 +273864,16 @@ CVE-2024-53689,0,0,c81052a2201a68b7784830dc72b4df307cc1b4bee2584137846b27671588c
|
||||
CVE-2024-5369,0,0,24094569c799eff834c0b09794b73b042353fa6c4475620088d57da4d7d9ef43,2025-02-11T18:32:18.170000
|
||||
CVE-2024-53690,0,0,145186003a2e20e895b910273e087e978c037a99e9a7d237f6c4661d59d1c9b5,2025-01-11T13:15:26.470000
|
||||
CVE-2024-53691,0,0,513214eab0c91d88abf946e0543867be43ef7fb949d65585eb405e446f16c6c2,2024-12-06T17:15:10.520000
|
||||
CVE-2024-53692,1,1,e7b6f0970a68b26db0edb8f623e79303c70b7589422e45e9d85c96c3949c62df,2025-03-07T17:15:19.703000
|
||||
CVE-2024-53693,1,1,0c8b7c773ea858406726c78a3d643e11d705a85e394747991a0f51091c0bc5d5,2025-03-07T17:15:19.910000
|
||||
CVE-2024-53694,1,1,19626d8a352cdab22dc038dc82445b5290c0ca2962cff9dafa77dfd6a231b3ac,2025-03-07T17:15:20.103000
|
||||
CVE-2024-53695,1,1,8b522a519c4717d288d8a651a0f4c0db9daa32ae9bd73b096cd7935386d2070d,2025-03-07T17:15:20.250000
|
||||
CVE-2024-53696,1,1,6f51ce388d9177df26464b4f423029fcf484ff4c6ef94b4d155aa8131f98f20c,2025-03-07T17:15:20.390000
|
||||
CVE-2024-53697,1,1,cbd46adf64c106369b53eeef07dc70a0dfbfa1280943490c25ccaaafbe9b1679,2025-03-07T17:15:20.527000
|
||||
CVE-2024-53698,1,1,62cb554bbecd0a67fb255273993343f08a20e5f208d736bd09f22377cfe6d762,2025-03-07T17:15:20.667000
|
||||
CVE-2024-53699,1,1,c0ac6652347d2429746f5776cf8a66bc4b483105f0360a5ff94485b6cfe2dac1,2025-03-07T17:15:20.813000
|
||||
CVE-2024-5370,0,0,b1452cee20706ae85e99a41885590b1e78b1faa37e72d9c909063f8247e78007,2025-02-11T18:32:04.867000
|
||||
CVE-2024-53700,1,1,ab2019392ae9ca3e27540aec3c2e03403b33118a9bd8818e9277f924559af892,2025-03-07T17:15:20.957000
|
||||
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
|
||||
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
|
||||
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
|
||||
@ -275558,7 +275576,7 @@ CVE-2024-56618,0,0,24dc69f5038acb81c0d43fb548859cb5ae4a1aa14085271e2faac58cde3bf
|
||||
CVE-2024-56619,0,0,17b43a18083e10c744e7329bc0ede5e586834ec605148c351528783316bef618,2025-02-11T16:15:45.830000
|
||||
CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000
|
||||
CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000
|
||||
CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000
|
||||
CVE-2024-56621,0,1,9dc8625d157ca3689465a4d24b9a394084ecd0faa4a0ba0158776cdacf5ffdc8,2025-03-07T18:15:45.237000
|
||||
CVE-2024-56622,0,0,90dd041f66ad97c8c7e4424d08636d2738bbe8a14292241e2b0155ecb704e99a,2025-01-14T15:45:40.167000
|
||||
CVE-2024-56623,0,0,ea73f9992508782e28e0b2a30af559c0db5714a60552117a01fc21226146582d,2025-03-04T18:15:24.360000
|
||||
CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000
|
||||
@ -275759,7 +275777,7 @@ CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c3
|
||||
CVE-2024-56830,0,0,79c85b0b070d5536c466f2e90f00cc426f8f9dfa98d4a97719c579eb1ffbed30,2025-01-02T05:15:07.967000
|
||||
CVE-2024-5684,0,0,89fc556df6ea8323aa11fe4b3357624e27d83b832e2994b2f9ef28181d8fd16e,2024-11-21T09:48:09.440000
|
||||
CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58d56,2025-01-14T11:15:17.020000
|
||||
CVE-2024-5685,0,1,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000
|
||||
CVE-2024-5685,0,0,cf94cdf2ee4a6d1053edec6b7ac92b8a038a8a11642041da37055cde69604744,2025-03-07T14:55:48.130000
|
||||
CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000
|
||||
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
|
||||
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
|
||||
@ -276332,19 +276350,19 @@ CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6
|
||||
CVE-2024-57969,0,0,8a2052e46457143381617c41d784a01bcfd413646c5ba70b070b95c9aa759ff0,2025-02-14T07:15:32.340000
|
||||
CVE-2024-57970,0,0,4db4cc3cdc42f255941d980da801a4e2e9f8b4ba6d1c25a10de778120606a2ba,2025-02-18T17:15:19.130000
|
||||
CVE-2024-57971,0,0,19f9693c2a947ecc81adc9515f9451f49c9c0497b8a17c88b011da939c705fcc,2025-02-16T04:15:23.077000
|
||||
CVE-2024-57972,0,0,7dd207c51dc96d64f468230eb17b64271022770f03c36cdf21ceb6e2f3fa68da,2025-03-06T23:15:11.993000
|
||||
CVE-2024-57972,0,1,4fe45914cef442f475f299b5b8dde7bf05a99c90291481d796e9b55718630ff7,2025-03-07T18:15:45.673000
|
||||
CVE-2024-57973,0,0,e36dc9fa64678728c73914207d5a8e86ee42e3f3a1717f446e674959249ee4fe,2025-02-27T02:15:10.490000
|
||||
CVE-2024-57974,0,0,35099278a5a75222c052ac350d30ddc1388b2b90ab57d03eeba4eb4784ea8412,2025-02-27T02:15:10.590000
|
||||
CVE-2024-57975,0,0,5b33132c3e0a596aa8c2f854f16c6756b27eb4a5de963161bb245dbc424d5acc,2025-02-27T02:15:10.687000
|
||||
CVE-2024-57976,0,0,cd393dc40b8d12423e582db8f884621515bbb75c49217217a9b24bb6bbc79be5,2025-02-27T02:15:10.790000
|
||||
CVE-2024-57977,0,0,340c9d9f3586b17ef0c804662294da979a8f487352699035de550514b6c37f4d,2025-02-27T13:15:11.053000
|
||||
CVE-2024-57977,0,1,7762667a49c4712a83b3925e1c38afb659ab9b9a897f8ddfc93f62a4ee9c71f0,2025-03-07T18:15:45.997000
|
||||
CVE-2024-57978,0,0,13850e6be331eb8920e3b1fa793d232603e7cba4948085d02e654385d67e18f4,2025-02-27T02:15:10.990000
|
||||
CVE-2024-57979,0,0,247c71180b1386a73fd18f501f906e3c66e5701cbb7d78cc1a94b523b65646c3,2025-02-27T19:15:49.077000
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
CVE-2024-57980,0,0,10c77fb6a23488df204986089ebb05944e9c0539ba2e4d3b8fea5d9e62a33d18,2025-02-27T02:15:11.190000
|
||||
CVE-2024-57981,0,0,fbe4596ca1659d1f1535e051341d9dd959da8b084629b20d7a744f55f9a6187c,2025-02-27T02:15:11.293000
|
||||
CVE-2024-57982,0,1,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57983,0,1,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57982,0,0,490f74530e93af156713a3d5360f9a59c952f152b0869987ffac7d4c37e15d8a,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57983,0,0,7237a86796d472f35afcb577e9f776a88b42e6b63fa54b7c98922eed4d433b93,2025-03-07T15:07:16.373000
|
||||
CVE-2024-57984,0,0,8d932de528b27597f8b2459d4547d4de5bfbfef86e97bd720b3d4fbdfb1f4caa,2025-02-27T18:15:27.460000
|
||||
CVE-2024-57985,0,0,e414824130c550f59cb927c31a17d568d9fd37b831c85e3f693e204fc39a024d,2025-02-27T02:15:11.703000
|
||||
CVE-2024-57986,0,0,4458702f5a079e9d22246b771dae79c2d19094788d6b9e6459374e549d8f71b1,2025-02-27T02:15:12.597000
|
||||
@ -276365,10 +276383,10 @@ CVE-2024-57999,0,0,192cd62115ee0eebfc0e3194a10d118c6cde7d7dffe718c35de3e7f488afc
|
||||
CVE-2024-5800,0,0,ee30c93c9e24a52f4a9c5cf5ce5afed2bf419d548311799a41776eadbe274015,2024-08-12T13:41:36.517000
|
||||
CVE-2024-58000,0,0,9bead4c6f4a6e6b0b3e4ccb9dcb95d8e89506cd6b149e93be860b24427528e09,2025-02-27T02:15:14.033000
|
||||
CVE-2024-58001,0,0,062b95b71d62b8392e7dec859d235ae0235da3e946e47b40e89a8df2d660fc6c,2025-02-27T03:15:11.080000
|
||||
CVE-2024-58002,0,0,8e8852dd697e5e3716cfa9f1993a71241026eb80957adf43243b6e6532856287,2025-03-06T12:42:22.567000
|
||||
CVE-2024-58002,0,1,29cfe2a7ef092142b0779c922fa8565123f09a5865c52e691d5eb135f1e80a5c,2025-03-07T18:15:46.417000
|
||||
CVE-2024-58003,0,0,d63162215e1a5dbdf2f26a3a80f9f12faed3d9c520fa6be1ac27c057f67243cd,2025-02-27T03:15:11.277000
|
||||
CVE-2024-58004,0,0,68844712d1835a2f20b5302361ac491d98dd1a1f13907be2f39c078787a0c250,2025-02-27T03:15:11.380000
|
||||
CVE-2024-58005,0,0,1395e55c0601825a9bf63d4a1f6b18315e7cffca113c9765a19b51b299c5c98c,2025-03-06T12:42:22.567000
|
||||
CVE-2024-58005,0,1,dd8a054e5a1adae6fe62574360af2fd4fda6aa17a2196d019e7e8a84626e8220,2025-03-07T18:15:46.880000
|
||||
CVE-2024-58006,0,0,99bcd7c70bad6c86d4a686c41e032b597709b74aa5784099886d83704a9dc686,2025-02-27T03:15:11.583000
|
||||
CVE-2024-58007,0,0,67d1a33387f15c92a6fa64adac47eabb908d372f8ed57c978a5e97a65ff756f2,2025-03-07T12:30:28.963000
|
||||
CVE-2024-58008,0,0,83bb44015382c711e9fe765b2c4558ae62041f53545addc939db33a1da1a9569,2025-02-27T03:15:11.780000
|
||||
@ -276431,7 +276449,7 @@ CVE-2024-58075,0,0,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8
|
||||
CVE-2024-58076,0,0,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000
|
||||
CVE-2024-58077,0,0,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000
|
||||
CVE-2024-58078,0,0,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,0,0,579d9d645c94a89400ca687a17c00a8eeebf4813296e5c52f584eb6e27eeb15c,2025-03-06T17:15:21.360000
|
||||
CVE-2024-58079,0,1,0489bcb218c455f1fe45767363ca697b65c94ba3e6d21a28867c0f2c4f081c72,2025-03-07T18:15:47.040000
|
||||
CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000
|
||||
CVE-2024-58080,0,0,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000
|
||||
CVE-2024-58081,0,0,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000
|
||||
@ -276920,8 +276938,8 @@ CVE-2024-6312,0,0,0c54128647e80712d90400a801d9880628c2b1741704a31bdedfcfd80d65d9
|
||||
CVE-2024-6313,0,0,753b75f17a3f3ec57fe609d32a2c3aa9af71672c8858deefb2e7f96177c2545e,2024-11-21T09:49:24.717000
|
||||
CVE-2024-6314,0,0,bd7e8659eda4fe06384f4f5f59a460bbcd88d9b591229c72a52e844ac7b92683,2024-11-21T09:49:24.830000
|
||||
CVE-2024-6315,0,0,ef1ce4f4ba0131e5f3eff0f1603994118387c059d09ece1613d98d76d07a486a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6316,0,0,dd5a7dd268e619a2a79f0d5718ea91d75fbeba4b5152ec168f19761208d9caa9,2024-11-21T09:49:25.057000
|
||||
CVE-2024-6317,0,0,846f051ba490361012a7c77e289350543883b1aea51b3744cef7ebcf4b6a805a,2024-11-21T09:49:25.173000
|
||||
CVE-2024-6316,0,1,69192392c6338c8c254e87dc6cb05eac671f91e204156470f8709f599ad92392,2025-03-07T16:48:11.150000
|
||||
CVE-2024-6317,0,1,4e9bf276b111e8fe4e09ea1baea460f987704c5f04431089d0e65ac871f8848c,2025-03-07T16:48:11.150000
|
||||
CVE-2024-6318,0,0,5f106f35b92dd631584d337f663b474255ddd50a7f1f8610056f45ebe6db8c5a,2024-11-21T09:49:25.283000
|
||||
CVE-2024-6319,0,0,8b351291dae58ab1dd68bad56bbe84e03e46abfdf9784d16d4a3cf75ceba1734,2024-11-21T09:49:25.423000
|
||||
CVE-2024-6320,0,0,b473609913519a737186d8d4224686486fd33ffcfab73ef05e3c3cf037998af4,2024-11-21T09:49:25.550000
|
||||
@ -279451,7 +279469,7 @@ CVE-2024-9217,0,0,d1ff435c5595bb5222d4a67f05c9f87d65968195a4e698a4d45bfa8f71da8a
|
||||
CVE-2024-9218,0,0,3e9e93d40399068fe8497977cf42e89fb035477452b8eedfd6d58349736e7c60,2024-10-08T15:33:58.617000
|
||||
CVE-2024-9219,0,0,e36d33f23e5166380f66964e4e558f56127e51ae2d590180013188029e3ada94,2024-11-01T17:30:52.750000
|
||||
CVE-2024-9220,0,0,e094e9fd496c7383a53604aa4a021704b589f47e6d5cea1f4799ac615a18989c,2024-10-07T19:19:59.487000
|
||||
CVE-2024-9221,0,1,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000
|
||||
CVE-2024-9221,0,0,7485bc1fd58b0d380da44377617769b9459fe79cfa29f70c2ada50ea7af841fc,2025-03-07T14:55:48.130000
|
||||
CVE-2024-9222,0,0,a4a3a09199c7d8b09b4738998d8104dbe367bbcd208fb9266439d154c7f5ddaa,2024-10-08T15:34:13.250000
|
||||
CVE-2024-9223,0,0,34caff13ef1092c98bf872963a60e7b0f874ac576cd17eef87075b656fb0164c,2024-11-23T04:15:10.037000
|
||||
CVE-2024-9224,0,0,39d8d5cb3a7793ab0481956574ccd81167c7fcdc46c2c7fe36e709b73a8dce1c,2024-10-07T19:19:38.157000
|
||||
@ -279645,7 +279663,7 @@ CVE-2024-9454,0,0,4cfd8c9859408ba78039f10d28df6e1d2294fdb1d97b8a1f2d893fd722a84b
|
||||
CVE-2024-9455,0,0,70eeb7921ee78f299c01776fe53c55197cf0553da95f449adab4e5d1eea63401,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9456,0,0,b03c9a73b6e647ff0388281429dea3f2c132c7dea689a2671a1020405e57dd58,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9457,0,0,237bf133deeeb6ce22bd7cb82b0da8d260edebfa1038d864508e5e70f23de04e,2024-10-15T14:23:57.307000
|
||||
CVE-2024-9458,0,1,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000
|
||||
CVE-2024-9458,0,0,b1ee4ad35f94de3244a8bf2a49032983f98b41209b62ed79f8005e5107709ed5,2025-03-07T15:15:14.370000
|
||||
CVE-2024-9459,0,0,b5f8918700d9fe4520a35b012c84c07b7eef34f306e657c26f87c88066e73f05,2024-11-06T15:29:04.917000
|
||||
CVE-2024-9460,0,0,a4133ee84221254d0c0b2ee042e3007266c6114612acf7d4db07e6602d682abe,2024-10-08T14:33:42.703000
|
||||
CVE-2024-9461,0,0,7d9c91cbe544cc2689e175f532112ea98289124a3780c869e31650a971e49d9c,2024-11-26T14:15:22.533000
|
||||
@ -280162,6 +280180,7 @@ CVE-2025-0158,0,0,9c1de144d1a0a3d7e92dd988e0992691cec26ba223fe44dad9f5ed52755dc2
|
||||
CVE-2025-0159,0,0,da072f8e2bfae3faad56b7993bdef58007c1768b134558714a537dfc9135c68d,2025-02-28T19:15:36.243000
|
||||
CVE-2025-0160,0,0,56a2c0b88768866a06a1cafe52553211de3c4fe7f1bdd2a1b69e2c78efb329c1,2025-02-28T19:15:36.393000
|
||||
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
|
||||
CVE-2025-0162,1,1,c98031bc8c519f3da09a456385ae46f1f328a956c39e6c9186405a6de7ba8344,2025-03-07T17:15:21.110000
|
||||
CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000
|
||||
CVE-2025-0168,0,0,a3bb306c5c1038cf3ae7cdc9fefc0119ef962391dad7848c675894c708a175c1,2025-02-25T21:26:07.113000
|
||||
CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000
|
||||
@ -280771,7 +280790,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4
|
||||
CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000
|
||||
CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000
|
||||
CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000
|
||||
CVE-2025-1121,0,0,cc85dfaa58aa2a031948199f09d77c3f144cca76d8fe4709dc2255cf56107e73,2025-03-07T02:15:37.977000
|
||||
CVE-2025-1121,0,1,ec35ef5cdd68bac1ff15ee1e7299eb21916b54df11c1a13087054f4fb359a391,2025-03-07T18:15:47.253000
|
||||
CVE-2025-1125,0,0,2f04992a8811506ffd86df04ce8fd4c4eaf818b2350c9b37d99c1e9008bb7d98,2025-03-05T21:15:19.707000
|
||||
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
|
||||
CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000
|
||||
@ -281358,7 +281377,7 @@ CVE-2025-2084,0,0,7b68ef2309ccccd38242c33dc15a6f85d87d16ae9a52fb77acbab191d667e8
|
||||
CVE-2025-2085,0,0,191ae6560abe8476fe190d0474dcec83084d054bdfc1b3da1737410b52c6b5f9,2025-03-07T12:15:35.270000
|
||||
CVE-2025-2086,0,0,03ab66f16f90758422ca1b2a306b10532564ca7b41e17c4b9e6b45a241d05c69,2025-03-07T14:15:37.850000
|
||||
CVE-2025-2087,0,0,da0156308f250ed3b2cd7612b4a09c33ec03dcbe2c48f8610824a778230f2c43,2025-03-07T14:15:38.030000
|
||||
CVE-2025-2088,1,1,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000
|
||||
CVE-2025-2088,0,0,0548f85c9680431b0dde77f3ce7a0f19b9f4d6d07fa41df403d9d61495e2389f,2025-03-07T15:15:14.833000
|
||||
CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000
|
||||
CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000
|
||||
CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000
|
||||
@ -281368,7 +281387,7 @@ CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0f
|
||||
CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000
|
||||
CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000
|
||||
CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000
|
||||
CVE-2025-2089,1,1,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000
|
||||
CVE-2025-2089,0,0,ebfd50127f55f0a904b02974590439eb399e6e16dfcbc092f5945cf0ebf1ebad,2025-03-07T15:15:15.033000
|
||||
CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000
|
||||
CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000
|
||||
CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000
|
||||
@ -281379,7 +281398,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9
|
||||
CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000
|
||||
CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000
|
||||
CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000
|
||||
CVE-2025-2090,1,1,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000
|
||||
CVE-2025-2090,0,0,1a751e2a92bcfb84b5f4eaeea70a7efe108274143a5867bde428982870b7d504,2025-03-07T15:15:15.220000
|
||||
CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000
|
||||
CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000
|
||||
CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000
|
||||
@ -281605,7 +281624,7 @@ CVE-2025-21329,0,0,981c92b2418e9fc608fe5f0e4736606b39274ac7e94c0f92045bfd4fcbd70
|
||||
CVE-2025-21330,0,0,630a00257c77e08d68c8ee0fddc53011d52b9c8247b0bd6fa5d0f2ffb1bc0037,2025-01-21T20:04:19.400000
|
||||
CVE-2025-21331,0,0,ccad9675417e0dde69b86789c97697f2c4d8ee1cd0a2974500669089590e694d,2025-01-21T19:58:20.833000
|
||||
CVE-2025-21332,0,0,edf859babd061219cc1cce3d52c09e668a5e0f31058bfea0e2ae4470ea2b16a4,2025-01-21T19:57:17.993000
|
||||
CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca8e6,2025-01-15T20:57:37.467000
|
||||
CVE-2025-21333,0,1,37aa092b6c47c28ac440d43eef0284776444e111ad1ea71f754dceacd19a2263,2025-03-07T17:15:21.473000
|
||||
CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000
|
||||
CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000
|
||||
CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000
|
||||
@ -281872,7 +281891,7 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1
|
||||
CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000
|
||||
CVE-2025-21700,0,0,3fc056d46af8f0b78d97452f108ed5d658c922ab699c8a2bb43cbeaf9fbd76c6,2025-02-21T14:15:54.717000
|
||||
CVE-2025-21701,0,0,d7c054d565dcf2a6e8d7012de1892a0a2fe63adaff9755c9d55124b93699efd4,2025-02-21T14:15:55.747000
|
||||
CVE-2025-21702,0,0,d363aa73cef2e84d05fef6ef479e127c11617ea6c3706bfabd35a9d26103dec7,2025-02-18T15:15:18.530000
|
||||
CVE-2025-21702,0,1,295a0e49717454cc39c315053488b66f87a86e159e62fafe9cfc381cb821411c,2025-03-07T18:15:47.370000
|
||||
CVE-2025-21703,0,0,1b70a75eeb992a0cedbee9d2af799a85c7fa5ad6d64038ed6ea31d816ef224ad,2025-02-21T14:15:56.627000
|
||||
CVE-2025-21704,0,0,9a86e02d9fb8c5baad271d9c9853ec1586b3eb8ed9ce0a3de54fa8b76bfb26a0,2025-02-22T10:15:11.263000
|
||||
CVE-2025-21705,0,0,2467d79f909fb2b3c476b851a8fb43c3d27c899ca736969d71f4984f2c4ea275,2025-02-27T02:15:14.137000
|
||||
@ -281882,7 +281901,7 @@ CVE-2025-21708,0,0,70bef15eb629c71a7c7afc009d0349c18f7b5709bb6199a7d97913b37e48b
|
||||
CVE-2025-21709,0,0,44d922fbf11b96fa3e8079490f77a83bf9c187d3dfdbafefd95f19de9384caca,2025-02-27T02:15:14.560000
|
||||
CVE-2025-21710,0,0,ad1ac658b3da7bd5fe6c6ae0ece92eb2ca2472ae6a28a64d02e88b70117f1cab,2025-02-27T02:15:14.657000
|
||||
CVE-2025-21711,0,0,cf13ec528d96da9ae0e87fafb4c97741efa997ed948d0a3082efb2148163b1a3,2025-03-07T12:30:28.963000
|
||||
CVE-2025-21712,0,0,3ecca46cce58c37600e18eb395369b792d056c177c4e0245142c917aeb36341c,2025-02-27T13:15:12.043000
|
||||
CVE-2025-21712,0,1,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000
|
||||
CVE-2025-21713,0,0,7c581c2faa371aaa484ee1f08d6f34bd30d17480a8c9dcbd1ac4ebd0bef8b279,2025-03-07T12:30:28.963000
|
||||
CVE-2025-21714,0,0,b84f2d3cd3971aa8d897029bf67e816ffa7bfda27b2568647ef8ebb4293771b1,2025-02-27T19:15:49.637000
|
||||
CVE-2025-21715,0,0,ef47aa883e62901a193ae5a74d7d9fdf8a378adb5672814422ac32cf6dd0950f,2025-02-27T18:15:28.153000
|
||||
@ -282008,7 +282027,7 @@ CVE-2025-21834,0,0,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32c
|
||||
CVE-2025-21835,0,0,78792f5e0a0fc396121255e44d86498bf71f7b17f11fbf08ffdd550ea81440ba,2025-03-07T09:15:16.473000
|
||||
CVE-2025-21836,0,0,0c96d33aa4ba09e5132941f84daaf21d3a8de4d459f5c3f80ca7fb04c000f41f,2025-03-07T09:15:16.600000
|
||||
CVE-2025-21837,0,0,d71f7670b9f3de6bab1a766e0565d97c4b19cdacaebfbf655b97ae2c2428104f,2025-03-07T09:15:16.710000
|
||||
CVE-2025-21838,0,0,3c5f0d4f5a33bb974046ee4a47234b3fde861634a7fd92368e8aa2916a376fa0,2025-03-07T09:15:16.810000
|
||||
CVE-2025-21838,0,1,c3ce5f80630165d59b68bdf67b00f3ac2acff4fb25dc7c433d137ffea7bbff7b,2025-03-07T18:15:47.713000
|
||||
CVE-2025-21839,0,0,73960dd2df31123c2ce4caa2af112eb496473962b756cba9905bed564b371cfc,2025-03-07T09:15:16.923000
|
||||
CVE-2025-21840,0,0,f7a54e15cb3fc24ad92d37cb06eba5f72f4005541c2a332b47cf70e0a8758a64,2025-03-07T09:15:17.033000
|
||||
CVE-2025-21841,0,0,9c7a1022d9f429220d2416fff9a1e040611d0aac489e05d5f694d8a693548a17,2025-03-07T09:15:17.137000
|
||||
@ -283850,9 +283869,9 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed
|
||||
CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000
|
||||
CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
|
||||
CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000
|
||||
CVE-2025-25450,0,0,aa4833b6644c3dd5960a0ce2b32c1809568594c111878547965e7753c3a3e64d,2025-03-06T15:15:17.443000
|
||||
CVE-2025-25451,0,0,9a00d9588ff78fdad113f032ac06c8c05ea1e58a9277ce3535667ac0c4e0fc27,2025-03-06T15:15:17.553000
|
||||
CVE-2025-25452,0,0,7cbb267f940e24fd6826e8276f8a69f8095a90b9586be4c674267b8cf033d3b6,2025-03-06T15:15:17.667000
|
||||
CVE-2025-25450,0,1,69c0e66b5259cd848a36ee3387e165b3c13a6a4ba2233dfb5d5ef1991e65c690,2025-03-07T17:15:21.640000
|
||||
CVE-2025-25451,0,1,718dba12e459406ad47aed831fc7ed49761e2789191f94dd42a964acf6eab8d8,2025-03-07T17:15:21.803000
|
||||
CVE-2025-25452,0,1,db97c2b1a3f3fe6a0b532c32e3b1c28c0459e3ade994dc2ef24db5bea6bd3c1d,2025-03-07T17:15:21.947000
|
||||
CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000
|
||||
CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000
|
||||
CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000
|
||||
@ -283893,7 +283912,7 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
|
||||
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
||||
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
||||
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
|
||||
CVE-2025-25617,1,1,865fa4993189a6053ac23342f82c40fff5f1cf19a2ef6e091748583a81dd852b,2025-03-07T16:15:38.543000
|
||||
CVE-2025-25617,0,1,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
|
||||
CVE-2025-25632,0,0,7dacee11e3645b17a5a04a9c8cd5acdf943b0647af485c0987bb165d9f51ee57,2025-03-06T15:15:17.770000
|
||||
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
|
||||
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
|
||||
@ -284024,7 +284043,7 @@ CVE-2025-26319,0,0,b693e9be38e2c2e1c98c9a9c68219b86fe3a90d7ef0a9c1425a2433258c4a
|
||||
CVE-2025-26320,0,0,fdfa40052a1864e61bdcfc38c985db8dee7e348311a9618bd9822986243ad3fb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,015f4df5331674f2678365c0d4c9145e7992324ba34e01b6f1be910177ce0e28,2025-03-06T21:15:15.780000
|
||||
CVE-2025-26331,0,1,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000
|
||||
CVE-2025-26331,0,0,dac072ba2e03b0a64a8609ab5e1372ab8c083eefeb77431fa333abda188a4d8b,2025-03-07T16:15:38.650000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
|
||||
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
|
||||
@ -284306,7 +284325,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75
|
||||
CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
|
||||
CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000
|
||||
CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000
|
||||
CVE-2025-27152,1,1,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000
|
||||
CVE-2025-27152,0,0,d0d2d2d24ad7b4e0caca90fc090d7cc1f25764802559688932f5bea57835f97e,2025-03-07T16:15:38.773000
|
||||
CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000
|
||||
CVE-2025-27155,0,0,8a0e601ceb27497cf7a66896d5e2c5f04b5e8b322c82c3595db95b037f519055,2025-03-04T17:15:18.833000
|
||||
CVE-2025-27156,0,0,1485b83b5322898adfd8e07dd039704042cc58265ec55120e3be69d8d2592fdc,2025-03-04T17:15:18.997000
|
||||
@ -284377,8 +284396,8 @@ CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b
|
||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27370,0,0,cb1da8898ee5a31817ad922078eead78a820d1050fd07cee6c6cb22d7a73a529,2025-03-03T19:15:35.717000
|
||||
CVE-2025-27371,0,0,faee6e4ab8c9b25a7425e6e20b19acd9e485a3c93dbbf835a72dad70fe8350fe,2025-03-03T19:15:35.843000
|
||||
CVE-2025-27370,0,1,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
|
||||
CVE-2025-27371,0,1,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
|
||||
CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000
|
||||
CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000
|
||||
CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000
|
||||
@ -284407,15 +284426,15 @@ CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2
|
||||
CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27506,0,0,8313f9e93dd55499421f598ef258d63dd49365e5994019d7f3a4774aaadb291a,2025-03-06T19:15:27.833000
|
||||
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
|
||||
CVE-2025-27508,0,0,021b134ab746fdb21c1b6afba20d8b4449f142dd50a7aeaf2a0e333d5dbea12b,2025-03-05T22:15:35.867000
|
||||
CVE-2025-27508,0,1,6296c41bdf17b79783782f3620ad94a749ef956bf3a0c0cbdee8ca138d0376e6,2025-03-07T18:15:48.033000
|
||||
CVE-2025-27509,0,0,717db0d8d3de1a389b101d9ff9200fdda3ba763adad4feb3ab4fe65755010e9d,2025-03-06T19:15:27.973000
|
||||
CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000
|
||||
CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
|
||||
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
|
||||
CVE-2025-27516,0,0,3862b236c9bd822d3bd7d4f357e71b38a9cc2e829687506224da1cef67505a80,2025-03-05T21:15:20.073000
|
||||
CVE-2025-27517,0,0,86211d558401c5bac3e8c061603685c63c2eee6ad13c5d3a3870a4b45c7a3d47,2025-03-05T20:16:05.960000
|
||||
CVE-2025-27518,1,1,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000
|
||||
CVE-2025-27519,1,1,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000
|
||||
CVE-2025-27518,0,0,c0a5c03388515515f89304dc631d73adeaa064c4e99398ef416f6d89d4db2f92,2025-03-07T16:15:39.187000
|
||||
CVE-2025-27519,0,0,9303b16f368a8bf8cdfadda9189e3ee8aac21e1a21d50ec46f22124d5459d1fa,2025-03-07T16:15:39.623000
|
||||
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
|
||||
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
|
||||
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
|
||||
@ -284423,10 +284442,12 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17
|
||||
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
|
||||
CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000
|
||||
CVE-2025-27597,1,1,6cd2d27e6f70c8b8dc560cd90930a7c6cca00c2cfb8b49c56b00236be1fb725c,2025-03-07T16:15:39.893000
|
||||
CVE-2025-27597,0,1,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000
|
||||
CVE-2025-27598,0,0,d2c5c2693a9de5786fd83ab9383213352b59e0b62bd0678134b8bb8975df0743,2025-03-06T23:15:12.183000
|
||||
CVE-2025-27600,0,0,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000
|
||||
CVE-2025-27603,1,1,f47d7ab377c12d55b3fa6ae6bb3381884e202826994bb1575cdd6dffba4dc2d5,2025-03-07T16:15:40.037000
|
||||
CVE-2025-27603,0,1,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
|
||||
CVE-2025-27604,1,1,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
|
||||
CVE-2025-27607,1,1,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
|
||||
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||
@ -284480,6 +284501,6 @@ CVE-2025-27682,0,0,713cee0b616020a8bc632e52123afbde5abe74b25723c76da89c300b1c3dc
|
||||
CVE-2025-27683,0,0,5e723b97c48452065d8f21c52ed204d91618851b4da4b5c4ecec5381466f1b3b,2025-03-05T21:15:23.060000
|
||||
CVE-2025-27684,0,0,da0fb326353cdf6531a963fb000bd170efcc1fb5ae72750473b8f48179f77ae5,2025-03-05T21:15:23.197000
|
||||
CVE-2025-27685,0,0,7cac136abd1f6cc9c1c15290fa182233a8c7da8b4083786741590dd32acfb0b7,2025-03-05T21:15:23.337000
|
||||
CVE-2025-27795,0,1,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000
|
||||
CVE-2025-27796,0,1,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000
|
||||
CVE-2025-27795,0,0,c7dabb25f253e0055b92ea3e17c3811739473ec1a44771e3482efbaeb156c532,2025-03-07T16:15:40.187000
|
||||
CVE-2025-27796,0,0,d52446c86e3d377f3f8ac29de7ee02aa94f6c961aa989c3f13a6b711d8b21bb8,2025-03-07T16:15:40.287000
|
||||
CVE-2025-27816,0,0,5b2e23c42ea7b22c782ca4f40314ad964756890209d1d752208955d5f400b7bd,2025-03-07T08:15:44.527000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user