mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-28T16:05:42.333138+00:00
This commit is contained in:
parent
a6fe392ac3
commit
af73869ac3
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-10271",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2017-10-19T17:29:01.747",
|
||||
"lastModified": "2024-11-21T03:05:47.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:28:27.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-12149",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2017-10-04T21:01:00.180",
|
||||
"lastModified": "2024-11-21T03:08:56.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:28:21.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2017-20196",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-26T18:15:27.443",
|
||||
"lastModified": "2025-01-26T18:15:27.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:08.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Itechscripts School Management Software 2.75. It has been classified as critical. This affects an unknown part of the file /notice-edit.php. The manipulation of the argument aid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en Itechscripts School Management Software 2.75. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /notice-edit.php. La manipulaci\u00f3n del argumento aid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/41034/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/41034",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-5070",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2017-10-27T05:29:00.847",
|
||||
"lastModified": "2024-11-21T03:26:59.100",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:28:33.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-6327",
|
||||
"sourceIdentifier": "secure@symantec.com",
|
||||
"published": "2017-08-11T20:29:00.207",
|
||||
"lastModified": "2024-11-21T03:29:34.190",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:28:15.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-9822",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2017-07-20T12:29:00.233",
|
||||
"lastModified": "2024-11-21T03:36:55.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:06:15.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-2380",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2018-03-01T17:29:00.413",
|
||||
"lastModified": "2024-11-21T04:03:42.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:28:44.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-21731",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2021-04-13T16:15:12.513",
|
||||
"lastModified": "2024-11-21T05:48:53.910",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,9 +86,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.03.04",
|
||||
"matchCriteriaId": "652DD454-0693-4A0A-BAA5-A4905146B41D"
|
||||
"matchCriteriaId": "9EFAC29A-DE5B-42C6-9A48-8AE6419DB37C"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -98,8 +98,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4008",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2023-05-10T06:15:09.000",
|
||||
"lastModified": "2024-11-21T07:34:26.293",
|
||||
"lastModified": "2025-01-28T15:15:09.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22361",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:10.800",
|
||||
"lastModified": "2024-11-21T07:44:38.030",
|
||||
"lastModified": "2025-01-28T15:15:09.247",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22441",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:11.160",
|
||||
"lastModified": "2024-11-21T07:44:48.567",
|
||||
"lastModified": "2025-01-28T15:15:09.467",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23901",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:11.727",
|
||||
"lastModified": "2024-11-21T07:47:03.867",
|
||||
"lastModified": "2025-01-28T15:15:09.657",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24586",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:12.310",
|
||||
"lastModified": "2024-11-21T07:48:11.063",
|
||||
"lastModified": "2025-01-28T15:15:09.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25070",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:12.497",
|
||||
"lastModified": "2024-11-21T07:49:02.733",
|
||||
"lastModified": "2025-01-28T15:15:10.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25072",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.030",
|
||||
"lastModified": "2024-11-21T07:49:02.997",
|
||||
"lastModified": "2025-01-28T15:15:10.233",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25184",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.427",
|
||||
"lastModified": "2024-11-21T07:49:16.303",
|
||||
"lastModified": "2025-01-28T15:15:10.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25648",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-12-14T07:15:07.180",
|
||||
"lastModified": "2024-11-21T07:49:51.883",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.21",
|
||||
"matchCriteriaId": "7D77687B-1273-46FC-8753-F7D351F3A9A3"
|
||||
"matchCriteriaId": "497C2303-E079-4E7B-B9F4-F8720ACA2A7C"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25650",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-12-14T07:15:07.783",
|
||||
"lastModified": "2024-11-21T07:49:52.140",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.30",
|
||||
"matchCriteriaId": "07F5720E-BB8D-4E13-B24B-A5C61E435BDC"
|
||||
"matchCriteriaId": "66470CAB-0FEF-44FD-8158-5A37238C3BAA"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27385",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.680",
|
||||
"lastModified": "2024-11-21T07:52:48.053",
|
||||
"lastModified": "2025-01-28T15:15:10.607",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27510",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.807",
|
||||
"lastModified": "2024-11-21T07:53:03.877",
|
||||
"lastModified": "2025-01-28T15:15:10.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27527",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.953",
|
||||
"lastModified": "2024-11-21T07:53:06.160",
|
||||
"lastModified": "2025-01-28T15:15:10.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41776",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-01-03T02:15:42.993",
|
||||
"lastModified": "2024-11-21T08:21:40.043",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.32",
|
||||
"matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC"
|
||||
"matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41779",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-01-03T02:15:43.217",
|
||||
"lastModified": "2024-11-21T08:21:40.183",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.32",
|
||||
"matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC"
|
||||
"matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41780",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-01-03T02:15:43.403",
|
||||
"lastModified": "2024-11-21T08:21:40.320",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.32",
|
||||
"matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC"
|
||||
"matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41782",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-01-05T02:15:07.147",
|
||||
"lastModified": "2024-11-21T08:21:40.590",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.30",
|
||||
"matchCriteriaId": "07F5720E-BB8D-4E13-B24B-A5C61E435BDC"
|
||||
"matchCriteriaId": "66470CAB-0FEF-44FD-8158-5A37238C3BAA"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41783",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-01-03T02:15:43.573",
|
||||
"lastModified": "2024-11-21T08:21:40.743",
|
||||
"lastModified": "2025-01-28T15:36:03.663",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,9 +91,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.32",
|
||||
"matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC"
|
||||
"matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -103,8 +103,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C"
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96352962-7748-44B8-9490-B95202771469"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
149
CVE-2024/CVE-2024-119xx/CVE-2024-11954.json
Normal file
149
CVE-2024/CVE-2024-119xx/CVE-2024-11954.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2024-11954",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-28T14:15:29.070",
|
||||
"lastModified": "2025-01-28T15:15:11.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"baseScore": 3.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xr3m-6gq6-22cg",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.293905",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.293905",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.451774",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xr3m-6gq6-22cg",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.451774",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2024/CVE-2024-119xx/CVE-2024-11956.json
Normal file
149
CVE-2024/CVE-2024-119xx/CVE-2024-11956.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2024-11956",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-28T14:15:29.803",
|
||||
"lastModified": "2025-01-28T14:15:29.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Pimcore customer-data-framework up to 4.2.0. Affected by this issue is some unknown functionality of the file /admin/customermanagementframework/customers/list. The manipulation of the argument filterDefinition/filter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/customer-data-framework/releases/tag/v4.2.1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-q53r-9hh9-w277",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.293906",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.293906",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.451863",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-q53r-9hh9-w277",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22062",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2024-07-09T07:15:03.157",
|
||||
"lastModified": "2024-11-21T08:55:29.160",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-28T15:29:07.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.3
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.23.40",
|
||||
"matchCriteriaId": "FC098522-79A9-4B6F-A851-D0BF87A783D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1036204",
|
||||
"source": "psirt@zte.com.cn"
|
||||
"source": "psirt@zte.com.cn",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1036204",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23591",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-02-16T17:15:08.800",
|
||||
"lastModified": "2024-11-21T08:57:58.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-28T14:28:25.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,64 @@
|
||||
"value": "CWE-1269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "u8e126i-2.20",
|
||||
"matchCriteriaId": "3AA53CBF-969A-44F9-9514-6198FEB20636"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E97E5B4D-0E6F-49B0-8466-54A818517965"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://support.lenovo.com/us/en/product_security/LEN-150020",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://https://support.lenovo.com/us/en/product_security/LEN-150020",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23953",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-01-28T09:15:09.187",
|
||||
"lastModified": "2025-01-28T09:15:09.187",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:11.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "Use of Arrays.equals() in LlapSignerImpl in\u00a0Apache Hive to compare message signatures\u00a0allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack.\u00a0Users are recommended to upgrade to version 4.0.0, which fixes this issue.\n\nThe problem occurs when an application doesn\u2019t use a constant-time algorithm for validating a signature.\u00a0The method Arrays.equals()\u00a0returns false\u00a0right away when it sees that one of the input\u2019s bytes are different. It means that the comparison time depends on the contents of the arrays. This little thing may allow an attacker to forge a valid signature for an arbitrary message byte by byte.\u00a0So it might allow malicious users to submit splits/work with selected signatures to LLAP without running as a privileged user, potentially leading to DDoS attack.\n\nMore details in the reference section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
@ -22,6 +45,16 @@
|
||||
"value": "CWE-208"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54478",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:12.377",
|
||||
"lastModified": "2025-01-27T22:15:12.377",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:11.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de acceso a fuera de los l\u00edmites mejorando la verificaci\u00f3n de l\u00edmites. Este problema se solucion\u00f3 en iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sonoma 14.7.2 y macOS Sequoia 15.2. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54507",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:12.777",
|
||||
"lastModified": "2025-01-27T22:15:12.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:11.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An attacker with user privileges may be able to read kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Un atacante con privilegios de usuario podr\u00eda leer la memoria del n\u00facleo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54518",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:13.260",
|
||||
"lastModified": "2025-01-27T22:15:13.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:11.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-54519",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:13.367",
|
||||
"lastModified": "2025-01-27T22:15:13.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:12.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was resolved by sanitizing logging. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to read sensitive location information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se resolvi\u00f3 con el registro de desinfectando. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2 y macOS Sequoia 15.2. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121839",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-54523",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:13.660",
|
||||
"lastModified": "2025-01-27T22:15:13.660",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:12.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-54539",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.037",
|
||||
"lastModified": "2025-01-27T22:15:14.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:12.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to capture keyboard events from the lock screen."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda capturar eventos del teclado desde la pantalla de bloqueo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121839",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54542",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.217",
|
||||
"lastModified": "2025-01-27T22:15:14.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:12.477",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authentication issue was addressed with improved state management. This issue is fixed in Safari 18.2, macOS Sequoia 15.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2. Private Browsing tabs may be accessed without authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en Safari 18.2, macOS Sequoia 15.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2. Se puede acceder a las pesta\u00f1as de Navegaci\u00f3n privada sin autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121837",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-55195",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T22:15:14.690",
|
||||
"lastModified": "2025-01-23T22:15:14.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:12.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,50 @@
|
||||
"value": "Un error de tama\u00f1o de asignaci\u00f3n demasiado grande en el componente /imagebuf.cpp de OpenImageIO v3.1.0.0dev puede provocar una denegaci\u00f3n de servicio (DoS) cuando el programa solicita asignar demasiado espacio."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-63xx/CVE-2024-6351.json
Normal file
90
CVE-2024/CVE-2024-63xx/CVE-2024-6351.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-6351",
|
||||
"sourceIdentifier": "product-security@silabs.com",
|
||||
"published": "2025-01-28T14:15:30.007",
|
||||
"lastModified": "2025-01-28T14:15:30.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A malformed packet can cause a buffer overflow in the NWK/APS layer of the Ember ZNet stack and lead to an assert"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.silabs.com/069Vm00000HtvDgIAJ",
|
||||
"source": "product-security@silabs.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SiliconLabs/simplicity_sdk/releases",
|
||||
"source": "product-security@silabs.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-78xx/CVE-2024-7881.json
Normal file
21
CVE-2024/CVE-2024-78xx/CVE-2024-7881.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-7881",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2025-01-28T15:15:12.847",
|
||||
"lastModified": "2025-01-28T15:15:12.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unprivileged context can trigger a data\nmemory-dependent prefetch engine to fetch the contents of a privileged location\nand consume those contents as an address that is also dereferenced."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881",
|
||||
"source": "arm-security@arm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24102",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:15.807",
|
||||
"lastModified": "2025-01-27T22:15:15.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:13.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user\u2019s current location."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3 y macOS Ventura 13.7.3. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122067",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24106",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:16.070",
|
||||
"lastModified": "2025-01-27T22:15:16.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:13.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. El an\u00e1lisis de un archivo puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24121",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.230",
|
||||
"lastModified": "2025-01-27T22:15:17.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:13.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24126",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.603",
|
||||
"lastModified": "2025-01-27T22:15:17.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:13.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de validaci\u00f3n de entrada. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Un atacante en la red local podr\u00eda provocar la finalizaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24130",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:17.977",
|
||||
"lastModified": "2025-01-27T22:15:17.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:13.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-24146",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.077",
|
||||
"lastModified": "2025-01-27T22:15:19.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:14.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Eliminar una conversaci\u00f3n en Mensajes puede exponer la informaci\u00f3n de contacto del usuario en el registro sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-24151",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.360",
|
||||
"lastModified": "2025-01-27T22:15:19.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-28T15:15:14.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
|
40
README.md
40
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-28T13:00:27.930499+00:00
|
||||
2025-01-28T16:05:42.333138+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-28T11:15:07.413000+00:00
|
||||
2025-01-28T15:36:03.663000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279281
|
||||
279285
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-0065](CVE-2025/CVE-2025-00xx/CVE-2025-0065.json) (`2025-01-28T11:15:07.413`)
|
||||
- [CVE-2024-11954](CVE-2024/CVE-2024-119xx/CVE-2024-11954.json) (`2025-01-28T14:15:29.070`)
|
||||
- [CVE-2024-11956](CVE-2024/CVE-2024-119xx/CVE-2024-11956.json) (`2025-01-28T14:15:29.803`)
|
||||
- [CVE-2024-6351](CVE-2024/CVE-2024-63xx/CVE-2024-6351.json) (`2025-01-28T14:15:30.007`)
|
||||
- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-01-28T15:15:12.847`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `44`
|
||||
|
||||
- [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2025-01-28T15:15:10.787`)
|
||||
- [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2025-01-28T15:15:10.947`)
|
||||
- [CVE-2023-41776](CVE-2023/CVE-2023-417xx/CVE-2023-41776.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41779](CVE-2023/CVE-2023-417xx/CVE-2023-41779.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41780](CVE-2023/CVE-2023-417xx/CVE-2023-41780.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41782](CVE-2023/CVE-2023-417xx/CVE-2023-41782.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2023-41783](CVE-2023/CVE-2023-417xx/CVE-2023-41783.json) (`2025-01-28T15:36:03.663`)
|
||||
- [CVE-2024-22062](CVE-2024/CVE-2024-220xx/CVE-2024-22062.json) (`2025-01-28T15:29:07.970`)
|
||||
- [CVE-2024-23591](CVE-2024/CVE-2024-235xx/CVE-2024-23591.json) (`2025-01-28T14:28:25.570`)
|
||||
- [CVE-2024-23953](CVE-2024/CVE-2024-239xx/CVE-2024-23953.json) (`2025-01-28T15:15:11.330`)
|
||||
- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-01-28T15:15:11.520`)
|
||||
- [CVE-2024-54507](CVE-2024/CVE-2024-545xx/CVE-2024-54507.json) (`2025-01-28T15:15:11.723`)
|
||||
- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-01-28T15:15:11.900`)
|
||||
- [CVE-2024-54519](CVE-2024/CVE-2024-545xx/CVE-2024-54519.json) (`2025-01-28T15:15:12.050`)
|
||||
- [CVE-2024-54523](CVE-2024/CVE-2024-545xx/CVE-2024-54523.json) (`2025-01-28T15:15:12.190`)
|
||||
- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-01-28T15:15:12.340`)
|
||||
- [CVE-2024-54542](CVE-2024/CVE-2024-545xx/CVE-2024-54542.json) (`2025-01-28T15:15:12.477`)
|
||||
- [CVE-2024-55195](CVE-2024/CVE-2024-551xx/CVE-2024-55195.json) (`2025-01-28T15:15:12.647`)
|
||||
- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-01-28T15:15:13.303`)
|
||||
- [CVE-2025-24106](CVE-2025/CVE-2025-241xx/CVE-2025-24106.json) (`2025-01-28T15:15:13.450`)
|
||||
- [CVE-2025-24121](CVE-2025/CVE-2025-241xx/CVE-2025-24121.json) (`2025-01-28T15:15:13.600`)
|
||||
- [CVE-2025-24126](CVE-2025/CVE-2025-241xx/CVE-2025-24126.json) (`2025-01-28T15:15:13.743`)
|
||||
- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-01-28T15:15:13.890`)
|
||||
- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-28T15:15:14.013`)
|
||||
- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-28T15:15:14.150`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
94
_state.csv
94
_state.csv
@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53
|
||||
CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000
|
||||
CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000
|
||||
CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000
|
||||
CVE-2017-10271,0,0,14922a22b3e13ba9a751ea1222fa30df24e11e2f5f03c317ff596ab737c3753b,2024-11-21T03:05:47.717000
|
||||
CVE-2017-10271,0,1,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000
|
||||
CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000
|
||||
CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000
|
||||
CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000
|
||||
@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a
|
||||
CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000
|
||||
CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000
|
||||
CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000
|
||||
CVE-2017-12149,0,0,2344fb981b14e958f056d2b21f759fb905d6638e4e136a219d99193ac7fa37e9,2024-11-21T03:08:56.070000
|
||||
CVE-2017-12149,0,1,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000
|
||||
CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000
|
||||
CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000
|
||||
CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000
|
||||
@ -102558,7 +102558,7 @@ CVE-2017-20192,0,0,62ca05a0a6895e670da34ea053fd80d19f2fb06d6c55730f577c1845fb514
|
||||
CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4ca38,2024-10-30T20:46:34.060000
|
||||
CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000
|
||||
CVE-2017-20195,0,0,038824b0765b4962b51714c1d9dd9e3ad2eebba7a76824674181910d889a0075,2024-10-29T14:34:04.427000
|
||||
CVE-2017-20196,0,0,14152e3e97ab24a76d49e12c81d611876b27423d888c54801b3c354324913bd2,2025-01-26T18:15:27.443000
|
||||
CVE-2017-20196,0,1,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000
|
||||
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
|
||||
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
|
||||
CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000
|
||||
@ -105455,7 +105455,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c
|
||||
CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000
|
||||
CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000
|
||||
CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000
|
||||
CVE-2017-5070,0,0,615a11d3c3fcfda037a63767a33a59e4e5a8d648020bec496404db799180523e,2024-11-21T03:26:59.100000
|
||||
CVE-2017-5070,0,1,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000
|
||||
CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000
|
||||
CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000
|
||||
CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000
|
||||
@ -106503,7 +106503,7 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8
|
||||
CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000
|
||||
CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000
|
||||
CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000
|
||||
CVE-2017-6327,0,0,41d22cc19320a12f7dcaf53924e4b464e17def5611434a084cf3e8251b5a2913,2024-11-21T03:29:34.190000
|
||||
CVE-2017-6327,0,1,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000
|
||||
CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000
|
||||
CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000
|
||||
CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000
|
||||
@ -109621,7 +109621,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237
|
||||
CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000
|
||||
CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000
|
||||
CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000
|
||||
CVE-2017-9822,0,0,2a27c3d2d96b3658088ac342db13376385a6888df412e1b9e9c14cff53de4789,2024-11-21T03:36:55.967000
|
||||
CVE-2017-9822,0,1,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000
|
||||
CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000
|
||||
CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000
|
||||
CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000
|
||||
@ -121219,7 +121219,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7
|
||||
CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000
|
||||
CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000
|
||||
CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000
|
||||
CVE-2018-2380,0,0,07efae4ad9e4f53097d410b5073da10fe7fb99ae780c882598acbb7fe38beeb9,2024-11-21T04:03:42.830000
|
||||
CVE-2018-2380,0,1,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000
|
||||
CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000
|
||||
CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000
|
||||
CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000
|
||||
@ -168266,7 +168266,7 @@ CVE-2021-21728,0,0,abfcfb35e980ce0ce123fceadeabb11de2a6565aa607cfe8decaede24d231
|
||||
CVE-2021-21729,0,0,5c8c6ff8ced38561b4fb5213780ae73d6d2e4ee4d4bd3497a9224cefdbf3446b,2024-11-21T05:48:53.660000
|
||||
CVE-2021-2173,0,0,cbad9191d79c8dacc7e443e9fe440f30f6648d01ca2a701c6c89364b5fa6a3f8,2024-11-21T06:02:32.263000
|
||||
CVE-2021-21730,0,0,805546dac7c11db2476efc02242c7c7b94ea7d54741ed53fcc38f5426004b5fa,2024-11-21T05:48:53.793000
|
||||
CVE-2021-21731,0,0,a012a858c7ba64008f6d6563ef1dd4dfeee502c3341004cce8f746e969e8fd4c,2024-11-21T05:48:53.910000
|
||||
CVE-2021-21731,0,1,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000
|
||||
CVE-2021-21732,0,0,4a59c0d26af0a341d194bb0bfae954d2dc535569840fc62c58a3f0cafa422cb6,2024-11-21T05:48:54.023000
|
||||
CVE-2021-21733,0,0,d39f86fdb8abfb7f331c613fcef01ccdb1e34d1f0405dbae49159b55f7cc1469,2024-11-21T05:48:54.137000
|
||||
CVE-2021-21734,0,0,e560ea57bd7301969ff07503d3a9d383ce9ebb441e347c6ec57d4f8a75176222,2024-11-21T05:48:54.243000
|
||||
@ -206362,7 +206362,7 @@ CVE-2022-40073,0,0,e70cb5d8371fd7f2d3adb545818d1342b3d91ca78a490d67a70ba3cef3b61
|
||||
CVE-2022-40074,0,0,e6681222f196869647c103fb04c2071fb9eb5b2878fc4661c5940517bffb4565,2024-11-21T07:20:48.497000
|
||||
CVE-2022-40075,0,0,528238a21c223c94fd7e677a83885dfb032391305d3ea4dd2958f5640e7c5ad2,2024-11-21T07:20:48.647000
|
||||
CVE-2022-40076,0,0,c046b91313e33d852e787506d4c9c3b2814c879e207d5c27f199fbb28002715c,2024-11-21T07:20:48.800000
|
||||
CVE-2022-4008,0,0,36ebc1c4d3491863d042b22625651b5c3b771429dfe12c891c55777923e3dbe5,2024-11-21T07:34:26.293000
|
||||
CVE-2022-4008,0,1,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000
|
||||
CVE-2022-40080,0,0,0b19a6ef973056f75152ce2a1f048e7f1573677c516306567b89503bb7ee2bef,2024-11-21T07:20:48.960000
|
||||
CVE-2022-40082,0,0,56e76875663e98850cea47c91ae372970f7a80cab7e0f217ec87951590fd2597,2024-11-21T07:20:49.127000
|
||||
CVE-2022-40083,0,0,00c52ecc769d6134409ef73ebc9833bdb81527bec230aa202b259398d890e40a,2024-11-21T07:20:49.287000
|
||||
@ -217169,7 +217169,7 @@ CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794
|
||||
CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000
|
||||
CVE-2023-2236,0,0,7a218227d81da1e3f369ef4b8f9cd06e52cc34b359f143c1afab0c2fd8539745,2024-11-21T07:58:12.760000
|
||||
CVE-2023-22360,0,0,fd39a65648711ab8fca8410196aa194e55218a4b817fbfbb522e25878ac6b54a,2024-11-21T07:44:37.927000
|
||||
CVE-2023-22361,0,0,50decacf6926470c1c50024779cb6f7527ae8efb50590f3551b530adfd0ce45f,2024-11-21T07:44:38.030000
|
||||
CVE-2023-22361,0,1,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000
|
||||
CVE-2023-22362,0,0,c3ba0f65014999f63dd9643dd347ae876cd94a8ac19156266e3221f4ca257c83,2024-11-21T07:44:38.150000
|
||||
CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16ac60,2024-11-21T07:44:38.263000
|
||||
CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000
|
||||
@ -217247,7 +217247,7 @@ CVE-2023-22438,0,0,5703d0c4eb5aa393e07fb85a45fb079e2501bb28ea84b28790691f2382e31
|
||||
CVE-2023-22439,0,0,ca68d33d01cfaf8fae9ea4cc43a47b0f92b3a227512f3203fc183a193b04683b,2024-11-21T07:44:48.323000
|
||||
CVE-2023-2244,0,0,9025fdc5a6a759ed98b80fd24d007a79e81c2dab5fc8cbc2e2ac71984ae522d5,2024-11-21T07:58:13.680000
|
||||
CVE-2023-22440,0,0,c5ec718ecf01186f250ace3719ba2ad09a9b09feb1366a6ca10e80d692ebffb0,2024-11-21T07:44:48.453000
|
||||
CVE-2023-22441,0,0,b644cb46aa77022eab8d67ef94a7dbbdab9f479d32b7915dde982c03161eebf5,2024-11-21T07:44:48.567000
|
||||
CVE-2023-22441,0,1,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000
|
||||
CVE-2023-22442,0,0,29a9cdca2e21aa6d398bb690de439ba4d4d2ddb0ea81a01806255dac3a21ff10,2024-11-21T07:44:48.687000
|
||||
CVE-2023-22443,0,0,9fddab8612d3067f0d4cebc1a90128c8533756620471b9c208288be6aa2f41d8,2024-11-21T07:44:48.817000
|
||||
CVE-2023-22444,0,0,20b223dec4ff7bd0b8efd2978a9b7375e7a68fedd8b267f92dd20c6f584cb0c1,2024-11-21T07:44:48.947000
|
||||
@ -218407,7 +218407,7 @@ CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fca
|
||||
CVE-2023-23899,0,0,83c684d5a0c0153ca536e41b4b1ec7ab525d48af8abf9c727f10c646f36b7714,2024-11-21T07:47:03.583000
|
||||
CVE-2023-2390,0,0,0b3933c68aac4c6dd381bee40c06fb4fbff5d2442ca411a48ccacdd9579faa67,2024-11-21T07:58:31.300000
|
||||
CVE-2023-23900,0,0,bcb049b1d07fa99f1c9c7b07a1a1e31428f3d9389488a84b2a6b57255ec7a77d,2024-11-21T07:47:03.723000
|
||||
CVE-2023-23901,0,0,9530cf0cf49055b387909ac241e076288f2ebc12455bad5d4ea0c957b189d88e,2024-11-21T07:47:03.867000
|
||||
CVE-2023-23901,0,1,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000
|
||||
CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000
|
||||
CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000
|
||||
CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000
|
||||
@ -218968,7 +218968,7 @@ CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4
|
||||
CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000
|
||||
CVE-2023-24584,0,0,450b8fe4752031bc85f08e6e3249bd441ebacea296c3154e9791a18ef187d89e,2024-11-21T07:48:10.787000
|
||||
CVE-2023-24585,0,0,8daffcf761a5e332fbb31dd00952f08646614a1fe870f4d740df8552f3a0ab79,2024-11-21T07:48:10.920000
|
||||
CVE-2023-24586,0,0,31befe82361b303f1ed20d27f3ff9dfd45424e53457df0133b9c10e2cef3817d,2024-11-21T07:48:11.063000
|
||||
CVE-2023-24586,0,1,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000
|
||||
CVE-2023-24587,0,0,292e05491f18fcd1c7e0ecb44788f9081cc8b8543f871a74f452e2948d572e7f,2024-11-21T07:48:11.237000
|
||||
CVE-2023-24588,0,0,4a357365b75707750f9002dd1d54b5c251abd9b6ecad45bb39848b8c6c0c240a,2024-11-21T07:48:11.380000
|
||||
CVE-2023-24589,0,0,098dfca42c558b814e364ffb8a37e58cbd9b62cb01477fa4e47746b32480f74b,2024-11-21T07:48:11.503000
|
||||
@ -219354,9 +219354,9 @@ CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b57
|
||||
CVE-2023-25067,0,0,6ee55e97fa7054de1cfb0e958d38df776cb2a1824dea0f5315ab298b89f915e2,2024-12-09T13:15:23.200000
|
||||
CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000
|
||||
CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000
|
||||
CVE-2023-25070,0,0,95c90078ac53551cdda0941e41174ac16f21d603c474b6a376eb05dec1a9bc4b,2024-11-21T07:49:02.733000
|
||||
CVE-2023-25070,0,1,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000
|
||||
CVE-2023-25071,0,0,e4fa2c8e71ed3ebf0e69731ddfba75b34ec50abf37f9a0a35ca7af0e752253ae,2024-11-21T07:49:02.867000
|
||||
CVE-2023-25072,0,0,23ed540857e07aba005060d845e67c8c2607ffb1abd77c521ba564b772dc837f,2024-11-21T07:49:02.997000
|
||||
CVE-2023-25072,0,1,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000
|
||||
CVE-2023-25073,0,0,faa56cf615949f57edd90ef85627d225940d3db6a28bd01dd46fbace2f38bd3f,2024-11-21T07:49:03.120000
|
||||
CVE-2023-25074,0,0,f9fc176b6b7e8915167411663c245628ea6a10ef6d26394f4ea82c7839d24074,2024-11-21T07:49:03.247000
|
||||
CVE-2023-25075,0,0,25335c7983447de1bb2c448769548c7ebd749f93baae0786465db7e2ad0a1e95,2024-11-21T07:49:03.390000
|
||||
@ -219475,7 +219475,7 @@ CVE-2023-25180,0,0,9c594a57ef3362d5c7f529a93ac159a56bac306f4849dec68b36e434e1827
|
||||
CVE-2023-25181,0,0,29d437748b5b0b1191ee76bfc7f9056117c6702ccb85aae9719438ec4611f4c4,2024-11-21T07:49:15.940000
|
||||
CVE-2023-25182,0,0,a11de1df0cacaf51b756500b43ba70b812535157065deee5df3b307e1abe5a62,2024-11-21T07:49:16.057000
|
||||
CVE-2023-25183,0,0,9dc08ea2e0bd8f00745279ad28938358f2df63ccf7df8fba93b0e55bb61f5733,2024-11-21T07:49:16.180000
|
||||
CVE-2023-25184,0,0,eabf0bd0bce1ed230047c247f587947ea85e21e30f81679124affe739b88c859,2024-11-21T07:49:16.303000
|
||||
CVE-2023-25184,0,1,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000
|
||||
CVE-2023-25185,0,0,654ebd21078f1c5996fb55f66ebecc642265579f6eb0f98fcb3a07307e5d9a80,2024-12-12T22:15:06.247000
|
||||
CVE-2023-25186,0,0,ec4420d7c1ea5324e6f0bd6478cba82abfdf0c84215571aee85ba5a2b42cb753,2024-11-21T07:49:16.570000
|
||||
CVE-2023-25187,0,0,d19d0068cef419b7b1f2d261c4666d21e822db83b39c37d7957fec0cce6817a9,2024-12-12T21:15:06.680000
|
||||
@ -219797,10 +219797,10 @@ CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac
|
||||
CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000
|
||||
CVE-2023-25646,0,0,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000
|
||||
CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000
|
||||
CVE-2023-25648,0,0,5ebf0c6bb0a99027cbcc90aec48b6710f6157bed7ee854be7136d73e69ee4562,2024-11-21T07:49:51.883000
|
||||
CVE-2023-25648,0,1,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000
|
||||
CVE-2023-2565,0,0,b533c314e7bdbee51b7919f7d466927cc9624d83669f7284a3c70d8e5a7890eb,2024-11-21T07:58:50.483000
|
||||
CVE-2023-25650,0,0,28e48f8b0cd60886e7e639d265b3ee6e1491a0cef9017a797cd1870c905e5ea0,2024-11-21T07:49:52.140000
|
||||
CVE-2023-25650,0,1,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000
|
||||
CVE-2023-25651,0,0,8041ab7732534a3f15abe3d8b3c1a9f1432cc679b3c9dabd96eb7471cf125d9a,2024-11-21T07:49:52.290000
|
||||
CVE-2023-25652,0,0,9a2af3222703b12c596f16fed6f83ee7a9f2704131e4c9d1c16f143419251b78,2024-11-21T07:49:52.417000
|
||||
CVE-2023-25653,0,0,c79c2b8a5628263bd2bb95a4a5d5f1d09456b445a09ad3bb8cd4d64fe5f77c3b,2024-11-21T07:49:52.583000
|
||||
@ -221155,7 +221155,7 @@ CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9d
|
||||
CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000
|
||||
CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000
|
||||
CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000
|
||||
CVE-2023-27385,0,0,c68ecdf016bf2281f407cb9610cd4bbaeed3891f5aa2195ad6bf2208b3c782a6,2024-11-21T07:52:48.053000
|
||||
CVE-2023-27385,0,1,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000
|
||||
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
|
||||
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
|
||||
CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000
|
||||
@ -221284,7 +221284,7 @@ CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0
|
||||
CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000
|
||||
CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000
|
||||
CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000
|
||||
CVE-2023-27510,0,0,6f959761032f230455e8bf272eebaab9228d33fdd1038574e4ed1d2c95e2943b,2024-11-21T07:53:03.877000
|
||||
CVE-2023-27510,0,1,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000
|
||||
CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000
|
||||
CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000
|
||||
CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000
|
||||
@ -221301,7 +221301,7 @@ CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829
|
||||
CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000
|
||||
CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000
|
||||
CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000
|
||||
CVE-2023-27527,0,0,ef895853842493f6d6e428aef03b5f2da5176173f94982e6fa7ef668485ee536,2024-11-21T07:53:06.160000
|
||||
CVE-2023-27527,0,1,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000
|
||||
CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000
|
||||
CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000
|
||||
CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000
|
||||
@ -232490,13 +232490,13 @@ CVE-2023-41772,0,0,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6
|
||||
CVE-2023-41773,0,0,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000
|
||||
CVE-2023-41774,0,0,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000
|
||||
CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000
|
||||
CVE-2023-41776,0,0,20f40858a9672381a8a9085848c5ece660aa82097d9a080cc208337180331642,2024-11-21T08:21:40.043000
|
||||
CVE-2023-41779,0,0,00ec8dde9f3fe82c60cb3c7c6476547c2784ac010a84a48be230e9d34f1bf968,2024-11-21T08:21:40.183000
|
||||
CVE-2023-41776,0,1,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41779,0,1,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000
|
||||
CVE-2023-4178,0,0,1141fd40ba18bee37e1c42fae821d1b64549ca6cc2a33d2a55286ccb58509271,2024-11-21T08:34:33.433000
|
||||
CVE-2023-41780,0,0,2ac91b1ba972e8c6aa41dbcb1218fe590cfc8938a83b7941de42b75c5d5cdc2b,2024-11-21T08:21:40.320000
|
||||
CVE-2023-41780,0,1,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41781,0,0,19fc06020fc9ee508abcb1f4254ac105cd846b8768551d2051e133fcf7cc9f16,2024-11-21T08:21:40.457000
|
||||
CVE-2023-41782,0,0,051be590a41fe8be6729ced213351f8b297a5fb3d83c248e652f00fd675bf67d,2024-11-21T08:21:40.590000
|
||||
CVE-2023-41783,0,0,839aa66af32c7261b29d7163e7d850fd078812132f9bcf4fa7c809a75f6ebf78,2024-11-21T08:21:40.743000
|
||||
CVE-2023-41782,0,1,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41783,0,1,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000
|
||||
CVE-2023-41784,0,0,a8ebf61f8b77dfe47b65c2a49d655477006d0f22c6688955b05553cef45f4c1c,2024-11-21T08:21:40.887000
|
||||
CVE-2023-41786,0,0,679e1ab2a11d5095960d26f95e0bea184bf9a762765b891d0eb540ee9417bb2c,2024-11-21T08:21:41.023000
|
||||
CVE-2023-41787,0,0,538197acdb53a2536c302129254e1b8e381ed654db4bfe21b17f47a8b5eaa3d2,2024-11-21T08:21:41.150000
|
||||
@ -245073,6 +245073,8 @@ CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a
|
||||
CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000
|
||||
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
|
||||
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
|
||||
CVE-2024-11954,1,1,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000
|
||||
CVE-2024-11956,1,1,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000
|
||||
CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000
|
||||
CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000
|
||||
CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000
|
||||
@ -248687,7 +248689,7 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6
|
||||
CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000
|
||||
CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000
|
||||
CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000
|
||||
CVE-2024-22062,0,0,8f0ab471e668cd03b7a1b3138c26a2962a23ff1e52eff23da6e303d3cb6a8e23,2024-11-21T08:55:29.160000
|
||||
CVE-2024-22062,0,1,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000
|
||||
CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000
|
||||
CVE-2024-22064,0,0,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000
|
||||
CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000
|
||||
@ -249791,7 +249793,7 @@ CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277
|
||||
CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000
|
||||
CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000
|
||||
CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000
|
||||
CVE-2024-23591,0,0,f8fe557392c309a8c4c67baf521b401b3ce05c427a283115f72d735179f77238,2024-11-21T08:57:58.127000
|
||||
CVE-2024-23591,0,1,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000
|
||||
CVE-2024-23592,0,0,ef014cbf8808263f731f61b0bea284cf199deacfcf795438ec07cedc3d97e15d,2024-11-21T08:57:58.270000
|
||||
CVE-2024-23593,0,0,1669104ef0f6d536595a3f0242aea2e399af734f766398709f067343dd11f88d,2024-11-21T08:57:58.400000
|
||||
CVE-2024-23594,0,0,1f0e1d4dfefab44adcf5b5a1aea994e7319979d868c10f29cf8eb184905dd76b,2024-11-21T08:57:58.520000
|
||||
@ -250129,7 +250131,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa
|
||||
CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000
|
||||
CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000
|
||||
CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000
|
||||
CVE-2024-23953,0,0,49aa3f2b3a62119ebea22a50941aa7dcb20a92225938b66a01059260250f4584,2025-01-28T09:15:09.187000
|
||||
CVE-2024-23953,0,1,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000
|
||||
CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000
|
||||
CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000
|
||||
CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000
|
||||
@ -272474,7 +272476,7 @@ CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a
|
||||
CVE-2024-54475,0,0,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000
|
||||
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
|
||||
CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000
|
||||
CVE-2024-54478,0,0,ca9222501c8ff71998fe35f19a222058c9cf55bc86a2bf0f4510fee0bf6b8a8e,2025-01-27T22:15:12.377000
|
||||
CVE-2024-54478,0,1,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000
|
||||
CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000
|
||||
CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000
|
||||
CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000
|
||||
@ -272500,7 +272502,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df
|
||||
CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000
|
||||
CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000
|
||||
CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000
|
||||
CVE-2024-54507,0,0,41b68f670df8d592abf37382aa9998423dab14e12876b2aa44eeafbe2a355fc3,2025-01-27T22:15:12.777000
|
||||
CVE-2024-54507,0,1,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000
|
||||
CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000
|
||||
CVE-2024-54509,0,0,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000
|
||||
CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000
|
||||
@ -272511,12 +272513,12 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309
|
||||
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
|
||||
CVE-2024-54516,0,0,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000
|
||||
CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000
|
||||
CVE-2024-54518,0,0,7411ea9a68e200c83720e5af50b2272219e991e23b0c824cc594dd4c274931e5,2025-01-27T22:15:13.260000
|
||||
CVE-2024-54519,0,0,ca67072233fa48a610cf937e58682a242acd977aafc923d31a31345ed7800be8,2025-01-27T22:15:13.367000
|
||||
CVE-2024-54518,0,1,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000
|
||||
CVE-2024-54519,0,1,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000
|
||||
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
|
||||
CVE-2024-54520,0,0,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000
|
||||
CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000
|
||||
CVE-2024-54523,0,0,99b867f52d51b534bffec672c1deb43f18457bee1964fb07df8adadfe170068d,2025-01-27T22:15:13.660000
|
||||
CVE-2024-54523,0,1,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000
|
||||
CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
|
||||
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
|
||||
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
|
||||
@ -272530,10 +272532,10 @@ CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e
|
||||
CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000
|
||||
CVE-2024-54537,0,0,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000
|
||||
CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000
|
||||
CVE-2024-54539,0,0,d28c340ca6d55c0526182ae66e2e4d8dd88614a5d079ef3088c377bc3597911b,2025-01-27T22:15:14.037000
|
||||
CVE-2024-54539,0,1,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000
|
||||
CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000
|
||||
CVE-2024-54541,0,0,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000
|
||||
CVE-2024-54542,0,0,b595df3e83392fa393fa516edf28b5df358cc28f5c3be33ee006fc5cdb1520f3,2025-01-27T22:15:14.217000
|
||||
CVE-2024-54542,0,1,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000
|
||||
CVE-2024-54543,0,0,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000
|
||||
CVE-2024-54547,0,0,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000
|
||||
CVE-2024-54549,0,0,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000
|
||||
@ -272702,7 +272704,7 @@ CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263e
|
||||
CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000
|
||||
CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000
|
||||
CVE-2024-55194,0,0,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000
|
||||
CVE-2024-55195,0,0,7deb8159637db6659b96d42dc9114dc77a022ffe3e95e7d421e2db44f5b66e21,2025-01-23T22:15:14.690000
|
||||
CVE-2024-55195,0,1,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000
|
||||
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
||||
@ -274534,6 +274536,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f
|
||||
CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000
|
||||
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000
|
||||
CVE-2024-6351,1,1,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000
|
||||
CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000
|
||||
CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000
|
||||
CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000
|
||||
@ -275875,6 +275878,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac
|
||||
CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000
|
||||
CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000
|
||||
CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000
|
||||
CVE-2024-7881,1,1,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000
|
||||
CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000
|
||||
CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000
|
||||
CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000
|
||||
@ -277636,7 +277640,7 @@ CVE-2025-0059,0,0,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef53916
|
||||
CVE-2025-0060,0,0,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000
|
||||
CVE-2025-0061,0,0,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000
|
||||
CVE-2025-0063,0,0,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000
|
||||
CVE-2025-0065,1,1,c0dd666fa87469cf3baf924c77b06b6a74be0e048b00b2b062e3702e6a59ac12,2025-01-28T11:15:07.413000
|
||||
CVE-2025-0065,0,0,c0dd666fa87469cf3baf924c77b06b6a74be0e048b00b2b062e3702e6a59ac12,2025-01-28T11:15:07.413000
|
||||
CVE-2025-0066,0,0,41773dd06eda78c1806c873ae42cd1b5433608a0fe1510b7dc5de4c2fa1f4080,2025-01-14T01:15:16.783000
|
||||
CVE-2025-0067,0,0,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969e8,2025-01-14T01:15:16.950000
|
||||
CVE-2025-0068,0,0,335ecdc06a29db245188288060d2d78b12fd2ca685b50ec8e17c976ac125be2f,2025-01-14T01:15:17.107000
|
||||
@ -279052,10 +279056,10 @@ CVE-2025-24094,0,0,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46
|
||||
CVE-2025-24096,0,0,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000
|
||||
CVE-2025-24100,0,0,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000
|
||||
CVE-2025-24101,0,0,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000
|
||||
CVE-2025-24102,0,0,5c4a84a122c29025995eba7d95b97d930375890c4a75d2d7918884442f5c8787,2025-01-27T22:15:15.807000
|
||||
CVE-2025-24102,0,1,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
|
||||
CVE-2025-24103,0,0,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000
|
||||
CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000
|
||||
CVE-2025-24106,0,0,b245e38c1f94d7b46ca1b3f515a5a13ed160b150bbff059be2d801d4ea2f7ac7,2025-01-27T22:15:16.070000
|
||||
CVE-2025-24106,0,1,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000
|
||||
CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000
|
||||
CVE-2025-24108,0,0,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000
|
||||
CVE-2025-24109,0,0,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000
|
||||
@ -279067,15 +279071,15 @@ CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e22
|
||||
CVE-2025-24117,0,0,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000
|
||||
CVE-2025-24118,0,0,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000
|
||||
CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000
|
||||
CVE-2025-24121,0,0,fe209164caf65ae125cf4039035b5825ca59d466cf68f29e85f4fe986422b336,2025-01-27T22:15:17.230000
|
||||
CVE-2025-24121,0,1,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000
|
||||
CVE-2025-24122,0,0,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000
|
||||
CVE-2025-24123,0,0,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000
|
||||
CVE-2025-24124,0,0,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000
|
||||
CVE-2025-24126,0,0,1ca267086598e6d13484388122418c9e1026dc7b8bc4026384b3d1ef931801ef,2025-01-27T22:15:17.603000
|
||||
CVE-2025-24126,0,1,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000
|
||||
CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000
|
||||
CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000
|
||||
CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000
|
||||
CVE-2025-24130,0,0,4866392f6c0e1eb81decc004ed98cd38de37862d801a3eb7fcd60a37aaf44138,2025-01-27T22:15:17.977000
|
||||
CVE-2025-24130,0,1,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000
|
||||
CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000
|
||||
CVE-2025-24134,0,0,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000
|
||||
CVE-2025-24135,0,0,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000
|
||||
@ -279087,10 +279091,10 @@ CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc6
|
||||
CVE-2025-24141,0,0,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000
|
||||
CVE-2025-24143,0,0,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000
|
||||
CVE-2025-24145,0,0,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000
|
||||
CVE-2025-24146,0,0,770bc8c733ea70c0b9a3beecc559ce8c7ca03653ce71daa08e03b7f15296a298,2025-01-27T22:15:19.077000
|
||||
CVE-2025-24146,0,1,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000
|
||||
CVE-2025-24149,0,0,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000
|
||||
CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000
|
||||
CVE-2025-24151,0,0,ab646694adf5efce849ec3bc02e5553fbff81ec9e6260a5844c257e0ce332077,2025-01-27T22:15:19.360000
|
||||
CVE-2025-24151,0,1,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
|
||||
CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000
|
||||
CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000
|
||||
CVE-2025-24154,0,0,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user