mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-03T22:00:12.312723+00:00
This commit is contained in:
parent
a74312c6f0
commit
b08f3b98de
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-13065",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-07-03T12:29:00.280",
|
||||
"lastModified": "2024-11-21T03:46:19.947",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -92,8 +92,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDF4D909-3D3C-4892-AB0A-4ED0D5892D27"
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD24C8F2-171D-4F9B-A330-8C5AB8A0AB8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-19886",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-21T22:15:15.667",
|
||||
"lastModified": "2024-11-21T04:35:35.320",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,10 +85,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.0.3",
|
||||
"matchCriteriaId": "7055FD9B-AAC8-4DD0-9A8E-F4706D9B9567"
|
||||
"matchCriteriaId": "BC1A8633-B080-4068-84D1-B78F169C8433"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-25043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-06T17:15:07.870",
|
||||
"lastModified": "2024-11-21T04:39:48.770",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,10 +85,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.4",
|
||||
"matchCriteriaId": "AD97575A-E930-4326-9DA8-6FED031AAE9E"
|
||||
"matchCriteriaId": "13225CD3-317E-4091-BD30-C747AD5AD6D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-15598",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-10-06T14:15:12.197",
|
||||
"lastModified": "2024-11-21T05:05:49.910",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -92,10 +92,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.0.4",
|
||||
"matchCriteriaId": "ADACE97D-F823-4A69-B0A3-065D7AFACCB2"
|
||||
"matchCriteriaId": "11AA43E8-866E-45AD-91B6-06AAC118DECC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-20455",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-07T16:15:27.430",
|
||||
"lastModified": "2025-01-07T16:15:27.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:49:27.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-42717",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-07T22:15:06.950",
|
||||
"lastModified": "2024-11-21T06:28:01.980",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,17 +85,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4"
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.6",
|
||||
"matchCriteriaId": "989FAEB2-1A84-481E-BB56-793113C4714C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.6",
|
||||
"matchCriteriaId": "8A1F00F0-6D1E-42BC-850E-BFBB7685BE0C"
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "A7085082-64B3-4129-89D3-DCABF3C627A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-22363",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-07T16:15:28.050",
|
||||
"lastModified": "2025-01-07T16:15:28.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:49:29.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39163",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-26T14:15:20.793",
|
||||
"lastModified": "2025-03-27T16:45:27.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:52:01.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7192746",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-20T19:15:17.783",
|
||||
"lastModified": "2025-04-03T19:15:38.917",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,16 +90,16 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.9.6",
|
||||
"matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1"
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.8",
|
||||
"matchCriteriaId": "69019657-283B-4BA6-8983-57318F8736EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.8",
|
||||
"matchCriteriaId": "D3B974C9-92E4-4493-9C5F-8CF1F8A74068"
|
||||
"versionEndExcluding": "2.9.6",
|
||||
"matchCriteriaId": "54497FC8-5BF6-4E81-9C7E-F01AEBCB2AD1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T04:15:38.017",
|
||||
"lastModified": "2025-01-30T21:15:10.640",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,10 +86,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.5",
|
||||
"versionEndExcluding": "3.0.9",
|
||||
"matchCriteriaId": "E45908C1-75D7-49A7-86EE-07B4305BDA04"
|
||||
"matchCriteriaId": "F57A821A-277E-4B3D-BC5D-395812BF62A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38285",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-26T21:15:10.207",
|
||||
"lastModified": "2024-11-21T08:13:13.803",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,10 +56,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.10",
|
||||
"matchCriteriaId": "314D5544-E20D-482F-9F39-DE5AA72B1972"
|
||||
"matchCriteriaId": "792A16CE-6CB0-40F7-AC60-157D78EF3B6E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1019",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2024-01-30T16:15:47.123",
|
||||
"lastModified": "2025-02-13T18:16:18.837",
|
||||
"lastModified": "2025-07-03T20:59:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,10 +90,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.0.12",
|
||||
"matchCriteriaId": "52EBFAFE-523F-46B7-9631-4FA866ABC2D0"
|
||||
"matchCriteriaId": "2DEAC2CF-18AC-4EE6-960B-D07FD3ABBCA5"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25037",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-07T16:15:32.937",
|
||||
"lastModified": "2025-01-07T16:15:32.937",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:49:32.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25048",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-04-27T12:15:10.517",
|
||||
"lastModified": "2024-11-21T09:00:09.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:45:20.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndExcluding": "9.3.0.17",
|
||||
"matchCriteriaId": "82C3FB30-0B59-4831-A99E-542B8EA1A39D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndExcluding": "9.3.5",
|
||||
"matchCriteriaId": "FC53A9D0-EC7C-4576-9D95-59BDE4DFCA99"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7149481",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283137",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7149481",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28778",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-07T16:15:33.113",
|
||||
"lastModified": "2025-01-07T16:15:33.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:49:35.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31879",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-18T16:15:47.253",
|
||||
"lastModified": "2024-11-21T09:14:04.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:15.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154380",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287539",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154380",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35122",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-24T18:15:31.680",
|
||||
"lastModified": "2025-01-24T18:15:31.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:09.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,69 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7178317",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40702",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-07T16:15:33.463",
|
||||
"lastModified": "2025-01-07T16:15:33.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:49:39.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndIncluding": "11.0.1",
|
||||
"matchCriteriaId": "FACCAE0A-7AE8-4E8A-A407-191C260B6F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB99931-249F-4650-9612-B96803DEE909"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47104",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-18T11:15:05.763",
|
||||
"lastModified": "2024-12-18T11:15:05.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:13.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179158",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51463",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-21T14:15:21.453",
|
||||
"lastModified": "2024-12-21T14:15:21.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:12.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179509",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51464",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-21T14:15:21.627",
|
||||
"lastModified": "2024-12-31T07:15:11.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:10.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179509",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Dec/20",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51471",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-19T18:15:23.153",
|
||||
"lastModified": "2024-12-19T18:15:23.153",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:23:41.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndIncluding": "9.3.0.26",
|
||||
"matchCriteriaId": "EA509E6E-9C3B-4468-AD5B-58132A4E181F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndIncluding": "9.4.0.7",
|
||||
"matchCriteriaId": "EF207429-0AA6-4061-83E8-3DE1DC9C38BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.4.0.0",
|
||||
"versionEndIncluding": "9.4.0.7",
|
||||
"matchCriteriaId": "F6E0C4F1-A99A-4529-B112-E09801488CC6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7178243",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52895",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-14T15:15:09.210",
|
||||
"lastModified": "2025-02-14T15:15:09.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:54:07.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183052",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52898",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-14T17:15:17.513",
|
||||
"lastModified": "2025-01-14T17:15:17.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:10:10.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionStartIncluding": "9.3.0",
|
||||
"versionEndIncluding": "9.4.1.1",
|
||||
"matchCriteriaId": "28ABEF51-4E90-4FBB-860F-90B998AA1566"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndIncluding": "9.3.0.26",
|
||||
"matchCriteriaId": "13020BB1-FE49-496E-A07B-C0A9FA3C90B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.4.0.0",
|
||||
"versionEndIncluding": "9.4.0.7",
|
||||
"matchCriteriaId": "EDBDC0CD-0CDB-45F2-92F6-23FB06DC4C69"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:linux_on_ibm_z:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B955E472-47E3-4C32-847B-F6BB05594BA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179150",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54173",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-28T03:15:09.357",
|
||||
"lastModified": "2025-02-28T03:15:09.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:44:08.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionEndExcluding": "9.4.2",
|
||||
"matchCriteriaId": "55660FDA-F75A-4E16-B669-460A7AE0257D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndExcluding": "9.3.0.27",
|
||||
"matchCriteriaId": "ADBA5611-3469-4892-9634-CDF2B50C07A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.4.0.0",
|
||||
"versionEndExcluding": "9.4.0.10",
|
||||
"matchCriteriaId": "83CB7333-6E78-431C-AEE1-AB60FEB0425F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183370",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-55898",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-24T02:15:31.940",
|
||||
"lastModified": "2025-02-24T02:15:31.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:52:55.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183835",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0975",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-28T03:15:10.653",
|
||||
"lastModified": "2025-02-28T03:15:10.653",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:41:35.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionStartIncluding": "9.3.0",
|
||||
"versionEndIncluding": "9.4.2",
|
||||
"matchCriteriaId": "F690720D-CBF3-4021-8CBC-8B208C438A6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndIncluding": "9.3.0.27",
|
||||
"matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.4.0.0",
|
||||
"versionEndIncluding": "9.4.0.10",
|
||||
"matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183467",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23225",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-28T03:15:10.807",
|
||||
"lastModified": "2025-02-28T03:15:10.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:25:35.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
|
||||
"versionEndIncluding": "9.4.2",
|
||||
"matchCriteriaId": "0938AD98-E093-4E0E-B0FB-2257E9DF2159"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.3.0.0",
|
||||
"versionEndIncluding": "9.3.0.27",
|
||||
"matchCriteriaId": "4612ED09-CAC4-44A2-A638-C7D41DB68D79"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
|
||||
"versionStartIncluding": "9.4.0.0",
|
||||
"versionEndIncluding": "9.4.0.10",
|
||||
"matchCriteriaId": "88ABC52C-FBCA-4647-AE56-0969138712CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7183372",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-2866",
|
||||
"sourceIdentifier": "security@documentfoundation.org",
|
||||
"published": "2025-04-27T19:15:15.137",
|
||||
"lastModified": "2025-05-12T19:05:52.590",
|
||||
"lastModified": "2025-07-03T21:26:26.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -66,20 +66,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-2950",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-18T15:15:58.937",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:53:15.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7231320",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3218",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-05-07T02:15:31.860",
|
||||
"lastModified": "2025-05-07T14:13:20.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:53:29.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7232750",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-33122",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-06-17T18:15:25.580",
|
||||
"lastModified": "2025-06-17T20:50:23.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:53:32.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM i 7.2, 7.3, 7.4, 7.5 y 7.6 podr\u00eda permitir que un usuario obtenga privilegios elevados debido a una llamada de librer\u00eda no cualificada en IBM Advanced Job Scheduler para i. Un agente malicioso podr\u00eda provocar que c\u00f3digo controlado por el usuario se ejecute con privilegios de administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C189EC3-7D9F-4303-BB5C-1013FAE59B1E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7237040",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-340xx/CVE-2025-34061.json
Normal file
82
CVE-2025/CVE-2025-340xx/CVE-2025-34061.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-34061",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:21.570",
|
||||
"lastModified": "2025-07-03T20:15:21.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A backdoor in PHPStudy versions 2016 through 2018 allows unauthenticated remote attackers to execute arbitrary PHP code on affected installations. The backdoor listens for base64-encoded PHP payloads in the Accept-Charset HTTP header of incoming requests, decodes and executes the payload without proper validation. This leads to remote code execution as the web server user, compromising the affected system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/phpstudy_backdoor_rce.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.xp.cn/phpstudy",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34082.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34082.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34082",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:22.540",
|
||||
"lastModified": "2025-07-03T20:15:22.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability exists in IGEL OS versions prior to 11.04.270 within the Secure Terminal and Secure Shadow services. The flaw arises due to improper input sanitization in the handling of specially crafted PROXYCMD commands on TCP ports 30022 and 5900. An unauthenticated attacker with network access to a vulnerable device can inject arbitrary commands, leading to remote code execution with elevated privileges.\n\nNOTE: IGEL OS v10.x has reached end-of-life (EOL) status."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kb.igel.com/security-safety/current/isn-2021-01-igel-os-remote-command-execution-vulne",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/misc/igel_command_injection.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/igel-os-secure-terminal-shadow-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.igel.com/wp-content/uploads/2021/02/lxos_11.04.270.txt",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
102
CVE-2025/CVE-2025-340xx/CVE-2025-34086.json
Normal file
102
CVE-2025/CVE-2025-340xx/CVE-2025-34086.json
Normal file
@ -0,0 +1,102 @@
|
||||
{
|
||||
"id": "CVE-2025-34086",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:22.683",
|
||||
"lastModified": "2025-07-03T20:15:22.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Bolt CMS versions 3.7.0 and earlier contain a chain of vulnerabilities that together allow an authenticated user to achieve remote code execution. A user with valid credentials can inject arbitrary PHP code into the displayname field of the user profile, which is rendered unsanitized in backend templates. The attacker can then list and rename cached session files via the /async/browse/cache/.sessions and /async/folder/rename endpoints. By renaming a .session file to a path under the publicly accessible /files/ directory with a .php extension, the attacker can turn the injected code into an executable web shell. Finally, the attacker triggers the payload via a crafted HTTP GET request to the rogue file.\n\nNOTE: The vendor announced that Bolt 3 reached end-of-life after 31 December 2021."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://boltcms.io/newsitem/major-announcements-bolt-3-eol-bolt-4-2-5-0-releases",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bolt/bolt",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bolt/bolt/releases/tag/3.7.1",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/bolt_authenticated_rce.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/48296",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.rapid7.com/db/modules/exploit/unix/webapp/bolt_authenticated_rce/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34087.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34087.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34087",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:22.843",
|
||||
"lastModified": "2025-07-03T20:15:22.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user.\n\n\n\n\nThis behavior was present in the legacy AdminLTE interface and has since been patched in later versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pi-hole/web/releases/tag/v4.0",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pi-hole.net/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pulsesecurity.co.nz/advisories/pihole-v3.3-vulns",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_whitelist_exec.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/pihole-adminlte-whitelist-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34088.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34088.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34088",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:23.007",
|
||||
"lastModified": "2025-07-03T20:15:23.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated remote code execution vulnerability exists in Pandora FMS version 7.0NG and earlier. The net_tools.php functionality allows authenticated users to execute arbitrary OS commands via the select_ips parameter when performing network tools operations, such as pinging. This occurs because user input is not properly sanitized before being passed to system commands, enabling command injection."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pandorafms/pandorafms",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/pandora_ping_cmd_exec.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/pandora-fms-rce-via-ping",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/48334",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.rapid7.com/db/modules/exploit/linux/http/pandora_ping_cmd_exec/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
98
CVE-2025/CVE-2025-340xx/CVE-2025-34089.json
Normal file
98
CVE-2025/CVE-2025-340xx/CVE-2025-34089.json
Normal file
@ -0,0 +1,98 @@
|
||||
{
|
||||
"id": "CVE-2025-34089",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-07-03T20:15:23.157",
|
||||
"lastModified": "2025-07-03T20:15:23.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the \"Allow unknown devices\" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://apps.apple.com/us/app/remote-for-mac/id1086962925",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/195347",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/http/remote_for_mac_rce.rb",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/remote-for-mac-rce",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.rapid7.com/db/modules/exploit/osx/http/remote_for_mac_rce/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-36004",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-06-25T03:15:27.687",
|
||||
"lastModified": "2025-06-26T18:58:14.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T20:53:35.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E41BD05-37B8-4494-9344-506D4BCF43C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD4F4919-D935-4B81-B4E8-0E0F2DAC09B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE2B298C-E1F6-43BD-A5EF-83964C6669CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88B74622-BDB2-43AE-A91F-FADEC4B64B4F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C684FC45-C9BA-4EF0-BD06-BB289450DD21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7237732",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-490xx/CVE-2025-49005.json
Normal file
72
CVE-2025/CVE-2025-490xx/CVE-2025-49005.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-49005",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T21:15:26.787",
|
||||
"lastModified": "2025-07-03T21:15:26.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Next.js is a React framework for building full-stack web applications. In Next.js App Router from 15.3.0 to before 15.3.3 and Vercel CLI from 41.4.1 to 42.2.0, a cache poisoning vulnerability was found. The issue allowed page requests for HTML content to return a React Server Component (RSC) payload instead under certain conditions. When deployed to Vercel, this would only impact the browser cache, and would not lead to the CDN being poisoned. When self-hosted and deployed externally, this could lead to cache poisoning if the CDN does not properly distinguish between RSC / HTML in the cache keys. This issue has been resolved in Next.js 15.3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/commit/ec202eccf05820b60c6126d6411fe16766ecc066",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/issues/79346",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/releases/tag/v15.3.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-r2fc-ccr8-96c4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vercel.com/changelog/cve-2025-49005",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-498xx/CVE-2025-49826.json
Normal file
68
CVE-2025/CVE-2025-498xx/CVE-2025-49826.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-49826",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T21:15:27.287",
|
||||
"lastModified": "2025-07-03T21:15:27.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Next.js is a React framework for building full-stack web applications. From versions 15.1.0 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted on Vercel. Under certain conditions, this issue may allow a HTTP 204 response to be cached for static pages, leading to the 204 response being served to all users attempting to access the page. This issue has been addressed in version 15.1.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/commit/a15b974ed707d63ad4da5b74c1441f5b7b120e93",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/releases/tag/v15.1.8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vercel.com/changelog/cve-2025-49826",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-525xx/CVE-2025-52554.json
Normal file
90
CVE-2025/CVE-2025-525xx/CVE-2025-52554.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-52554",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T20:15:23.423",
|
||||
"lastModified": "2025-07-03T20:15:23.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow executions that they do not own or that have not been shared with them, leading to potential business disruption. This issue has been patched in version 1.99.1. A workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dudanogueira/n8n/commit/ca2f90c7fbaa1d661ade2f45d587d9469bc287e1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/commit/e5edc60e344924230baafb11fa1f0af788e9ca9a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/pull/16405",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-gq57-v332-7666",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-533xx/CVE-2025-53367.json
Normal file
90
CVE-2025/CVE-2025-533xx/CVE-2025-53367.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-53367",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T21:15:27.493",
|
||||
"lastModified": "2025-07-03T21:15:27.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DjVuLibre is a GPL implementation of DjVu, a web-centric format for distributing documents and images. Prior to version 3.5.29, the MMRDecoder::scanruns method is affected by an OOB-write vulnerability, because it does not check that the xr pointer stays within the bounds of the allocated buffer. This can lead to writes beyond the allocated memory, resulting in a heap corruption condition. An out-of-bounds read with pr is also possible for the same reason. This issue has been patched in version 3.5.29."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/djvu/djvulibre-git/ci/33f645196593d70bd5e37f55b63886c31c82c3da",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2025/07/03/1",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-533xx/CVE-2025-53368.json
Normal file
64
CVE-2025/CVE-2025-533xx/CVE-2025-53368.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-53368",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T20:15:23.577",
|
||||
"lastModified": "2025-07-03T20:15:23.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, page descriptions are inserted into raw HTML without proper sanitization by the Citizen skin when using the old search bar. Any user with page editing privileges can insert cross-site scripting (XSS) payloads into the DOM for other users who are searching for specific pages. This issue has been patched in version 3.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/aedbceb3380bb48db6b59e272fc187529c71c8ca",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-rq6g-6g94-jfr4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-533xx/CVE-2025-53369.json
Normal file
60
CVE-2025/CVE-2025-533xx/CVE-2025-53369.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-53369",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T20:15:23.737",
|
||||
"lastModified": "2025-07-03T20:15:23.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Short Description is a MediaWiki extension that provides local short description support. In version 4.0.0, short descriptions are not properly sanitized before being inserted as HTML using mw.util.addSubtitle, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 4.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/commit/bc4fdbaeb1dff127fb6d08c0d385b64aa128c8f8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-extensions-ShortDescription/security/advisories/GHSA-p85q-mww9-gwqf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-533xx/CVE-2025-53370.json
Normal file
64
CVE-2025/CVE-2025-533xx/CVE-2025-53370.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-53370",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T20:15:23.893",
|
||||
"lastModified": "2025-07-03T20:15:23.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. From versions 1.9.4 to before 3.4.0, short descriptions set via the ShortDescription extension are inserted as raw HTML by the Citizen skin, allowing any user to insert arbitrary HTML into the DOM by editing a page. This issue has been patched in version 3.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/c85a40bddc8651fff66df83a72debddcb34f0521",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/releases/tag/v3.4.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-prmv-7r8c-794g",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
62
README.md
62
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-03T20:00:10.776070+00:00
|
||||
2025-07-03T22:00:12.312723+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-03T19:55:16.553000+00:00
|
||||
2025-07-03T21:26:26.980000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,33 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
300236
|
||||
300249
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2025-23968](CVE-2025/CVE-2025-239xx/CVE-2025-23968.json) (`2025-07-03T19:15:23.043`)
|
||||
- [CVE-2025-45809](CVE-2025/CVE-2025-458xx/CVE-2025-45809.json) (`2025-07-03T19:15:24.027`)
|
||||
- [CVE-2025-34061](CVE-2025/CVE-2025-340xx/CVE-2025-34061.json) (`2025-07-03T20:15:21.570`)
|
||||
- [CVE-2025-34082](CVE-2025/CVE-2025-340xx/CVE-2025-34082.json) (`2025-07-03T20:15:22.540`)
|
||||
- [CVE-2025-34086](CVE-2025/CVE-2025-340xx/CVE-2025-34086.json) (`2025-07-03T20:15:22.683`)
|
||||
- [CVE-2025-34087](CVE-2025/CVE-2025-340xx/CVE-2025-34087.json) (`2025-07-03T20:15:22.843`)
|
||||
- [CVE-2025-34088](CVE-2025/CVE-2025-340xx/CVE-2025-34088.json) (`2025-07-03T20:15:23.007`)
|
||||
- [CVE-2025-34089](CVE-2025/CVE-2025-340xx/CVE-2025-34089.json) (`2025-07-03T20:15:23.157`)
|
||||
- [CVE-2025-49005](CVE-2025/CVE-2025-490xx/CVE-2025-49005.json) (`2025-07-03T21:15:26.787`)
|
||||
- [CVE-2025-49826](CVE-2025/CVE-2025-498xx/CVE-2025-49826.json) (`2025-07-03T21:15:27.287`)
|
||||
- [CVE-2025-52554](CVE-2025/CVE-2025-525xx/CVE-2025-52554.json) (`2025-07-03T20:15:23.423`)
|
||||
- [CVE-2025-53367](CVE-2025/CVE-2025-533xx/CVE-2025-53367.json) (`2025-07-03T21:15:27.493`)
|
||||
- [CVE-2025-53368](CVE-2025/CVE-2025-533xx/CVE-2025-53368.json) (`2025-07-03T20:15:23.577`)
|
||||
- [CVE-2025-53369](CVE-2025/CVE-2025-533xx/CVE-2025-53369.json) (`2025-07-03T20:15:23.737`)
|
||||
- [CVE-2025-53370](CVE-2025/CVE-2025-533xx/CVE-2025-53370.json) (`2025-07-03T20:15:23.893`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `33`
|
||||
|
||||
- [CVE-2023-45177](CVE-2023/CVE-2023-451xx/CVE-2023-45177.json) (`2025-07-03T19:37:40.087`)
|
||||
- [CVE-2024-10013](CVE-2024/CVE-2024-100xx/CVE-2024-10013.json) (`2025-07-03T18:30:06.820`)
|
||||
- [CVE-2024-3892](CVE-2024/CVE-2024-38xx/CVE-2024-3892.json) (`2025-07-03T18:30:06.820`)
|
||||
- [CVE-2024-52896](CVE-2024/CVE-2024-528xx/CVE-2024-52896.json) (`2025-07-03T19:52:42.310`)
|
||||
- [CVE-2024-52897](CVE-2024/CVE-2024-528xx/CVE-2024-52897.json) (`2025-07-03T19:55:16.553`)
|
||||
- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-07-03T18:30:06.820`)
|
||||
- [CVE-2025-53489](CVE-2025/CVE-2025-534xx/CVE-2025-53489.json) (`2025-07-03T18:15:21.710`)
|
||||
- [CVE-2025-53490](CVE-2025/CVE-2025-534xx/CVE-2025-53490.json) (`2025-07-03T18:15:22.000`)
|
||||
- [CVE-2025-53500](CVE-2025/CVE-2025-535xx/CVE-2025-53500.json) (`2025-07-03T18:15:22.140`)
|
||||
- [CVE-2025-53501](CVE-2025/CVE-2025-535xx/CVE-2025-53501.json) (`2025-07-03T18:15:22.300`)
|
||||
- [CVE-2025-53502](CVE-2025/CVE-2025-535xx/CVE-2025-53502.json) (`2025-07-03T18:15:22.530`)
|
||||
- [CVE-2025-6926](CVE-2025/CVE-2025-69xx/CVE-2025-6926.json) (`2025-07-03T18:15:22.797`)
|
||||
- [CVE-2022-48279](CVE-2022/CVE-2022-482xx/CVE-2022-48279.json) (`2025-07-03T20:59:18.650`)
|
||||
- [CVE-2023-28882](CVE-2023/CVE-2023-288xx/CVE-2023-28882.json) (`2025-07-03T20:59:18.650`)
|
||||
- [CVE-2023-38285](CVE-2023/CVE-2023-382xx/CVE-2023-38285.json) (`2025-07-03T20:59:18.650`)
|
||||
- [CVE-2024-1019](CVE-2024/CVE-2024-10xx/CVE-2024-1019.json) (`2025-07-03T20:59:18.650`)
|
||||
- [CVE-2024-25037](CVE-2024/CVE-2024-250xx/CVE-2024-25037.json) (`2025-07-03T20:49:32.580`)
|
||||
- [CVE-2024-25048](CVE-2024/CVE-2024-250xx/CVE-2024-25048.json) (`2025-07-03T20:45:20.627`)
|
||||
- [CVE-2024-28778](CVE-2024/CVE-2024-287xx/CVE-2024-28778.json) (`2025-07-03T20:49:35.697`)
|
||||
- [CVE-2024-31879](CVE-2024/CVE-2024-318xx/CVE-2024-31879.json) (`2025-07-03T20:54:15.167`)
|
||||
- [CVE-2024-35122](CVE-2024/CVE-2024-351xx/CVE-2024-35122.json) (`2025-07-03T20:54:09.190`)
|
||||
- [CVE-2024-40702](CVE-2024/CVE-2024-407xx/CVE-2024-40702.json) (`2025-07-03T20:49:39.400`)
|
||||
- [CVE-2024-47104](CVE-2024/CVE-2024-471xx/CVE-2024-47104.json) (`2025-07-03T20:54:13.533`)
|
||||
- [CVE-2024-51463](CVE-2024/CVE-2024-514xx/CVE-2024-51463.json) (`2025-07-03T20:54:12.200`)
|
||||
- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2025-07-03T20:54:10.780`)
|
||||
- [CVE-2024-51471](CVE-2024/CVE-2024-514xx/CVE-2024-51471.json) (`2025-07-03T20:23:41.563`)
|
||||
- [CVE-2024-52895](CVE-2024/CVE-2024-528xx/CVE-2024-52895.json) (`2025-07-03T20:54:07.270`)
|
||||
- [CVE-2024-52898](CVE-2024/CVE-2024-528xx/CVE-2024-52898.json) (`2025-07-03T20:10:10.747`)
|
||||
- [CVE-2024-54173](CVE-2024/CVE-2024-541xx/CVE-2024-54173.json) (`2025-07-03T20:44:08.330`)
|
||||
- [CVE-2024-55898](CVE-2024/CVE-2024-558xx/CVE-2024-55898.json) (`2025-07-03T20:52:55.190`)
|
||||
- [CVE-2025-0975](CVE-2025/CVE-2025-09xx/CVE-2025-0975.json) (`2025-07-03T20:41:35.323`)
|
||||
- [CVE-2025-23225](CVE-2025/CVE-2025-232xx/CVE-2025-23225.json) (`2025-07-03T20:25:35.343`)
|
||||
- [CVE-2025-2866](CVE-2025/CVE-2025-28xx/CVE-2025-2866.json) (`2025-07-03T21:26:26.980`)
|
||||
- [CVE-2025-2950](CVE-2025/CVE-2025-29xx/CVE-2025-2950.json) (`2025-07-03T20:53:15.263`)
|
||||
- [CVE-2025-3218](CVE-2025/CVE-2025-32xx/CVE-2025-3218.json) (`2025-07-03T20:53:29.017`)
|
||||
- [CVE-2025-33122](CVE-2025/CVE-2025-331xx/CVE-2025-33122.json) (`2025-07-03T20:53:32.687`)
|
||||
- [CVE-2025-36004](CVE-2025/CVE-2025-360xx/CVE-2025-36004.json) (`2025-07-03T20:53:35.667`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
107
_state.csv
107
_state.csv
@ -113985,7 +113985,7 @@ CVE-2018-13056,0,0,0fe23317749ed9e00eea9e1415167bad25a33fd9014ba67553969854f4d8b
|
||||
CVE-2018-1306,0,0,bea8d94d1ff00097ede200bb8253961481c96dc48f2e4a96aa7d101d8debe63d,2024-11-21T03:59:35.460000
|
||||
CVE-2018-13060,0,0,c522cb37a1f3774c83ab34cbb6e27000ebbe2b8a156b8f52bc6d7459a79e68e6,2024-11-21T03:46:19.630000
|
||||
CVE-2018-13063,0,0,0e11be1d5aad4df7e337ae005766a3afa8674f066434f6214dfd250748990d16,2024-11-21T03:46:19.790000
|
||||
CVE-2018-13065,0,0,89b481bec61119cddb3f2f4240656749684025cf7a76df7dab011e086f4cac3b,2024-11-21T03:46:19.947000
|
||||
CVE-2018-13065,0,1,0502a4f1dc05687fba6123886f42924f613161909d0df4c42d77434c8982f0be,2025-07-03T20:59:18.650000
|
||||
CVE-2018-13066,0,0,21e20efd85d39a57bc9b5ebebbaaf4771027b0bf7ca80559a34b9ceaea6c7336,2024-11-21T03:46:20.107000
|
||||
CVE-2018-13067,0,0,d5036c38c930e399d7060991deafcb053fe598803de1a2ac57a8fd2d6a706507,2024-11-21T03:46:20.270000
|
||||
CVE-2018-13068,0,0,01deaf6eb236af2a55573c44ce70976cf2524087499819ace8814b9b0594b0bf,2024-11-21T03:46:20.417000
|
||||
@ -137056,7 +137056,7 @@ CVE-2019-1988,0,0,f100b83ccfaba7ac4700c888f14bea035bc1262d0feb6bef34125e141a251c
|
||||
CVE-2019-19880,0,0,56961bcc385f69fbb5b57ddd5e17bff3bd73630c6cf0ad3907bfb47c76c37e44,2024-11-21T04:35:34.813000
|
||||
CVE-2019-19882,0,0,4767c9ebb7c6699e7c88b9cc474d234bb2e31557fb910057b1d1e699a05a78fb,2024-11-21T04:35:35.013000
|
||||
CVE-2019-19885,0,0,24a089eab974adab3f76ba1ba829d2c87ff36861d9794773b609c3774166fe93,2024-11-21T04:35:35.163000
|
||||
CVE-2019-19886,0,0,24b939b844b1ec4c29e868c80db6d58fbf4f3a7328df89f3158a45c93938e229,2024-11-21T04:35:35.320000
|
||||
CVE-2019-19886,0,1,b626cf3a74ad36a01562907f0eb3c1efb7422f7ea3f351dcb7f8cde84dccbe76,2025-07-03T20:59:18.650000
|
||||
CVE-2019-19887,0,0,1b4c27ab499ac3f3ccb18644603feffef958a61c4c45a5d42a0ace21858142e8,2024-11-21T04:35:35.500000
|
||||
CVE-2019-19888,0,0,fad83f1b8af6cd0f8e3831ff707d49102c570b14945cb23e87498fde8917270e,2024-11-21T04:35:35.640000
|
||||
CVE-2019-19889,0,0,59fc9e68439967ccb5d76d16a64c226308cc1e55167f61cb61edc60a919db7a9,2024-11-21T04:35:35.787000
|
||||
@ -138508,7 +138508,7 @@ CVE-2019-2504,0,0,828265ff26ba1344fe2e1e504631d1632cc3a3fe08704ef346e38654e8527e
|
||||
CVE-2019-25040,0,0,1c39a614425d0a185dfd14341e0b8c22fffc999d43ec160f83c6474149a5c19c,2024-11-21T04:39:48.307000
|
||||
CVE-2019-25041,0,0,0d0ea1d986f3a7461a6d93c1215cf294d8802d79216324a1c0c7cb0b80e19ce4,2024-11-21T04:39:48.453000
|
||||
CVE-2019-25042,0,0,83afcef9d75ed34828028c7484fd7556082f7fb32f3d7e7a8ad987926566d468,2024-11-21T04:39:48.607000
|
||||
CVE-2019-25043,0,0,cc51ab83eabde837ae10afbfa927618df243a08eeaaa2df38bb7d0973a893f0d,2024-11-21T04:39:48.770000
|
||||
CVE-2019-25043,0,1,1b8a0ecc3020f888e8116775c6819123ebc62ab8b1a128990183a193879a2c50,2025-07-03T20:59:18.650000
|
||||
CVE-2019-25044,0,0,61810aeb3c5910554b2d4bc8386d706023333efbd359f8c2d7c953b44c453ec1,2024-11-21T04:39:48.930000
|
||||
CVE-2019-25045,0,0,09cabcaeef9138cb6329bdd81653131ddf30e9cd9e30914fbfb5e875a6393b90,2024-11-21T04:39:49.103000
|
||||
CVE-2019-25046,0,0,3228c054ae15690663d91427ed8cd669122e632af2a8a2c645da7ff9f8046730,2024-11-21T04:39:49.297000
|
||||
@ -150574,7 +150574,7 @@ CVE-2020-15594,0,0,be4e813712be0c93c32425fede324d29afa166740217fabb21cb1f62dc5d3
|
||||
CVE-2020-15595,0,0,8d9f887128952abfb7f74b9a19177926670ce837d312ed86cf29d1545ff624cb,2025-05-30T16:15:25.327000
|
||||
CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000
|
||||
CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000
|
||||
CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000
|
||||
CVE-2020-15598,0,1,045b3e91055f09b47a6144205af5e53d82229ab01aa5d376c7dcf4714fc8bebf,2025-07-03T20:59:18.650000
|
||||
CVE-2020-15599,0,0,4a9d09c4825dd24a93936708ad5e98cdc3b59f170d446b04fe6fecb5c9c2b10d,2024-11-21T05:05:50.060000
|
||||
CVE-2020-1560,0,0,a8c70000015369f2d5cdfb750b25fa728bd280d91bb589c67133201d988a8b3d,2024-11-21T05:10:50.673000
|
||||
CVE-2020-15600,0,0,b237b8b11dc3a5a6dc73908b11ddd5f11fbb129c4743fe1e8b243a02778edc88,2024-11-21T05:05:50.203000
|
||||
@ -167143,7 +167143,7 @@ CVE-2021-20450,0,0,0f5b27cc615135d792da5b34d212ed5f0166f47e7783a945ae6abd057d407
|
||||
CVE-2021-20451,0,0,9dc775fdb57d0d30485c9dab41a5d5be1763fda2e61b939d002a71ad3f1c3e6d,2025-01-07T19:25:37.353000
|
||||
CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000
|
||||
CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000
|
||||
CVE-2021-20455,0,0,9579d97eb104245cf663ed351f720c9d41cda049c2ac8a45b98c17103813e9a9,2025-01-07T16:15:27.430000
|
||||
CVE-2021-20455,0,1,6533c862372ca8a160431b3595ab5e17630d090ffd4a6d5df03a586b43449f2b,2025-07-03T20:49:27.313000
|
||||
CVE-2021-2046,0,0,ad9de75bfb455d28bedfc8d0200a0362300a00bb9087c78e5ba220afb8420fbc,2024-11-21T06:02:15.540000
|
||||
CVE-2021-20461,0,0,32bb741266cc653229bac24a9612d59bf6c19ecf87f4dbca4826c2185db1cdaf,2024-11-21T05:46:37.343000
|
||||
CVE-2021-20464,0,0,47ae6cb8b812d3b3a5c9f84cd7749fc1250c97a6b5585c32f4656f620f51f5cf,2024-11-21T05:46:37.480000
|
||||
@ -184347,7 +184347,7 @@ CVE-2021-42713,0,0,783571f521cb4c14c813efc36beb03a31d0b9369881123ae5eda01358e608
|
||||
CVE-2021-42714,0,0,140a3cd5e613fc165c37326bf38fb922982c9fd894685b7a4d43fefb24c5cd29,2024-11-21T06:28:01.450000
|
||||
CVE-2021-42715,0,0,c8bde02f0ab72afb9d2fb48b644a9a783de2cde5ac488a27334e06356251e70d,2024-11-21T06:28:01.600000
|
||||
CVE-2021-42716,0,0,e8b94a98a1f8c8c4ace912bdc692f2844b824dcc8731c978eb1cf416bf562dab,2024-11-21T06:28:01.797000
|
||||
CVE-2021-42717,0,0,e0cf32cf401f390ee5050d72c9219b1b18cae5d87b497dbc59e68726d57c7a54,2024-11-21T06:28:01.980000
|
||||
CVE-2021-42717,0,1,ea16797cfdb005a2e3512f7c7575a272a18fbb601f7e772ba9df74fb015d5c99,2025-07-03T20:59:18.650000
|
||||
CVE-2021-42718,0,0,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000
|
||||
CVE-2021-42719,0,0,232b901bd7344df0e76a38bf0733064f0ffc60bd5a3326d6e3679ce2d8d049d8,2024-11-21T06:28:02.177000
|
||||
CVE-2021-4272,0,0,006f9c0c258b6542fa695fbce9f3e6480d068f1e6d826347b4056504eefe3da7,2024-11-21T06:37:17.187000
|
||||
@ -192230,7 +192230,7 @@ CVE-2022-22358,0,0,84767261124809a9d1ed519f9f64155fc6ba5ec9fdf71fddbcd7410488522
|
||||
CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737156,2024-11-21T06:46:41.857000
|
||||
CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000
|
||||
CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000
|
||||
CVE-2022-22363,0,0,2b202a27d134c656ca3512bf7b46a7d1186447ca8d907c5ddc1cf75f17241bc9,2025-01-07T16:15:28.050000
|
||||
CVE-2022-22363,0,1,7f77ac2626643aa5ab0760205911c6adc830daa1b8e544a902015cd36275489f,2025-07-03T20:49:29.930000
|
||||
CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000
|
||||
CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000
|
||||
CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000
|
||||
@ -206105,7 +206105,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee
|
||||
CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000
|
||||
CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000
|
||||
CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000
|
||||
CVE-2022-39163,0,0,ffd0bbf2a05437ed15c90e539db34f6a36d44e1bf852ec0272b57d1c453312c7,2025-03-27T16:45:27.850000
|
||||
CVE-2022-39163,0,1,d6696a680484cb84b1cf221cfc56ef4602bd37d0ed911e185893320a8d1fb2e8,2025-07-03T20:52:01.790000
|
||||
CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000
|
||||
CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000
|
||||
CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000
|
||||
@ -212711,7 +212711,7 @@ CVE-2022-4826,0,0,014fbd0a7a06eb9a1efd2ae2475857eaa8bde551368d94326a82d9f9341786
|
||||
CVE-2022-48260,0,0,e7e60af9c858f5b5288b0031686d03e5e613b16cb37780d86f8482f3a30603dc,2025-03-11T18:15:27.073000
|
||||
CVE-2022-48261,0,0,8fec913aab803791099630bb3b4add731b2952c5677136c8ab14d8481622c16b,2025-03-11T18:15:27.267000
|
||||
CVE-2022-4827,0,0,5ac498be8b6ac9b553ca8c1e0b150917682d7d16bb58dc61446603771084fd8a,2025-04-23T17:16:23.617000
|
||||
CVE-2022-48279,0,0,01836a4da1b7ce33e84695b35b552ef61727c50cbe51395ee9a861662f5c5378,2025-04-03T19:15:38.917000
|
||||
CVE-2022-48279,0,1,930583aa07aa185824fc8b5024f19681066ccdc3a4efd197e8d6aa831ebd19b8,2025-07-03T20:59:18.650000
|
||||
CVE-2022-4828,0,0,f9377bb9daa067b01cffcf1f42848ce8342ba75803a1ce5ee33b3c860a178da6,2025-03-27T21:15:41.490000
|
||||
CVE-2022-48281,0,0,2931678421d6077742f37a8731a53914432b8c85d40568b108e6c860c0111b9e,2025-04-03T14:15:23.037000
|
||||
CVE-2022-48282,0,0,faac8c954d78b5ceb7c5ce11efc8ecb3c4678623d448b6402cf0eab59411b9fa,2024-11-21T07:33:04.807000
|
||||
@ -224143,7 +224143,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c
|
||||
CVE-2023-28877,0,0,e59a97403cb2ba7ba7084f8cef40e5ea548a51e665c965485b0b5cdf23b925a8,2025-02-14T20:15:33.210000
|
||||
CVE-2023-28879,0,0,642e2788c974b60f2db4909bf76b55c9019d3ebeace195e897c8809c61b362e1,2025-02-14T20:15:33.373000
|
||||
CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000
|
||||
CVE-2023-28882,0,0,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000
|
||||
CVE-2023-28882,0,1,b38b7b5b1152561383f3a10a2ec26e2428c241f5236e91874ab6fbba12e3ef24,2025-07-03T20:59:18.650000
|
||||
CVE-2023-28883,0,0,c0783168b291b29018ec24adbce6f8c48381e8da25a234ae37ceb4b4c668cda1,2025-02-19T17:15:13.590000
|
||||
CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000
|
||||
CVE-2023-28885,0,0,635855f321f101263fbcb2e9276aa47098826711d6bc3fcc28c5b70da3ffb2db,2025-02-19T17:15:13.793000
|
||||
@ -231358,7 +231358,7 @@ CVE-2023-38276,0,0,ba9fab32a121dc0ef42130086f4b44807496059dba59bbea2f2970476887b
|
||||
CVE-2023-3828,0,0,d9a69961c7e52c406634fa1bb313f20f14ba2e56402fe2ed2036a17d4012d956,2024-11-21T08:18:09.677000
|
||||
CVE-2023-38280,0,0,13ce1c3aab6ff4856bdf7e3dd50986942fbf0c0d949ac6c9de6fa3bc10d69b4c,2024-11-21T08:13:13.490000
|
||||
CVE-2023-38283,0,0,b0b9e30c65f4e0290339c964c9b5f85a6289c436d14867fe2ee4e5cb1d122753,2024-11-21T08:13:13.623000
|
||||
CVE-2023-38285,0,0,da2582a0480178b31e05ee6a7f3183d4ab37b3ffa572c3a62ae78b08a04a99ff,2024-11-21T08:13:13.803000
|
||||
CVE-2023-38285,0,1,be61181598184d6c61a4d09916902df2a8a290bf4f8cdc904517d784094179ea,2025-07-03T20:59:18.650000
|
||||
CVE-2023-38286,0,0,83ef3a91737412b90009913e8ebff4ab764f5945a5ae33dca40d59f89c0c473b,2024-11-21T08:13:13.970000
|
||||
CVE-2023-38288,0,0,42c04372f9c2c296311a892fdbf8f35822187c00273983f0c4b682148291e84e,2023-11-07T04:17:14.293000
|
||||
CVE-2023-38289,0,0,c8755455b071e1ec7b67b9a4bd95e1294de3beff6892cce5c0504ddaeac21ce7,2023-11-07T04:17:14.330000
|
||||
@ -236517,7 +236517,7 @@ CVE-2023-45173,0,0,ffc716553fc8735b94a901938d8197347ed303ddb90fe6dbdb91daa629d19
|
||||
CVE-2023-45174,0,0,d6ae1170ae2c49c643c98705c7fcf42aed789ae182e7f2b21d1825a4cffe6ae1,2024-11-21T08:26:29.337000
|
||||
CVE-2023-45175,0,0,e9d9dc1b8b95108a0e1028f29977b9916a775f3be496d71ef4dd38838b079bc5,2024-11-21T08:26:29.457000
|
||||
CVE-2023-45176,0,0,7178f1a37d445800432754a582331c7315b084328b371f787f4982876607744e,2024-11-21T08:26:29.583000
|
||||
CVE-2023-45177,0,1,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000
|
||||
CVE-2023-45177,0,0,051509b012e93a33d01bb6006afc4c995176bdcf53452d68b6d4a85f1d62941e,2025-07-03T19:37:40.087000
|
||||
CVE-2023-45178,0,0,48388e75ddb993ec5586822f1d414e30860b1c6dcdaa07936969263e3fcf2e1e,2024-11-21T08:26:29.833000
|
||||
CVE-2023-4518,0,0,fbb75b273529deda855092a1cb67f347a0b773f2071130e9f10d7bdcaab77a98,2024-11-21T08:35:20.213000
|
||||
CVE-2023-45181,0,0,13982b18a025246bb7ecf9ae43875f8b1c8b9fd7529debd7010d36d0494c7c4b,2025-01-14T19:46:20.940000
|
||||
@ -245429,7 +245429,7 @@ CVE-2024-1001,0,0,140fc173e33ae8fa7b986d187129f7b01af76bf1cd74c6ed57f4103bfb5a0f
|
||||
CVE-2024-10010,0,0,1371437a2294aadc15143f54d1c01735af263ef48293853d7cb88175f4d2421b,2025-05-07T13:28:46.577000
|
||||
CVE-2024-10011,0,0,37a7a2add316aa62fc644e677a8222291d1b4d2f7d89a6ec187d4cc2ee2d4a93,2024-11-06T16:01:39.573000
|
||||
CVE-2024-10012,0,0,413f959de4d29d2f4e53fa8b9bc452a97984c8f8ba413b5fa50db942e716664a,2025-01-07T15:59:23.043000
|
||||
CVE-2024-10013,0,1,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000
|
||||
CVE-2024-10013,0,0,a8bb9a370fd465c66ff161b98297d78ae5858d463ee55adf8fe2484bcb94bec1,2025-07-03T18:30:06.820000
|
||||
CVE-2024-10014,0,0,50214c84cef4e2fd21abb109362711999bfa6a60090d35936fd0e9cba0811d5b,2024-10-29T16:58:48.127000
|
||||
CVE-2024-10015,0,0,217a292c789a9f8ea3b1717a9a4b42a5c13589b9293af6ac699c09a1f0997322,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10016,0,0,f77f52c803ffaca4f851d3ea7a048b10f89ed8d8abf952ae01a553fb73da8ac4,2024-10-25T12:56:07.750000
|
||||
@ -245602,7 +245602,7 @@ CVE-2024-10186,0,0,deebe816c0e4f08a12b999c50b1e61e2e73183dc813c2bde7d36107ba44b3
|
||||
CVE-2024-10187,0,0,a05dc95bdb255244bd9cd3e7f7c3dbb2a64f03bc15ef2f7a3415c834e22630e5,2024-11-13T20:31:08.157000
|
||||
CVE-2024-10188,0,0,c61f687671a4edea114714cc7533a2f1c32c140ba4fc49445959f7719db461e3,2025-03-20T10:15:14.993000
|
||||
CVE-2024-10189,0,0,1a400dd56ae1b7b1d718254797ad2f77484ada3a81ab72653060886e14ceca61,2024-10-29T15:27:55.550000
|
||||
CVE-2024-1019,0,0,1d5868235f9b69470d2bff7bf38b7f5b3053179444fd5cce0cf4654caf1e5802,2025-02-13T18:16:18.837000
|
||||
CVE-2024-1019,0,1,3dbcc1303d05cdc8631d4dc3a224a6115ad2ae02d69b8efb76d46b873a91082a,2025-07-03T20:59:18.650000
|
||||
CVE-2024-10190,0,0,08abe739589f974d34204d886ba2ba057303723bf0c1d7e7227eac9b798cba5e,2025-03-20T10:15:15.117000
|
||||
CVE-2024-10191,0,0,61621cf6b67194bdcbf07d4a6dcee79a415e1ad518641f80cacab0f808ca6b2e,2024-10-22T14:33:12.313000
|
||||
CVE-2024-10192,0,0,2c299aa344138878b9ae6bbdfd084cd35f4786dba4f095300fa5d40e9fa506cb,2024-10-22T15:09:16.517000
|
||||
@ -254092,13 +254092,13 @@ CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08
|
||||
CVE-2024-25034,0,0,e9b1d3dd19b3d9085249eaa87289ff98427e36dc25cae58e678d863839e43374,2025-03-05T16:01:58.133000
|
||||
CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000
|
||||
CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000
|
||||
CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000
|
||||
CVE-2024-25037,0,1,693a224fa9cc33ca3eaa1e9222b26e6d08a7a7512e2e1e2803794e3f155c3188,2025-07-03T20:49:32.580000
|
||||
CVE-2024-2504,0,0,627d67f7b2aef584579966e521c1bbe6f2f5dd132eca6ffd2bb0ce28b95c0aa0,2025-02-27T15:09:59.800000
|
||||
CVE-2024-25041,0,0,c2ef0b11a47c5fcb85869011d777be135ff05637ba0b82b517f0e1a3d01142a3,2024-11-21T09:00:09.433000
|
||||
CVE-2024-25042,0,0,e80197f616e9fc7028a38b26e43b05d859fe7534b854846d6b61625c0e95d8c2,2025-01-10T19:31:43.540000
|
||||
CVE-2024-25046,0,0,6d8e792cef5c8fede291cc9590b8ac4d68cf095d20735d2e477f72f779be0432,2025-01-31T17:52:39.340000
|
||||
CVE-2024-25047,0,0,343df0aa34a2277d182830d3c20824917058fcf8f5e38af715146355ffc2bf9f,2025-07-02T15:41:45.863000
|
||||
CVE-2024-25048,0,0,fcc137b6f9efc3b0ed3d7c907f7c740493e10a50797f026d50e6e36a054b2c38,2024-11-21T09:00:09.860000
|
||||
CVE-2024-25048,0,1,db78eeef9b02f6cdfc72464414e0a77695520f1116df726e96121c1cb732e8e9,2025-07-03T20:45:20.627000
|
||||
CVE-2024-2505,0,0,a8b70d12eef18da213620a09faff6413a81044ca87b033ce08a31a9bd95ca2e1,2025-05-08T18:24:45.817000
|
||||
CVE-2024-25050,0,0,ee2886e2c70d5cd7c3164455e75aa374ff627d446d4a73168310c81dc4d1f42d,2024-11-21T09:00:10.010000
|
||||
CVE-2024-25051,0,0,77d07f07b5cec1ab3016e0be0efacec83d139c6a39d019cb400288b3180b83ed,2025-04-07T14:18:49.830000
|
||||
@ -256971,7 +256971,7 @@ CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679e
|
||||
CVE-2024-28775,0,0,48c24c963c3e0dc8c46f3ff427e4b5da1fb0e2f7af209370007a02ed2f945218,2025-04-11T14:09:38.493000
|
||||
CVE-2024-28776,0,0,c37ad1b4bcd037947f008aab1cf6e8a8743a02c8497909c23a1d3fa75f493c32,2025-02-19T16:15:38.870000
|
||||
CVE-2024-28777,0,0,27c5e3ffaadd4e49f8dfbbc74625f52a6acf48cb042bb3697feff05585a742a7,2025-02-19T16:15:39.363000
|
||||
CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000
|
||||
CVE-2024-28778,0,1,d547882bf17f722197b5c52bac5400254420c54ab88fe8ea636f1ea3d135291c,2025-07-03T20:49:35.697000
|
||||
CVE-2024-2878,0,0,b3b25e9c748a349ffeda379f2bd7a905843c474a769aa05853c935e7ae823531,2025-02-05T20:15:44.637000
|
||||
CVE-2024-28780,0,0,a45f8990f216243f42066ef01e1828e72f29ab69751d99d31d3cd7fb3b73695c,2025-02-19T16:15:39.510000
|
||||
CVE-2024-28781,0,0,ae474e03d5676937911aeaacf31d3abd594523c107a9f5f41f2af0a6977c4689,2025-01-27T18:31:09.747000
|
||||
@ -259331,7 +259331,7 @@ CVE-2024-31872,0,0,6a025a79f1912bff173929833a33ebaa07e5ebecd167df86154090852134e
|
||||
CVE-2024-31873,0,0,15c94cc3fd11f0c8c1d9b72b533e2e14debd87b07493c30645b670b791c1dfaf,2025-01-28T21:13:10.063000
|
||||
CVE-2024-31874,0,0,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000
|
||||
CVE-2024-31878,0,0,2cdf4c028654e8fbf3c35b620eb5619fea9f488afd53ab3b9767908578e7f92c,2024-11-21T09:14:04.550000
|
||||
CVE-2024-31879,0,0,daa01d9448ebcd5d37ce13841b8ea893e99fc319219124230413ac967ea6f1d6,2024-11-21T09:14:04.690000
|
||||
CVE-2024-31879,0,1,2c95bd49164b8d708bae7214defb4602e42b21e479fd465970d0453e45f7af39,2025-07-03T20:54:15.167000
|
||||
CVE-2024-3188,0,0,a1e19cbfd3c67a64e51d824fb2d7e6139fba2de5517a694aee51a6a0f5915063,2025-05-14T17:31:10.813000
|
||||
CVE-2024-31880,0,0,f941979502e23b306c091a056d19219b757e25a95ffe27e8cec0411fdb511500,2024-11-06T20:39:55.200000
|
||||
CVE-2024-31881,0,0,e09f1658aa69d8655212ad42dabc043e14e33323dbef71ee6054873933c3493c,2024-11-21T09:14:04.890000
|
||||
@ -261816,7 +261816,7 @@ CVE-2024-35117,0,0,f66294b4c69565a3ee8ba95a79f2f950741471afdd1e911de20d556fafc67
|
||||
CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000
|
||||
CVE-2024-35119,0,0,d30b5118f01127b72a967e41cbcd9127e0dc9e2965ef5097a86f08236d88d108,2024-11-21T09:19:48.800000
|
||||
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
|
||||
CVE-2024-35122,0,0,493d1491bd5ae7a5e59b43805ddb7588eafbd0d87c32f52529417f281085d342,2025-01-24T18:15:31.680000
|
||||
CVE-2024-35122,0,1,4e3dd883b82c03bae612318c6dad1e0a37d657bc830b145e93ba6b287a2b8c25,2025-07-03T20:54:09.190000
|
||||
CVE-2024-35124,0,0,a922d1c3a3958629dbb0cd51b2de664bb7e7c9433c590d1267fd4128399d23a0,2024-08-22T13:31:16.353000
|
||||
CVE-2024-3513,0,0,f3b60a2341228082c6b2c058a60950acb3fa7e0ac56c3c9b7f478ff2d11ae041,2024-11-21T09:29:45.410000
|
||||
CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e391f,2024-09-21T10:15:05.527000
|
||||
@ -265056,7 +265056,7 @@ CVE-2024-38903,0,0,bb8eb3b19953647f1fa790b248a4aaef61b725deca797759dfe3998f4fd40
|
||||
CVE-2024-38909,0,0,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000
|
||||
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
|
||||
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
|
||||
CVE-2024-3892,0,1,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000
|
||||
CVE-2024-3892,0,0,45d9dfdcfc78a4f7e641d089494af68d7a7315ac3a6524e43641e7d01774370b,2025-07-03T18:30:06.820000
|
||||
CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000
|
||||
CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000
|
||||
CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000
|
||||
@ -266196,7 +266196,7 @@ CVE-2024-40696,0,0,3dc472795bb4f5dee7e2998290829b14be08b72462d89040ef95045aa3c7b
|
||||
CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000
|
||||
CVE-2024-4070,0,0,dcefff140a08880697e00447eb5b9d3cf4e8bc626b549ead85b0012e24179a9f,2025-02-27T17:51:08.270000
|
||||
CVE-2024-40700,0,0,2d9c229abc1faaac1cc418f4ae90c891c929abab0867d534c439a3cc25c44edd,2025-02-04T21:15:26.380000
|
||||
CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8a85,2025-01-07T16:15:33.463000
|
||||
CVE-2024-40702,0,1,b61c21ac8adb150709ee8aff5de31157a598177c97cc57db17322512c4a11170,2025-07-03T20:49:39.400000
|
||||
CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000
|
||||
CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000
|
||||
CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000
|
||||
@ -271107,7 +271107,7 @@ CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f5290
|
||||
CVE-2024-47100,0,0,bc33fc5a76be564a723b9fb2ec38b7be22b37ba75ce50545dbf45808d11df9cc,2025-01-14T11:15:16.573000
|
||||
CVE-2024-47102,0,0,0864a20740f0de5ffc38497db2f0d4f8389b304278d9ae91ba201d1cd5b77740,2024-12-25T15:15:06.583000
|
||||
CVE-2024-47103,0,0,f2d938e35b4cd88b650fd9ebaf68a8a9213474b354e226db1e4a7eca8a26d434,2025-03-05T18:25:14.727000
|
||||
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
|
||||
CVE-2024-47104,0,1,026a8809af30dacccbc64737eb70987e43cd6e62a5365c6f0054001c1f3d6d78,2025-07-03T20:54:13.533000
|
||||
CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000
|
||||
CVE-2024-47107,0,0,83a68ca10aff101a96de3250c1131824959ac1049e7605a6db7f1c75f87fa7cd,2024-12-07T15:15:04.123000
|
||||
CVE-2024-47109,0,0,3df70960f3fd8a2d18b204a885afcd8f024202ba7b8dc307176911f567b1bbe1,2025-03-10T16:15:12.703000
|
||||
@ -274350,13 +274350,13 @@ CVE-2024-5146,0,0,5b449c1c90a12e7a7e9baafe2349df6bbeba71c937f98b023ebea1c53ce310
|
||||
CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000
|
||||
CVE-2024-51461,0,0,4876f12da7901555341c0b584ea1abd3abac7ec3d8f7f415a970047d9bfbda24,2025-04-11T15:39:52.920000
|
||||
CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000
|
||||
CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000
|
||||
CVE-2024-51464,0,0,1b2031370218977af474f39ea7b9c6eb15448100f9427860fc8d10cdd981ce8b,2024-12-31T07:15:11.307000
|
||||
CVE-2024-51463,0,1,087d0cc54c059cce6e0a62215ea81fc0f4886c162872024ffd7cd1a929dda70a,2025-07-03T20:54:12.200000
|
||||
CVE-2024-51464,0,1,ad9faf77a7bb18211133ce4e655e4499a0a5f1cbe82f262708e86a575ec1837c,2025-07-03T20:54:10.780000
|
||||
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
|
||||
CVE-2024-51466,0,0,8dbff8e38d974242f854fc216ba0ae34b3549115af35c681b8d8f30eb338719e,2025-07-02T15:58:56.447000
|
||||
CVE-2024-5147,0,0,ab91f72de430745aa06435c0b83e5065e058ec932697e33cc7f6207ac6142bf9,2025-02-05T14:52:39.890000
|
||||
CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000
|
||||
CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000
|
||||
CVE-2024-51471,0,1,d1fabbd389ed07f88438083abab4daf0fc4c0b3ce9d11260a2ff188a030a15db,2025-07-03T20:23:41.563000
|
||||
CVE-2024-51472,0,0,5a04f10a5b66fac72ae0a16c46c0e3a3ed989854125dc73bcc8f365a713b587f,2025-01-06T17:15:38.517000
|
||||
CVE-2024-51475,0,0,0d2172b69a6bc7db542afd1e2958e9264f2599ff4e6bf7e2f043416bbf357c7b,2025-06-04T20:02:45.390000
|
||||
CVE-2024-51476,0,0,60d94814215175c301437be50b363df906a0a0e446e91badb985325a9fb5b1b8,2025-03-06T17:15:19.763000
|
||||
@ -275483,10 +275483,10 @@ CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e
|
||||
CVE-2024-52891,0,0,19cf1f0011549768783225ac0d2a7012d880fe1910f8d0f6b1608f8ed0254a59,2025-03-04T20:04:21.467000
|
||||
CVE-2024-52892,0,0,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000
|
||||
CVE-2024-52893,0,0,bccb93e15c9c9d6c11e2a27d5bd916177aef96d8789ceb265a7ba2b1644d0c16,2025-03-04T20:02:14.490000
|
||||
CVE-2024-52895,0,0,776381c39f26d27f642d71ec1be88368d50de1a99de3a3998fc1acb8e968c6e5,2025-02-14T15:15:09.210000
|
||||
CVE-2024-52896,0,1,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000
|
||||
CVE-2024-52897,0,1,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000
|
||||
CVE-2024-52898,0,0,d7b7f6b11bb044b80bea87d96314b701a1a2f838c26b331c4312588e6e64f889,2025-01-14T17:15:17.513000
|
||||
CVE-2024-52895,0,1,fe099d7f6eafe1018d4b77d98297c83649163133debc7615bac574428c6668fb,2025-07-03T20:54:07.270000
|
||||
CVE-2024-52896,0,0,1c400ceb5bfc9b44b9e4519b4e35925648aa72a3bd9075d5c6df817d0e414b72,2025-07-03T19:52:42.310000
|
||||
CVE-2024-52897,0,0,ed26699dc7689dfe23bbdef47680c93078bbc0b5ec70e7e94f15777c74df9904,2025-07-03T19:55:16.553000
|
||||
CVE-2024-52898,0,1,87db9d39a9720e5bdd81ebc81e0e62681f07f034f96292698b31c775dd6825c3,2025-07-03T20:10:10.747000
|
||||
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
|
||||
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
|
||||
CVE-2024-52900,0,0,eb5792f5cbf6bef0b7f202086fd8227cab024e3d455878961eaf67a9379ec510,2025-07-01T18:07:20.727000
|
||||
@ -276471,7 +276471,7 @@ CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc255
|
||||
CVE-2024-54170,0,0,42dce6648e1132820da06b0e9c69e1655ebe361e65ea7d3b232a8af6a5ebbee4,2025-02-27T15:15:39.240000
|
||||
CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000
|
||||
CVE-2024-54172,0,0,89b8cf2473aa1d00b65e0aad499d5269d148da59212888517d4b625d48cc59f2,2025-06-23T20:16:59.783000
|
||||
CVE-2024-54173,0,0,9626ebf00dbcb8d683d602e32e68262d1ef27b7e0ae499ee14c2f9df981917bf,2025-02-28T03:15:09.357000
|
||||
CVE-2024-54173,0,1,aeb4bf587211b71aeccc6b5cd1518dde81918890bfbe72f41ce8080bb57e6159,2025-07-03T20:44:08.330000
|
||||
CVE-2024-54175,0,0,ac0e271a7a86253c9d856e43e336a7196fed14605337f3e646841823ba1fb5bc,2025-06-20T15:32:46.470000
|
||||
CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000
|
||||
CVE-2024-54179,0,0,cc40342456ec0e93880ba1ff6de6912ca898fe0485f93a482cde3b645de39dc5,2025-03-03T14:15:33.960000
|
||||
@ -277291,7 +277291,7 @@ CVE-2024-55894,0,0,6bc1464368d973e1c6c827bc429d51ce1a3c9546ee8e3c46e48ea85daab94
|
||||
CVE-2024-55895,0,0,9535eec07671a5cc5686d5a56d310d295b3f57a3a5c97ada2ccb31411af81b64,2025-04-01T20:26:30.593000
|
||||
CVE-2024-55896,0,0,d7dd07510a57c238a16c0fe0788b36dab26d7ddf0b08fae01a783db92ce18bc7,2025-01-03T23:15:08.437000
|
||||
CVE-2024-55897,0,0,e14dae99444da602a8cbcded6e75f3a296335e8970296d8e95d83228933505c5,2025-03-13T16:15:25.453000
|
||||
CVE-2024-55898,0,0,adcc5d516d89a41277ae34a6de418cf17da58482170efe79dea1e265741329cc,2025-02-24T02:15:31.940000
|
||||
CVE-2024-55898,0,1,ded8754e2961bc9ea3e7980cff04a20ee5fb7e167416f260c041b987f5dfd3a3,2025-07-03T20:52:55.190000
|
||||
CVE-2024-5590,0,0,a9d8f7434d1cfc7abf37860d9a247732a7fac6c4e092fe54bdbe5eeebe8c2afb,2025-02-07T15:10:57.540000
|
||||
CVE-2024-55904,0,0,985e264a3f8f59b658a98ed276a5675a14d822dac410c29893607d517450a9ef,2025-02-14T04:15:08.753000
|
||||
CVE-2024-55907,0,0,4c1e415bdf8f7641a1b178418bde0f344146cbdd158b634787f9c31634de79bd,2025-03-02T16:15:34.577000
|
||||
@ -283057,7 +283057,7 @@ CVE-2025-0328,0,0,25c0760d244498984cda91678b883cf89d3e8fcbb9c37fd0d45c67359c7184
|
||||
CVE-2025-0329,0,0,03b8cf30421e1ae0f8fd0e493ceb87146261c231c81ab91ad0614180095edb90,2025-06-12T16:35:31.733000
|
||||
CVE-2025-0330,0,0,79cf8fdee51afbda4105bc5823be00a341e7d6a4bdcc3c5735bb642d735615ae,2025-03-20T10:15:52.763000
|
||||
CVE-2025-0331,0,0,afe60233c7b6cdef8297092a16561204e8a753655f7ac938d1ebdf4ff4457d4f,2025-01-09T17:15:17.933000
|
||||
CVE-2025-0332,0,1,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000
|
||||
CVE-2025-0332,0,0,d0def84faa8b12076ff1e558a0ac55eb8953dfc2704b434c753c7e4d2ff98363,2025-07-03T18:30:06.820000
|
||||
CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d40e,2025-01-09T17:15:18.077000
|
||||
CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000
|
||||
CVE-2025-0335,0,0,12528d0865cacb7295fe5a0c5bf2a492f9357b1638988dc28820f4aad345e47c,2025-02-26T22:08:38.937000
|
||||
@ -283581,7 +283581,7 @@ CVE-2025-0971,0,0,5b8e3a772e26bf816abefc74071cc81ffef57f2dca25d3ca940637bd90f99d
|
||||
CVE-2025-0972,0,0,e5956f37d0d2c05528deb236852ccd083e64a88ec4620fb922e8c6291dff82ac,2025-02-03T00:15:28.007000
|
||||
CVE-2025-0973,0,0,c5f9ce06d2802593a7f76334f1b83941107fa5a0a0fa48c68dc58147471b9a7a,2025-02-28T22:33:55.367000
|
||||
CVE-2025-0974,0,0,d5c477dc78b0d3fe8557a020be3504381bf16f4fc509c0d46fe50fb97cb7b86b,2025-02-03T02:15:26.433000
|
||||
CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b539,2025-02-28T03:15:10.653000
|
||||
CVE-2025-0975,0,1,02dd45c6bbfc82af5cbb5c0c31b7d0e315ef08d4af0e0fdefd618452673c8579,2025-07-03T20:41:35.323000
|
||||
CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000
|
||||
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
|
||||
CVE-2025-0984,0,0,92704a0a035030fb5061e4659d37ae85bc1b4e3f45305a9920fa63c1ad964976,2025-05-07T14:13:20.483000
|
||||
@ -286901,7 +286901,7 @@ CVE-2025-2322,0,0,78ab742f31174d7df93575224a83318d524a8c032820e93e629a06208bce3a
|
||||
CVE-2025-23220,0,0,7c8179759fa74d6aae16fc3306b1fc79ab502a5b9e56a156b81b01f528524ae2,2025-02-28T19:22:56.600000
|
||||
CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000
|
||||
CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000
|
||||
CVE-2025-23225,0,0,e7172a29691256f5cd7802e83d2f56fad7175879b765e935ded8f42967016101,2025-02-28T03:15:10.807000
|
||||
CVE-2025-23225,0,1,cd0fe8dc7e7b130240b30e150cacd03b434741e27183450c53f033f6397dd305,2025-07-03T20:25:35.343000
|
||||
CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000
|
||||
CVE-2025-2323,0,0,38dc6c42b7b635e3caddc5b01ae9aa4a1f84282e9ca11a611a0d7850c76ef099,2025-03-15T17:15:36.610000
|
||||
CVE-2025-23233,0,0,9d0894e8f043e8d2e3d9f99b4c5bfc27819eaf2a631a882e6cbd474030b88962,2025-05-16T14:43:56.797000
|
||||
@ -287583,7 +287583,7 @@ CVE-2025-23964,0,0,5329b05c42aea8add2b00e40cec17b27a1ae63702685a3839a52b5da9454e
|
||||
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
|
||||
CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000
|
||||
CVE-2025-23967,0,0,7fc0380a265ec940f2b60470b1cf9713d9094d8329ba8cde3022afd9bd781bb0,2025-06-30T18:38:48.477000
|
||||
CVE-2025-23968,1,1,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000
|
||||
CVE-2025-23968,0,0,955f5380954e813c7e88fece29af528205d4507019306da5a36ed360685211a7,2025-07-03T19:15:23.043000
|
||||
CVE-2025-23969,0,0,487de04033365abaa60e5ffa75aa91d7c86b6db89eb8475ac28535f85fa6cbae,2025-06-06T14:06:58.193000
|
||||
CVE-2025-2397,0,0,1d9d522b7da574d99450a0c926cba6b95d7f81a170fb089caa03fceac1350b83,2025-03-18T15:16:01.257000
|
||||
CVE-2025-23971,0,0,b92b26502e7bf23962c464265b1f8680f1f27660b2e187da01a8acb71a6d5407,2025-06-06T14:06:58.193000
|
||||
@ -290564,7 +290564,7 @@ CVE-2025-2862,0,0,d42da37ae120383972bca9b3c34491a1998bf94496751edff9d3b8653ccd4e
|
||||
CVE-2025-2863,0,0,89f439925468e699ad113743583fdeda2696a66656c397c031b5ea7d3d0ecb34,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2864,0,0,1f66654aa924832c01c946b8c047f8723266750dca2c13c7a67536d81d107cad,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2865,0,0,ec0c359364e90a26d27d62ffa0653d855c3daf1b4b8f1b737e51327fd1068f74,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2866,0,0,ef04e1a1e0041aba9fde40dc98be2e2b7c8bb136a3622c61e4c49c0fd00132d4,2025-05-12T19:05:52.590000
|
||||
CVE-2025-2866,0,1,3428fe3ce7007027a58cd386cbee1cc3a467ae571e343e8aadf4b3a4c255f1bd,2025-07-03T21:26:26.980000
|
||||
CVE-2025-2867,0,0,64215baabccd6fdf04d8b048452d95e3b2ff4d5237bc2e15b566982b293865f3,2025-03-27T16:45:12.210000
|
||||
CVE-2025-2868,0,0,8956298391ba0923e590541b3fae1d38dc061830ea826ef81d09ab51842ff44b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2869,0,0,c096e0a3f8c1567897f984075f9b7eae7e0b2ff1c1febfd4a8d8f0861bac0208,2025-03-28T18:11:40.180000
|
||||
@ -290898,7 +290898,7 @@ CVE-2025-29493,0,0,ce433e12ff6f67070d20d51618679346fee9463a5376a363b288e013cda07
|
||||
CVE-2025-29494,0,0,37dc6ae3cff76e33477c0d21d9e70a2e17e406dc0fef9f8cf0d74528f1edd9be,2025-04-01T15:46:09.550000
|
||||
CVE-2025-29496,0,0,1ab18872c422fd3ad83b844719caba98a63d63be68d84ae73e73abccf7b846be,2025-04-01T15:46:19.427000
|
||||
CVE-2025-29497,0,0,f8eaaaad66a08f36734d69d9f1541fb908a272f91f31ad8a75e2ab1b4e1231c2,2025-04-01T15:45:58.123000
|
||||
CVE-2025-2950,0,0,3b933802cf00212e8d12e44372cb1acb183887c45922a207791d57e7adc54e1a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-2950,0,1,7a7b79d92bcd3fc1d6e12e77c95f84880785d2919929e3b4dc42854292e0cc3c,2025-07-03T20:53:15.263000
|
||||
CVE-2025-29504,0,0,509d78872cdb4e1135eb7746b776c8eb568355cb805a55a3297f7c964bf210eb,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29509,0,0,095f2bddd5b7ebbce275436f36ff3580aad46e0210f9776b5d03d79fa13631fc,2025-05-12T17:32:32.760000
|
||||
CVE-2025-2951,0,0,6a15654c1eca83ff82a596d5e3e3899275c59561438cb927263c33c03b7a3c34,2025-04-15T17:07:45.753000
|
||||
@ -292957,7 +292957,7 @@ CVE-2025-32176,0,0,6159199ced4d1cc4cc3fc0a4b90bac4e5cc8fe8b49b458ef45302e363899f
|
||||
CVE-2025-32177,0,0,5421d91f07d2d127d019747a3f9da6a81b9de3ec00f222f0047063dbcd68001b,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32178,0,0,f4356b18673933a5717ebcb4f61fc7f6619aff8d61f40c6a6d6d698282497ddf,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32179,0,0,69ff8c557b664411b6521be65ad34b2b830276fe6b94886ffd74ded06aafb4ed,2025-04-07T14:18:15.560000
|
||||
CVE-2025-3218,0,0,e603beba6e7b5090391d82ad2d9fd742d9df060a981975da316ab7140117d86a,2025-05-07T14:13:20.483000
|
||||
CVE-2025-3218,0,1,b8d3f1a18757671501e9731ba5b9843e9f9d5dc81949aaf6b4a803d34d3bd667,2025-07-03T20:53:29.017000
|
||||
CVE-2025-32180,0,0,a409b84ad0fee336d39330cd0990e4e1a933b45ae7f9c8d16a8202c2417aeef4,2025-05-19T13:35:50.497000
|
||||
CVE-2025-32181,0,0,2a12ab8650c9715ea1bfc7baa58bd93bf89537d12ec9678a79f27189aa5acd2d,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32182,0,0,84b7180d6f1c0263bfb88570f76edf08f572fc8320cfdd5c0eb29ab9580520de,2025-04-07T14:18:15.560000
|
||||
@ -293743,7 +293743,7 @@ CVE-2025-33112,0,0,fbe29f1f149f7078871a044a5ed14a43938b4d758348625746eeccccfd89d
|
||||
CVE-2025-33117,0,0,de9e738b8198492bbddc214157b0f962656ea2e6b12c9d53170d48d5dfe82538,2025-06-23T20:16:59.783000
|
||||
CVE-2025-3312,0,0,d314cd0e3d98597c32289b5f3f4209f174e16c52e8e6ba2862a75de1162b07d0,2025-05-07T16:45:29.103000
|
||||
CVE-2025-33121,0,0,28ac3ca3ae4da8b87a7363c4e87e84438fcfac10cceb19732260209ba8ef9596,2025-06-23T20:16:40.143000
|
||||
CVE-2025-33122,0,0,8bf405156970be92dc185289ab40adc88619763aed68fcabb2d93a6d0c25beb5,2025-06-17T20:50:23.507000
|
||||
CVE-2025-33122,0,1,ddb2854c5b32b139f034678d802f29870b729be2b69f125a8d51de9fcfdf68ee,2025-07-03T20:53:32.687000
|
||||
CVE-2025-3313,0,0,8c3e746212b0f7e34691b425d570770595ed2ddcf9c85476d8c05485bbf5b80a,2025-05-07T16:45:47.623000
|
||||
CVE-2025-33136,0,0,27a78f34bfe266c2ec4d98dca65066403e26999ef14696ceea2068909ce50e9f,2025-05-30T01:19:40.167000
|
||||
CVE-2025-33137,0,0,7682521c272fc983898f262d7a26ae95a5457c4ccfa28cf239219cc364559be5,2025-05-30T01:19:24.883000
|
||||
@ -293873,6 +293873,7 @@ CVE-2025-34058,0,0,fd1d6135cbcb5a939cf5a00698e2051104b6bd46ef2e608640ce59a67cf5e
|
||||
CVE-2025-34059,0,0,45a6f5a690de4057ca2d091f2ebd0e7868dff26548a7187ca235baafdf4d8729,2025-07-03T15:14:12.767000
|
||||
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-34060,0,0,c9e66c79fa3e22979f6d536300a3a69b4248f557ef4ce60fb59bc75630daece1,2025-07-03T15:14:12.767000
|
||||
CVE-2025-34061,1,1,85dfe74227cfb8d6fb527f09d52021638f8c7d3658a36d67197b197c95332243,2025-07-03T20:15:21.570000
|
||||
CVE-2025-34062,0,0,b716d5649a0b2ab449b7a4e5deda5a7ed68b48d3e9d485331bef321a595836de,2025-07-03T15:14:12.767000
|
||||
CVE-2025-34063,0,0,fbf50ba1666892a680b7e726cc84b450cde981ed5af9e60f07742062b62bf6a1,2025-07-03T15:14:12.767000
|
||||
CVE-2025-34064,0,0,eb471144a9811114d1d1834fe8327f3c07a293fa4bbcfab9e78da16542b662d1,2025-07-03T15:14:12.767000
|
||||
@ -293893,6 +293894,11 @@ CVE-2025-34079,0,0,e6d733d75639f74da638a863b1673b04916d219d5fe2f30c247d053c7c8a4
|
||||
CVE-2025-3408,0,0,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000
|
||||
CVE-2025-34080,0,0,7facaa51cd8a6d5555f1a7d11ff6b11423d2fee5e31c80ebe182ad59860e92d0,2025-07-03T15:14:12.767000
|
||||
CVE-2025-34081,0,0,ad8db7fe69d8caab8acca643e7b73c50072fd91c7954d3079104dc722a9fd721,2025-07-03T15:14:12.767000
|
||||
CVE-2025-34082,1,1,68a6b8d6d0b0897ed20277aae825943a68a01da0e3acaff885e71579942468db,2025-07-03T20:15:22.540000
|
||||
CVE-2025-34086,1,1,ca489dad657f1ad721cbdf0ea69a6597ded3f4016d530d86e9bb427a861153d9,2025-07-03T20:15:22.683000
|
||||
CVE-2025-34087,1,1,f301a7c0eca035635293ee08170a251d82a0cd91ae05482ba7360abebf568d92,2025-07-03T20:15:22.843000
|
||||
CVE-2025-34088,1,1,4616bd76fa51987210408713378568b6429093ff5258f16bf1870e7a67ded677,2025-07-03T20:15:23.007000
|
||||
CVE-2025-34089,1,1,9d131e63568006f8f73ec5e6a9d6fb3a0b725a4a942bd750ce78d19c0d87a2e7,2025-07-03T20:15:23.157000
|
||||
CVE-2025-3409,0,0,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-34090,0,0,99b025483d49e908b46ca3c0b6df1bcd3eb9785bb16ccf0a289b98bcd9ea5094,2025-07-03T15:13:53.147000
|
||||
CVE-2025-34091,0,0,80903fb8a73bb14ecdbce066930269d024e03e7b850e9a6f8bfa9891a350a26e,2025-07-03T15:13:53.147000
|
||||
@ -294084,7 +294090,7 @@ CVE-2025-3599,0,0,50511407f557708506d42c82ca157e4b27ffcaf91e7ac0f0029a3b3d58f00d
|
||||
CVE-2025-35995,0,0,a590f4d82a5b6a6ddf49e3e9ff3fcb9f7ad4db6e56f789349ace8583f960ea2e,2025-05-08T14:39:09.683000
|
||||
CVE-2025-35996,0,0,a68f8bf3039aca0fabffa5365ae47dde1016d171f7f66e0132baceb8c4b864b9,2025-05-02T13:52:51.693000
|
||||
CVE-2025-3600,0,0,7cb206206065fd210a153f067dfc260287fb233b025f8a59e4c30ab1efc7f613,2025-05-16T14:43:56.797000
|
||||
CVE-2025-36004,0,0,0a01f92ec8ed981f105aaa2da46bf8f144b50e5b88bce227ac7752c1ea333d5a,2025-06-26T18:58:14.280000
|
||||
CVE-2025-36004,0,1,a7606dc7f0db1d2572a7485d0d3bb38993c9f09ef8a130e8809723820465f823,2025-07-03T20:53:35.667000
|
||||
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
|
||||
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
|
||||
CVE-2025-36026,0,0,af5d1cd39202bd9c522b391511525b9286e9d9645df4651893a8424afeeff6cc,2025-07-01T14:22:26.260000
|
||||
@ -296209,7 +296215,7 @@ CVE-2025-45797,0,0,9ceb633e87e0ccdd08b067f487627f7a3614f4d7f4f938b0faf7b483b05c0
|
||||
CVE-2025-45798,0,0,1e256e91813f740bb0ddebf5c159b4041ec84583a75a9898cffd38b365095dd3,2025-05-19T15:08:18.653000
|
||||
CVE-2025-4580,0,0,2c434f3aced55b1225815c7de47b3cc229863447aaf3ca455a84427f71dfeaeb,2025-06-04T20:04:21.700000
|
||||
CVE-2025-45800,0,0,2adeb4a59c132c5d4a56fe8afda223e1c5b86658a949bac17c9d9bc540ba8292,2025-06-04T17:26:02.743000
|
||||
CVE-2025-45809,1,1,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000
|
||||
CVE-2025-45809,0,0,761c39099d492fdb34e718803ab4d94f39f05bc4978719e2f84573e3b170d1ca,2025-07-03T19:15:24.027000
|
||||
CVE-2025-45813,0,0,1cdb35349454355ea90284f73a3a629e371e03fd1917b24cadfbc183cc8f1c12,2025-07-03T15:13:53.147000
|
||||
CVE-2025-45814,0,0,8e500fbe650a74a0fb125601ba4882cc600d6293d2674f68472c4b342456b8fe,2025-07-03T15:13:53.147000
|
||||
CVE-2025-45818,0,0,9a72de08da5294536bea0753f94263b2b855db9b94abd12b9c3b0d1fd37d9e3b,2025-06-17T19:42:01.770000
|
||||
@ -297985,6 +297991,7 @@ CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094
|
||||
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
|
||||
CVE-2025-49003,0,0,fba2fa2a264a5c8271213cb9de26bd128e1b1ae572a3e285db1d3ea73352c4b7,2025-06-26T18:57:43.670000
|
||||
CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49005,1,1,f5da460018e782ea866a592b7801484459ecd48c23166d1ec275b3a62e9024d1,2025-07-03T21:15:26.787000
|
||||
CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000
|
||||
CVE-2025-49008,0,0,5906f158b4998a3ea295f4b31b7f6d29c67e9e9abb77b31bc6681c8bf5f684d0,2025-06-05T20:12:23.777000
|
||||
@ -298360,6 +298367,7 @@ CVE-2025-49822,0,0,de49443b576bc1f584b5a6900459b73ba17d0494708f2396f6ea98c8b4c73
|
||||
CVE-2025-49823,0,0,552cd4fad516f02486ff3428bf048ea275d9b1dd6acc2c30a167deddc98bdc84,2025-06-17T20:50:23.507000
|
||||
CVE-2025-49824,0,0,974ad385597c7ebe1657b4c04293530cc71abe0711af75ee866eb4ab4d2dd957,2025-06-18T13:46:52.973000
|
||||
CVE-2025-49825,0,0,f444b584006d5aede2c38e3ee10f0e113cb3d3f832999c3a3531ef94f625084b,2025-06-18T13:46:52.973000
|
||||
CVE-2025-49826,1,1,bdcff8f3ca585f0644a6ec8691cba9051d6c219e38e7afe53977ef4fd356b423,2025-07-03T21:15:27.287000
|
||||
CVE-2025-4983,0,0,8b53f9fcac717498609c6596ba194e3872474340efe5891a55ff7cfbe70e31d1,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4984,0,0,8011ca13e469a81f6afb4511e42cccafc7f5c3edf7ae8617debc1cb5fd406589,2025-05-30T16:31:03.107000
|
||||
CVE-2025-49842,0,0,25f68be05f1cee4c74ac248773f32070b2173a4b15896e09f4b989979b7acc44,2025-06-17T20:50:23.507000
|
||||
@ -298757,6 +298765,7 @@ CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bd
|
||||
CVE-2025-5255,0,0,b023caeeba2421cb86c7482514e264205e254122220d82c6bc67ef741a68d935,2025-06-23T20:16:40.143000
|
||||
CVE-2025-52552,0,0,355ff6e466a39f4325662bbaa49db2816c79c0533f84f99cc3e34c03831df356,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52553,0,0,a39f718ab824da2cdd9dc21d65a0414d2ad7d6b511be6b992312d854e52baa0a,2025-06-30T18:38:23.493000
|
||||
CVE-2025-52554,1,1,b1acdad6caf49f3b451c50125dfcbd7aca94dab5d45e04b2d092965e656df2fa,2025-07-03T20:15:23.423000
|
||||
CVE-2025-52555,0,0,6a75b391ee3c8272fca348930578b6893d5d810e2019dea636affd2993361902,2025-06-30T18:38:48.477000
|
||||
CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be9ba,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
|
||||
@ -299070,7 +299079,11 @@ CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad959346
|
||||
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
|
||||
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
|
||||
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
|
||||
CVE-2025-53367,1,1,98ccbfda09d8ace8af64393016345c61888d50f9c101c3aa87422d100c99dc24,2025-07-03T21:15:27.493000
|
||||
CVE-2025-53368,1,1,be3c0a7f58e2bbd4e68679c536da2e841620327ebe3522ae8a918c23f429e2ff,2025-07-03T20:15:23.577000
|
||||
CVE-2025-53369,1,1,935c1344485ff5b914be62cc3781976d8c660c47c3bc47debabf78b9f979ea5a,2025-07-03T20:15:23.737000
|
||||
CVE-2025-5337,0,0,f5b214301a56cadaeebc0b9a86ddeaf885fbd4e9b8e681558e7ccfb718bae2b0,2025-06-16T12:32:18.840000
|
||||
CVE-2025-53370,1,1,ab22dbf75672a7a4f2267e5b00d1bde032c4143aa87d40c57e89361f247504be,2025-07-03T20:15:23.893000
|
||||
CVE-2025-5338,0,0,7d03b6675327abe3166794a3aea1334fe78b5ed9861d33098569022851345f63,2025-06-26T18:57:43.670000
|
||||
CVE-2025-53380,0,0,778a4ed3b4b51402648379b0a66e0653fc3388939d52b44cfb536c593d391f6d,2025-06-28T03:15:24.373000
|
||||
CVE-2025-53381,0,0,5bca2379c91be4fadf0c25a7392b9c1b3f109e154b7525c42492575516c349ca,2025-06-28T03:15:25.393000
|
||||
@ -299089,15 +299102,15 @@ CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2c
|
||||
CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000
|
||||
CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f38c5,2025-07-01T08:15:24.610000
|
||||
CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000
|
||||
CVE-2025-53489,0,1,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000
|
||||
CVE-2025-53489,0,0,6769a7875609bf94b88a0e114ee9f59c80c8131a1c840fb5a9a3308771e635ea,2025-07-03T18:15:21.710000
|
||||
CVE-2025-5349,0,0,c3dba6df59d2293dc5933fab4b44180a83c69961191d6e1c8668a3b028af5d72,2025-06-17T20:50:23.507000
|
||||
CVE-2025-53490,0,1,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22
|
||||
CVE-2025-53490,0,0,e9251db1fea5e6093c2fe7b28bed6cbf3c105295c53f6dbe7693f6d5d13423ff,2025-07-03T18:15:22
|
||||
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
|
||||
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
|
||||
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
|
||||
CVE-2025-53500,0,1,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000
|
||||
CVE-2025-53501,0,1,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000
|
||||
CVE-2025-53502,0,1,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000
|
||||
CVE-2025-53500,0,0,4e600160e0338af8f29e334cc4de18af82b5375f94d3896f9cbf3cc874d5159e,2025-07-03T18:15:22.140000
|
||||
CVE-2025-53501,0,0,21c335a8cee7517960e84f19187025efcea385227ba1fb22ef8cc3a8c10a8e56,2025-07-03T18:15:22.300000
|
||||
CVE-2025-53502,0,0,8620e1fa54158c5ea47ec511c9a4e70659635a1ba5079b6185bdce67f385eae0,2025-07-03T18:15:22.530000
|
||||
CVE-2025-5353,0,0,a9d9e9f405a59eeaccd7ee5466c700cdd9eae2ba20f2bc9c98c5c42953abdf75,2025-06-12T16:06:39.330000
|
||||
CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000
|
||||
CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000
|
||||
@ -300208,7 +300221,7 @@ CVE-2025-6916,0,0,524850ebae15b52ae083b8140e4ab97ad9b5dd7a5e34956ff208001c526a5f
|
||||
CVE-2025-6917,0,0,129e7ed7538995bd47122ea1abcbbb313d42d5948a17ca0bbad09769943187c8,2025-06-30T18:38:23.493000
|
||||
CVE-2025-6920,0,0,92f153f201754cb01ae808c528460cedb35114cf4759cf0d03fac580d4198aee,2025-07-03T15:14:12.767000
|
||||
CVE-2025-6925,0,0,9b6fc4858861f5dc5e36531cf5cf597ec00fe77481d8d8c4445a1b8259bb2b27,2025-06-30T19:15:25.920000
|
||||
CVE-2025-6926,0,1,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000
|
||||
CVE-2025-6926,0,0,7fab1723fdac5be2c9c2a2d693667480fa6a04b2dd5cc589a2b96bc15ab8525f,2025-07-03T18:15:22.797000
|
||||
CVE-2025-6929,0,0,06dc8ff62d3e6d602a7ed0d7b089f7cc33d58dd53c0466cf2fa3f70110505908,2025-07-03T15:14:12.767000
|
||||
CVE-2025-6930,0,0,5fa54aec3bce753c0cb7b9bc216390a901032fb371a178f32c2e5f88307f3800,2025-07-03T15:14:12.767000
|
||||
CVE-2025-6931,0,0,ea2ff5a0469a3df9ef65d87bf71684c0690aa2650e532d6b10eadd6580773a20,2025-07-03T15:14:12.767000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user