mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-21T15:00:31.346581+00:00
This commit is contained in:
parent
5612ab5657
commit
cc230577a2
21
CVE-2020/CVE-2020-61xx/CVE-2020-6158.json
Normal file
21
CVE-2020/CVE-2020-61xx/CVE-2020-6158.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2020-6158",
|
||||
"sourceIdentifier": "security@opera.com",
|
||||
"published": "2025-02-21T14:15:29.843",
|
||||
"lastModified": "2025-02-21T14:15:29.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Opera Mini for Android before version 52.2 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.opera.com/en/address-bar-spoofing-in-opera-mini-for-android-opera-security-advisories/",
|
||||
"source": "security@opera.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-102xx/CVE-2024-10222.json
Normal file
68
CVE-2024/CVE-2024-102xx/CVE-2024-10222.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-10222",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-21T14:15:30.680",
|
||||
"lastModified": "2025-02-21T14:15:30.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/benbodhi/svg-support/commit/eee3e13b650511c9cc9ee0746be485d031c7c072",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3244181/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/svg-support/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5852f08d-0506-464e-afd1-c625e4034e1d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12133",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-10T16:15:37.260",
|
||||
"lastModified": "2025-02-10T16:15:37.260",
|
||||
"lastModified": "2025-02-21T13:15:10.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,6 +67,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/02/06/6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-13417",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-02-06T20:15:39.273",
|
||||
"lastModified": "2025-02-06T20:15:39.273",
|
||||
"lastModified": "2025-02-21T13:15:11.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state."
|
||||
"value": "Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state.\n\n\n\n\n2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-13667",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T11:15:11.090",
|
||||
"lastModified": "2025-02-18T11:15:11.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-21T14:23:07.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Uncode theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018mle-description\u2019 parameter in all versions up to, and including, 2.9.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Uncode para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro \"Descripci\u00f3n MLE\" en todas las versiones hasta 2.9.1.6 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto hace posible a los atacantes autenticados, con acceso a nivel de suscriptor y arriba, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.1.7",
|
||||
"matchCriteriaId": "0BF92FE6-91A3-4135-9612-7C036CAFBE93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee188cc-2c3f-45e7-b7ce-928242035e37?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-13681",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T11:15:11.270",
|
||||
"lastModified": "2025-02-18T11:15:11.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-21T14:22:38.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_admin_get_oembed' function in all versions up to, and including, 2.9.1.6. This makes it possible for unauthenticated attackers to read arbitrary files on the server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Uncode para WordPress es vulnerable a la lectura del archivo arbitrario debido a la validaci\u00f3n de entrada insuficiente en la funci\u00f3n 'Uncode_admin_get_oembed' en todas las versiones hasta 2.9.1.6 incluida. Esto hace posible que los atacantes no autenticados lean archivos arbitrarios en el servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,23 +42,57 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.1.7",
|
||||
"matchCriteriaId": "0BF92FE6-91A3-4135-9612-7C036CAFBE93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7914ebe6-b5e1-4a1a-8794-80f515e6c9f6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-13691",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T11:15:11.430",
|
||||
"lastModified": "2025-02-18T11:15:11.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-21T14:22:06.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Uncode theme for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'uncode_recordMedia' function in all versions up to, and including, 2.9.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary files on the server."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Uncode para WordPress es vulnerable a la lectura de archivos arbitrarios debido a la validaci\u00f3n insuficiente de entrada en la funci\u00f3n 'Uncode_recordMedia' en todas las versiones hasta 2.9.1.6 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y arriba, lean archivos arbitrarios en el servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,23 +42,57 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:undsgn:uncode:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.1.7",
|
||||
"matchCriteriaId": "0BF92FE6-91A3-4135-9612-7C036CAFBE93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d592141d-191b-4739-bc0a-07549ef2f31b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26596",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-23T15:15:09.500",
|
||||
"lastModified": "2024-11-21T09:02:37.323",
|
||||
"lastModified": "2025-02-21T14:15:31.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -82,6 +82,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9e9953f5e4d6d11a9dad56fdee307bb923302809",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dbd909c20c11f0d29c0054d41e0d1f668a60e8c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2668",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-20T02:15:08.857",
|
||||
"lastModified": "2024-11-21T09:10:15.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:58:19.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_job_finder_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DDC95063-8685-493D-AB1B-071857614FBB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2010.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257368",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257368",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Job%20Finder%20System/Online%20Job%20Finder%20System%20-%20vuln%2010.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257368",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257368",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40945",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:16.853",
|
||||
"lastModified": "2025-02-03T15:38:59.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:34.213",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6325eab6c108fed27f60ff51852e3eac0ba23f3f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/700f564758882db7c039dfba9443fe762561a3f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42122",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-30T08:15:04.430",
|
||||
"lastModified": "2024-12-09T13:10:02.027",
|
||||
"lastModified": "2025-02-21T14:15:42.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -77,6 +77,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/552e7938b4d7fe548fbf29b9950a14c6149d0470",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e65a1b7118acf6af96449e1e66b7adbc9396912",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-47256",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-02-06T20:15:39.533",
|
||||
"lastModified": "2025-02-06T20:15:39.533",
|
||||
"lastModified": "2025-02-21T13:15:11.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older."
|
||||
"value": "Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older.\n\n\n\n\n\n\n2N has released an updated version 3.3 of 2N Access Commander, where this vulnerability is mitigated. It is recommended that all customers update 2N Access Commander to the latest version."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-47258",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-02-06T20:15:39.643",
|
||||
"lastModified": "2025-02-06T20:15:39.643",
|
||||
"lastModified": "2025-02-21T13:15:11.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices."
|
||||
"value": "2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices. \n\n\n\n\n\n2N has currently released an updated version 3.3 of 2N Access Commander, with added Certificate Fingerprint Verification. Since version 2.2 of 2N Access Commander (released in February 2022) it is also possible to enforce TLS certificate validation.It is recommended that all customers update 2N Access Commander to the latest version and use one of two mentioned practices."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47726",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:02.767",
|
||||
"lastModified": "2025-01-09T16:16:20.367",
|
||||
"lastModified": "2025-02-21T14:15:46.113",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,6 +87,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f81302decd64245bb1bd154ecae0f65a9ee21f04",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49919",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:14.117",
|
||||
"lastModified": "2024-10-25T14:55:47.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:46.800",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -77,6 +77,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16ce8fd94da8599bb6f0496895d392a69aead1c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/390d757621f5f35d11a63ed7d9d3262ead240064",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49923",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:14.390",
|
||||
"lastModified": "2024-10-24T19:43:27.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:47.720",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -77,6 +77,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39a580cd15397e102aaec25986ae5acf492f8930",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5559598742fb4538e4c51c48ef70563c49c2af23",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49989",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T18:15:19.207",
|
||||
"lastModified": "2024-10-25T20:02:16.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:48.487",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -111,6 +111,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/df948b5ba6858d5da34f622d408e5517057cec07",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4912",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:08.720",
|
||||
"lastModified": "2024-11-21T09:43:51.157",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:54:45.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264447",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264447",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333402",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264447",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264447",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333402",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4913",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T21:15:09.000",
|
||||
"lastModified": "2024-11-21T09:43:51.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:51:59.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264448",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264448",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333403",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264448",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264448",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333403",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4914",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T22:15:09.153",
|
||||
"lastModified": "2024-11-21T09:43:51.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:43:26.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_ranking-exam.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264449",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264449",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333407",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_ranking-exam.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264449",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264449",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333407",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4915",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T22:15:09.563",
|
||||
"lastModified": "2024-11-21T09:43:51.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:41:20.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_result.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264450",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264450",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333408",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_result.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264450",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264450",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333408",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4916",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T23:15:07.607",
|
||||
"lastModified": "2024-11-21T09:43:51.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:35:39.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_selExamAttemptExe.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264451",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264451",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333409",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_selExamAttemptExe.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264451",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264451",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333409",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4917",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T23:15:07.920",
|
||||
"lastModified": "2024-11-21T09:43:51.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:30:29.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_submitAnswerExe.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264452",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264452",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333410",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_submitAnswerExe.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264452",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264452",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333410",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4918",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-15T23:15:08.210",
|
||||
"lastModified": "2024-11-21T09:43:52.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:12:17.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,87 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_updateQuestion.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264453",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264453",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333415",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_updateQuestion.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.264453",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.264453",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333415",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50061",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T20:15:18.210",
|
||||
"lastModified": "2024-10-23T21:48:29.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:49.370",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -77,6 +77,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a21bad9964c91b34d65ba269914233720c0b1ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/609366e7a06d035990df78f1562291c3bf0d4a12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50070",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-29T01:15:04.257",
|
||||
"lastModified": "2024-10-30T16:59:39.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:50.130",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -107,6 +107,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a8d52de0a6c6b091b2771bcb98ce408cf9d69fe3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b0f0e3f0552a566def55c844b0d44250c58e4df6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56549",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-27T14:15:34.747",
|
||||
"lastModified": "2025-02-17T12:15:27.240",
|
||||
"lastModified": "2025-02-21T14:15:50.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -96,6 +96,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6bba3ece960129a553d4b16f1b00c884dc0993a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f98770440c9bc468e2fd878212ec9526dbe08293",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0111",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2025-02-12T21:15:16.793",
|
||||
"lastModified": "2025-02-21T02:00:01.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:50:23.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-20",
|
||||
@ -75,12 +97,287 @@
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-610"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.1.0",
|
||||
"versionEndExcluding": "10.1.14",
|
||||
"matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2.0",
|
||||
"versionEndExcluding": "10.2.7",
|
||||
"matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2.10",
|
||||
"versionEndExcluding": "10.2.12",
|
||||
"matchCriteriaId": "F9BD5E2D-61D2-4872-ACD1-D5B442CC809D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0",
|
||||
"versionEndExcluding": "11.1.6",
|
||||
"matchCriteriaId": "855047CA-ABFA-4F3D-AF98-245D14B75798"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2.0",
|
||||
"versionEndExcluding": "11.2.4",
|
||||
"matchCriteriaId": "7E4D3A51-0A40-4B19-AAFC-A2484B1CF5D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B41A7115-A370-49E1-B162-24803E6DD2CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65949A49-03A7-491C-B327-127F050AC4F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8ACB147-B4C1-4964-B538-EAA117CC6DC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6643574D-C024-440C-9392-004B7FA4498F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7422F37D-7ABA-4BEC-8448-45A8F585D6F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA91A4E9-CE1E-4CB8-B717-4B0E314C0171"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1311961A-0EF6-488E-B0C2-EDBD508587C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C889402F-138A-45B9-BBCF-91FD18A0B810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCC2A6DA-EB48-42CD-9234-A80C3F6AEFAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "046874F8-7DA7-4E2A-99BF-509424E6CCBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D33A0FB-7538-42BF-84E8-7CCD7EEF9355"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB95D77F-1263-4D47-A0BB-94A6DA937115"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EA4C2A7-18CD-4232-B08C-99BEFE497A57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357B747E-F960-4AA9-8696-B3BD89933630"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FDB3D90-6656-49C5-9852-1F987BAEF0F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B871A6-0636-42A0-9573-6F693D7753AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FC63B8-B8D9-4EC1-85CA-2E12B38ACD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60CE628F-C4CB-4342-8D71-DE61A089B612"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52C50A07-F4D8-4F1F-BA61-3429BB1721BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01AD190-F3C2-4349-A063-8C5C78B725B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30F4CD1C-6862-4279-8D2D-40B4D164222F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A52B7A7A-483A-4075-B1E9-5C14B66F7FC3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2025-0111",
|
||||
"source": "psirt@paloaltonetworks.com"
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21684",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-09T12:15:29.623",
|
||||
"lastModified": "2025-02-11T16:12:41.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-21T14:15:52.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,6 +133,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0ed2d0abc021f56fa27dc6d0770535c1851a43b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21687",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-10T16:15:38.207",
|
||||
"lastModified": "2025-02-17T12:15:27.790",
|
||||
"lastModified": "2025-02-21T14:15:52.733",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -18,15 +18,7 @@
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03844b1908114680ca35fa0a0aba3d906a6d78af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/198090eb6f5f094cf3a268c3c30ef1e9c84a6dbe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/61ba518195d61c38c6cb86f83135e51f93735442",
|
||||
"url": "https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21700",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-13T12:15:27.837",
|
||||
"lastModified": "2025-02-13T14:16:18.803",
|
||||
"lastModified": "2025-02-21T14:15:54.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bc50835e83f60f56e9bec2b392fb5544f250fb6f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/deda09c0543a66fa51554abc5ffd723d99b191bf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21701",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-13T15:15:20.867",
|
||||
"lastModified": "2025-02-13T15:15:20.867",
|
||||
"lastModified": "2025-02-21T14:15:55.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -29,6 +29,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/4dc880245f9b529fa8f476b5553c799d2848b47b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b1cb37a31a482df3dd35a6ac166282dac47664f4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b382ab9b885cbb665e0e70a727f101c981b4edf3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-21703",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-18T15:15:18.633",
|
||||
"lastModified": "2025-02-18T16:15:20.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-21T14:15:56.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netem: Actualizar sch->q.qlen antes de qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifica a la qdisc principal solo si la qdisc secundaria se vac\u00eda, por lo tanto, debemos reducir el backlog de la qdisc secundaria antes de llamarla. De lo contrario, perder\u00eda la oportunidad de llamar a cops->qlen_notify(), en el caso de DRR, result\u00f3 en UAF ya que DRR usa ->qlen_notify() para mantener su lista activa."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -60,6 +64,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/638ba5089324796c2ee49af10427459c2de35f71",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7b79ca9a1de6a428d486ff52fb3d602321c08f55",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/839ecc583fa00fab785fde1c85a326743657fd32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22208",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2025-02-15T09:15:11.043",
|
||||
"lastModified": "2025-02-18T21:15:26.527",
|
||||
"lastModified": "2025-02-21T13:15:11.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22208",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://joomsky.com/js-jobs-joomla/",
|
||||
"source": "security@joomla.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22209",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2025-02-15T09:15:11.237",
|
||||
"lastModified": "2025-02-18T21:15:26.670",
|
||||
"lastModified": "2025-02-21T13:15:11.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22209",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://joomsky.com/js-jobs-joomla/",
|
||||
"source": "security@joomla.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23209",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-18T01:15:07.633",
|
||||
"lastModified": "2025-02-21T02:00:01.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-21T14:48:55.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,18 +75,83 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "4.0.0",
|
||||
"versionEndExcluding": "4.13.8",
|
||||
"matchCriteriaId": "A969ACE2-4C09-452A-B9BD-113CA9A4FF30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.0.0",
|
||||
"versionEndExcluding": "5.5.8",
|
||||
"matchCriteriaId": "8DBFB276-7508-492E-ACBA-A229E869A831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:4.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "610F6DE9-720F-45B3-81D5-18E7F6B090FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:4.0.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC2F40FC-7C27-456A-B16D-679410D1D5CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:4.0.0:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBAA8227-04F8-404C-907B-B0162B325F5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:4.0.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21B28E2C-327A-4CE6-ACAD-97E459712A55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:5.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C7461CF-35AB-48E1-88B6-956DAE1D2AB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:craftcms:craft_cms:5.0.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D8E02D1-601A-4E2B-B619-4775BFDB72D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://craftcms.com/knowledge-base/securing-craft#keep-your-secrets-secret",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/commit/e59e22b30c9dd39e5e2c7fe02c147bcbd004e603",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-267xx/CVE-2025-26794.json
Normal file
68
CVE-2025/CVE-2025-267xx/CVE-2025-26794.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-26794",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-21T13:15:11.687",
|
||||
"lastModified": "2025-02-21T13:15:11.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Exim 4.98 anterior a la vers\u00edon 4.98.1 permite una inyecci\u00f3n SQL remota cuando se usan serializaci\u00f3n de ETRN con la tabla hints en SQLite."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exim.org",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exim.org/static/doc/security/CVE-2025-26794.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/02/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
55
README.md
55
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-21T13:01:00.013693+00:00
|
||||
2025-02-21T15:00:31.346581+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-21T12:19:42.537000+00:00
|
||||
2025-02-21T14:58:19.927000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,36 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
282007
|
||||
282010
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-13455](CVE-2024/CVE-2024-134xx/CVE-2024-13455.json) (`2025-02-21T12:15:29.823`)
|
||||
- [CVE-2024-13713](CVE-2024/CVE-2024-137xx/CVE-2024-13713.json) (`2025-02-21T12:15:30.040`)
|
||||
- [CVE-2024-13846](CVE-2024/CVE-2024-138xx/CVE-2024-13846.json) (`2025-02-21T12:15:30.183`)
|
||||
- [CVE-2024-13900](CVE-2024/CVE-2024-139xx/CVE-2024-13900.json) (`2025-02-21T12:15:30.320`)
|
||||
- [CVE-2024-9150](CVE-2024/CVE-2024-91xx/CVE-2024-9150.json) (`2025-02-21T12:15:30.463`)
|
||||
- [CVE-2025-1402](CVE-2025/CVE-2025-14xx/CVE-2025-1402.json) (`2025-02-21T12:15:30.607`)
|
||||
- [CVE-2025-1489](CVE-2025/CVE-2025-14xx/CVE-2025-1489.json) (`2025-02-21T12:15:30.740`)
|
||||
- [CVE-2025-1535](CVE-2025/CVE-2025-15xx/CVE-2025-1535.json) (`2025-02-21T12:15:30.877`)
|
||||
- [CVE-2020-6158](CVE-2020/CVE-2020-61xx/CVE-2020-6158.json) (`2025-02-21T14:15:29.843`)
|
||||
- [CVE-2024-10222](CVE-2024/CVE-2024-102xx/CVE-2024-10222.json) (`2025-02-21T14:15:30.680`)
|
||||
- [CVE-2025-26794](CVE-2025/CVE-2025-267xx/CVE-2025-26794.json) (`2025-02-21T13:15:11.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
- [CVE-2024-11628](CVE-2024/CVE-2024-116xx/CVE-2024-11628.json) (`2025-02-21T12:08:11.927`)
|
||||
- [CVE-2024-13416](CVE-2024/CVE-2024-134xx/CVE-2024-13416.json) (`2025-02-21T12:15:29.193`)
|
||||
- [CVE-2024-13783](CVE-2024/CVE-2024-137xx/CVE-2024-13783.json) (`2025-02-21T12:19:42.537`)
|
||||
- [CVE-2024-13797](CVE-2024/CVE-2024-137xx/CVE-2024-13797.json) (`2025-02-21T12:17:17.200`)
|
||||
- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-02-21T12:03:31.920`)
|
||||
- [CVE-2025-0521](CVE-2025/CVE-2025-05xx/CVE-2025-0521.json) (`2025-02-21T12:16:09.897`)
|
||||
- [CVE-2025-0817](CVE-2025/CVE-2025-08xx/CVE-2025-0817.json) (`2025-02-21T12:15:11.963`)
|
||||
- [CVE-2025-1094](CVE-2025/CVE-2025-10xx/CVE-2025-1094.json) (`2025-02-21T11:15:09.800`)
|
||||
- [CVE-2025-1208](CVE-2025/CVE-2025-12xx/CVE-2025-1208.json) (`2025-02-21T12:03:49.027`)
|
||||
- [CVE-2024-47256](CVE-2024/CVE-2024-472xx/CVE-2024-47256.json) (`2025-02-21T13:15:11.207`)
|
||||
- [CVE-2024-47258](CVE-2024/CVE-2024-472xx/CVE-2024-47258.json) (`2025-02-21T13:15:11.300`)
|
||||
- [CVE-2024-47726](CVE-2024/CVE-2024-477xx/CVE-2024-47726.json) (`2025-02-21T14:15:46.113`)
|
||||
- [CVE-2024-4912](CVE-2024/CVE-2024-49xx/CVE-2024-4912.json) (`2025-02-21T14:54:45.450`)
|
||||
- [CVE-2024-4913](CVE-2024/CVE-2024-49xx/CVE-2024-4913.json) (`2025-02-21T14:51:59.877`)
|
||||
- [CVE-2024-4914](CVE-2024/CVE-2024-49xx/CVE-2024-4914.json) (`2025-02-21T14:43:26.573`)
|
||||
- [CVE-2024-4915](CVE-2024/CVE-2024-49xx/CVE-2024-4915.json) (`2025-02-21T14:41:20.890`)
|
||||
- [CVE-2024-4916](CVE-2024/CVE-2024-49xx/CVE-2024-4916.json) (`2025-02-21T14:35:39.890`)
|
||||
- [CVE-2024-4917](CVE-2024/CVE-2024-49xx/CVE-2024-4917.json) (`2025-02-21T14:30:29.407`)
|
||||
- [CVE-2024-4918](CVE-2024/CVE-2024-49xx/CVE-2024-4918.json) (`2025-02-21T14:12:17.317`)
|
||||
- [CVE-2024-49919](CVE-2024/CVE-2024-499xx/CVE-2024-49919.json) (`2025-02-21T14:15:46.800`)
|
||||
- [CVE-2024-49923](CVE-2024/CVE-2024-499xx/CVE-2024-49923.json) (`2025-02-21T14:15:47.720`)
|
||||
- [CVE-2024-49989](CVE-2024/CVE-2024-499xx/CVE-2024-49989.json) (`2025-02-21T14:15:48.487`)
|
||||
- [CVE-2024-50061](CVE-2024/CVE-2024-500xx/CVE-2024-50061.json) (`2025-02-21T14:15:49.370`)
|
||||
- [CVE-2024-50070](CVE-2024/CVE-2024-500xx/CVE-2024-50070.json) (`2025-02-21T14:15:50.130`)
|
||||
- [CVE-2024-56549](CVE-2024/CVE-2024-565xx/CVE-2024-56549.json) (`2025-02-21T14:15:50.947`)
|
||||
- [CVE-2025-0111](CVE-2025/CVE-2025-01xx/CVE-2025-0111.json) (`2025-02-21T14:50:23.877`)
|
||||
- [CVE-2025-21684](CVE-2025/CVE-2025-216xx/CVE-2025-21684.json) (`2025-02-21T14:15:52.103`)
|
||||
- [CVE-2025-21687](CVE-2025/CVE-2025-216xx/CVE-2025-21687.json) (`2025-02-21T14:15:52.733`)
|
||||
- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-21T14:15:54.717`)
|
||||
- [CVE-2025-21701](CVE-2025/CVE-2025-217xx/CVE-2025-21701.json) (`2025-02-21T14:15:55.747`)
|
||||
- [CVE-2025-21703](CVE-2025/CVE-2025-217xx/CVE-2025-21703.json) (`2025-02-21T14:15:56.627`)
|
||||
- [CVE-2025-22208](CVE-2025/CVE-2025-222xx/CVE-2025-22208.json) (`2025-02-21T13:15:11.400`)
|
||||
- [CVE-2025-22209](CVE-2025/CVE-2025-222xx/CVE-2025-22209.json) (`2025-02-21T13:15:11.553`)
|
||||
- [CVE-2025-23209](CVE-2025/CVE-2025-232xx/CVE-2025-23209.json) (`2025-02-21T14:48:55.367`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
105
_state.csv
105
_state.csv
@ -161587,6 +161587,7 @@ CVE-2020-6153,0,0,f69b45725231969ea6223aa352ea374bca6b2f6546843d2052ca4bb42afd13
|
||||
CVE-2020-6155,0,0,af216f2fd30418af6f9169288c76f62a5bf552443bbb9848cccb6c949b9bd712,2024-11-21T05:35:12.747000
|
||||
CVE-2020-6156,0,0,e53e4103dd1609ef71a4b21fc35eca75ebe24055e52b5727ec34da97a19fdd4c,2024-11-21T05:35:12.857000
|
||||
CVE-2020-6157,0,0,5560e8237eff2e29bedc5837e90fa718516854d35693f276bbc6a0bb02449175,2024-11-21T05:35:12.963000
|
||||
CVE-2020-6158,1,1,b5ecdb7da43385eff2345cbd95306895c5bcfceccdb3160832bbeb5ec1cd39d3,2025-02-21T14:15:29.843000
|
||||
CVE-2020-6159,0,0,1d58458a18fa2ede0d62643789a6c12935ef5b89b2528f56ce13ab00d5a87d15,2024-11-21T05:35:13.073000
|
||||
CVE-2020-6162,0,0,542b480d5204cd026e22f7e2f7ce9cac5f107717db6fe8047474dca2fe19b355,2024-11-21T05:35:13.180000
|
||||
CVE-2020-6163,0,0,6816edc60b53bff2a1c8daeaad04f547f83edfa4bd6abb5deba2e02728b72a82,2024-11-21T05:35:13.310000
|
||||
@ -243709,6 +243710,7 @@ CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0
|
||||
CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000
|
||||
CVE-2024-1022,0,0,2538d56f6669aecae5f12904278656fbaaa9fa83dd2447751caf0dde04c23b1f,2024-11-21T08:49:37.160000
|
||||
CVE-2024-10220,0,0,0717049f6d4c212a875763951e37b8f3da2918e18cb00732d9d60eff6c4a140d,2024-11-22T17:15:06.650000
|
||||
CVE-2024-10222,1,1,a6ca531f70eae3a23ac6713dcc60df403d48fa9c5b9ea19669f3314137f83531,2025-02-21T14:15:30.680000
|
||||
CVE-2024-10223,0,0,5f5e151c95f5ef79d0a7fc297e9a009a73a481f63f2b3ce4a2e96835fd5bc43d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10224,0,0,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
|
||||
CVE-2024-10226,0,0,90902af4bb0025c8b4afcf3dd7a0c8ab645b3d8bdbe2f31e8aac22ff12a9d686,2024-10-31T16:48:41.553000
|
||||
@ -244984,7 +244986,7 @@ CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153
|
||||
CVE-2024-11625,0,0,c71612eff4dbfdfd57dcd77786b9f90aeda1003c787b3baa9b3e022b7aa38e14,2025-01-07T09:15:06.560000
|
||||
CVE-2024-11626,0,0,e05f68563d0cfe4fcf37166c88856797ec0301944e16df5d7b6760557f29956d,2025-01-07T09:15:07.533000
|
||||
CVE-2024-11627,0,0,9ff1a8df860daf1368acfa4151c0612097655e3c1d986846213632a0d4bd06d7,2025-01-07T09:15:07.633000
|
||||
CVE-2024-11628,0,1,7c5616b880f8e46349d606dff048f573949b5a6f95ae4c87d4a1d5678ef21441,2025-02-21T12:08:11.927000
|
||||
CVE-2024-11628,0,0,7c5616b880f8e46349d606dff048f573949b5a6f95ae4c87d4a1d5678ef21441,2025-02-21T12:08:11.927000
|
||||
CVE-2024-11629,0,0,c03c8073dae9eb5d857d83b66f0e9182250584b24834bf542305a5224d4450fc,2025-02-19T19:09:11.177000
|
||||
CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000
|
||||
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
|
||||
@ -245467,7 +245469,7 @@ CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31
|
||||
CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000
|
||||
CVE-2024-12131,0,0,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000
|
||||
CVE-2024-12132,0,0,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000
|
||||
CVE-2024-12133,0,0,2a5834cce8e50191d97409470104657512e1dc91407b2b2698e08f3342d92ebf,2025-02-10T16:15:37.260000
|
||||
CVE-2024-12133,0,1,6bf377b889cff4de6171d2a9027b1a17bce7f2dd91b7456e427087f02e89773b,2025-02-21T13:15:10.430000
|
||||
CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000
|
||||
CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000
|
||||
CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000
|
||||
@ -246593,8 +246595,8 @@ CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332
|
||||
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
|
||||
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
|
||||
CVE-2024-13415,0,0,20f4b651b70587580f805a97274e0650f9bb61a3067aa9a0bda1ff129a051ce4,2025-01-31T06:15:29.287000
|
||||
CVE-2024-13416,0,1,d71120210a80712a2c247daf0d2ae5cb04d95a19fc86e36a7c69ffa25a62e7ae,2025-02-21T12:15:29.193000
|
||||
CVE-2024-13417,0,0,38e6064a571c4d048cdc5ef6ae47228b6b31b2af2307c872610581c0fe53c957,2025-02-06T20:15:39.273000
|
||||
CVE-2024-13416,0,0,d71120210a80712a2c247daf0d2ae5cb04d95a19fc86e36a7c69ffa25a62e7ae,2025-02-21T12:15:29.193000
|
||||
CVE-2024-13417,0,1,8cab866664bb2b3a861f8a2fd2fcba4e1325fa44575c36d479d147ebcdc0906c,2025-02-21T13:15:11.100000
|
||||
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
|
||||
CVE-2024-13421,0,0,aae3ef0eb8d6c0cd7f92da1264e974f580e1e1fa3a4819378de00b044a858918,2025-02-12T05:15:11.653000
|
||||
CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000
|
||||
@ -246624,7 +246626,7 @@ CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649
|
||||
CVE-2024-13450,0,0,43fcdfa95c84c4f9958bcf0ed96f0c3b1c10185c108adb08c789dbe5f2feb02b,2025-02-04T20:48:58
|
||||
CVE-2024-13453,0,0,e64fc58d83e3540bb01a99edb8cd9df274ae0c7a0249b0fd357ec05d1fc54281,2025-02-18T19:15:13.770000
|
||||
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
|
||||
CVE-2024-13455,1,1,2964634e2f357de3a92e73640f9a530dc8c95bb0ed72f05aaca2f88adb270deb,2025-02-21T12:15:29.823000
|
||||
CVE-2024-13455,0,0,2964634e2f357de3a92e73640f9a530dc8c95bb0ed72f05aaca2f88adb270deb,2025-02-21T12:15:29.823000
|
||||
CVE-2024-13456,0,0,8ae271cb88225163ad5e7c38bef05ea0477f45cf928a6e7997913ed30ed7628b,2025-02-12T10:15:11.240000
|
||||
CVE-2024-13457,0,0,51be24ad36e285925bb980a73e7213c707c5621ab118dd91f24b07146640a607,2025-02-07T15:34:15.553000
|
||||
CVE-2024-13458,0,0,b0c82b9a6a2ae8ab3e75191e77bf09ecd6761e542d7fe4c0d50e106a0dd3473b,2025-02-04T19:35:30.473000
|
||||
@ -246799,7 +246801,7 @@ CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee
|
||||
CVE-2024-13663,0,0,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000
|
||||
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
|
||||
CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000
|
||||
CVE-2024-13667,0,0,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
|
||||
CVE-2024-13667,0,1,00366fe767068418ac97bead46153f457c38f67a91bcc441bc28d754ed496831,2025-02-21T14:23:07.680000
|
||||
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
|
||||
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
|
||||
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
|
||||
@ -246810,13 +246812,13 @@ CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10
|
||||
CVE-2024-13679,0,0,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
|
||||
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
|
||||
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
|
||||
CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
|
||||
CVE-2024-13681,0,1,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
|
||||
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
|
||||
CVE-2024-13689,0,0,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000
|
||||
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
|
||||
CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
|
||||
CVE-2024-13691,0,1,e2ffbabc297e59a5c1d2ebf52a7761c6c116f558696876672f6c292ae9c9a1ee,2025-02-21T14:22:06.687000
|
||||
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
|
||||
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
|
||||
CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000
|
||||
@ -246833,7 +246835,7 @@ CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f0
|
||||
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
|
||||
CVE-2024-13711,0,0,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000
|
||||
CVE-2024-13712,0,0,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000
|
||||
CVE-2024-13713,1,1,325bf5535693a886456d4dc30288f32e2355aa6c0f7fe640457617c4bf8a5017,2025-02-21T12:15:30.040000
|
||||
CVE-2024-13713,0,0,325bf5535693a886456d4dc30288f32e2355aa6c0f7fe640457617c4bf8a5017,2025-02-21T12:15:30.040000
|
||||
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
|
||||
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
|
||||
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
|
||||
@ -246870,14 +246872,14 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c
|
||||
CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc27c,2025-02-13T05:15:14.177000
|
||||
CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000
|
||||
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
|
||||
CVE-2024-13783,0,1,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
|
||||
CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
|
||||
CVE-2024-13789,0,0,66685c0c937a45caf4804fdbb0f6a654b7766a4df93c13ce786e130fd2ed5ff5,2025-02-20T10:15:10.637000
|
||||
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
|
||||
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
|
||||
CVE-2024-13792,0,0,5eea2eb9c2e9b718585e09fb9464cf4787dcedab1db15551defa783e010d8240,2025-02-20T10:15:10.850000
|
||||
CVE-2024-13794,0,0,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000
|
||||
CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
|
||||
CVE-2024-13797,0,1,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000
|
||||
CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000
|
||||
CVE-2024-13799,0,0,ec8cb514ef31404e1cd13657eea18c026b0b0f4d5ffefec8356a7aac820d1c0c,2025-02-19T06:15:21.283000
|
||||
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
|
||||
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
|
||||
@ -246898,7 +246900,7 @@ CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7
|
||||
CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000
|
||||
CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
|
||||
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
||||
CVE-2024-13846,1,1,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c1313dc,2025-02-21T12:15:30.183000
|
||||
CVE-2024-13846,0,0,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c1313dc,2025-02-21T12:15:30.183000
|
||||
CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
|
||||
CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
@ -246915,7 +246917,7 @@ CVE-2024-13883,0,0,dddb8b479d8345e49ddd8f724d4ab3348652441913a63435d046cdd13b4c8
|
||||
CVE-2024-13888,0,0,c87839d2bca683e4e01b4f16bf4650844bb0d5c14b76b96fd45e3c4854b6fe97,2025-02-20T09:15:09.577000
|
||||
CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000
|
||||
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
|
||||
CVE-2024-13900,1,1,e38dcc4fcfc78cce76d078c209401822bf3093a6d9e71c0ee76ba272c5fbfa29,2025-02-21T12:15:30.320000
|
||||
CVE-2024-13900,0,0,e38dcc4fcfc78cce76d078c209401822bf3093a6d9e71c0ee76ba272c5fbfa29,2025-02-21T12:15:30.320000
|
||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
@ -252574,7 +252576,7 @@ CVE-2024-26592,0,0,8e9ffeb9e55fe501068604eff67d7fd771ff5e9f7a7d386f3872a6c32981f
|
||||
CVE-2024-26593,0,0,e62f1da24a0e50df3324f9cc21206e56c7d1435eba0285eac0af16131be6e08b,2024-11-21T09:02:36.907000
|
||||
CVE-2024-26594,0,0,68e03677deb3034605a10232488f23cb6e519cc32caff4f377b8e2be27b0f7fd,2024-11-21T09:02:37.053000
|
||||
CVE-2024-26595,0,0,1ecad4ab8e5d8315378c547b57087b87b5b8ab6883816738480b0d88e8a450b3,2024-12-14T21:15:17.770000
|
||||
CVE-2024-26596,0,0,1bbfafbfc37dd4dc1c2c6701867d0860c5b5e62049e8dd9e7899fc017f51a86e,2024-11-21T09:02:37.323000
|
||||
CVE-2024-26596,0,1,d0baf405c4db880e8f5e695ce2a6580bddc8f0b9dd9501d026684d64271ab4a0,2025-02-21T14:15:31.110000
|
||||
CVE-2024-26597,0,0,252297c0be1eaa9ea7c6da14f501934ba59dd4c59fc740a46faee37fe4197159,2024-11-21T09:02:37.460000
|
||||
CVE-2024-26598,0,0,3c77fae1084601c520faecf3789c506ed3cd7afca79ec096ff5baf3c3c9136e7,2024-11-21T09:02:37.617000
|
||||
CVE-2024-26599,0,0,e1071029dcca5e3200bdf243b24177222cbdd571dac7c3f437dbd7f8b4733d99,2024-11-21T09:02:37.853000
|
||||
@ -252666,7 +252668,7 @@ CVE-2024-26676,0,0,3a1d4f2358bed3ab4258b43ab823969ce460c8f7e1348adce7af38a7570d3
|
||||
CVE-2024-26677,0,0,c35c657c3dc898010fdbffc430a5d1f3c80ae40133a22feef2371862845d49d1,2024-11-21T09:02:49.587000
|
||||
CVE-2024-26678,0,0,babf85bd69538268f9620c2dc828a03ff07f06504b11a5514b00ef87dee899a3,2024-11-21T09:02:49.700000
|
||||
CVE-2024-26679,0,0,96fac2e55827a4b651300ff9853487fff79c9675f116ccd4bd1fb32cefdfd12c,2024-11-21T09:02:49.820000
|
||||
CVE-2024-2668,0,0,828cca7fda114e30a728cc1179157241c228f479943254537e2d3d7af1fab5e7,2024-11-21T09:10:15
|
||||
CVE-2024-2668,0,1,dbf55e1e8a64a96e127dce11d1af1c33b05a3735ca0c32918945d2c51b342a92,2025-02-21T14:58:19.927000
|
||||
CVE-2024-26680,0,0,15d1044d1e2b8a7c453480115a722a485360f46d98d2f90969c6a8a9aa690f82,2024-11-21T09:02:49.943000
|
||||
CVE-2024-26681,0,0,41017a78bea521f0efe00880dc7764f0600563b3c633260b22f11ea5c9982f35,2024-11-21T09:02:50.057000
|
||||
CVE-2024-26682,0,0,ae08326ed6f4f94b7d4441b8371ec4fc915d6ef349f9889c87cd67d72b6a240d,2024-11-21T09:02:50.173000
|
||||
@ -263669,7 +263671,7 @@ CVE-2024-40941,0,0,efb2fae457ee7d31b5ce4c3abeaf631c45765f3ef2eb81a21ba3e1d10d663
|
||||
CVE-2024-40942,0,0,4a425ee11ebd1141890e1babb939dc4b884f454b00200d2581d951ee05c0dab1,2024-11-21T09:31:55.097000
|
||||
CVE-2024-40943,0,0,c2423b183e04f9bb11027cf778ba77d0efe82d01dc51836ee8b569d4ddc72564,2024-11-21T09:31:55.223000
|
||||
CVE-2024-40944,0,0,a95526689fc018c5ba0aebc9c2954b9c3ada26dfa35660eb54bd652996a77d65,2024-11-21T09:31:55.347000
|
||||
CVE-2024-40945,0,0,ae23ef7fa9187a00fede689bee6fa7fd2139d99589b0d27594f1dfba79a809ad,2025-02-03T15:38:59.337000
|
||||
CVE-2024-40945,0,1,1aa2d6e939e3662a39c97039e9ad3981f8cb5763da4bd5c4464619cbb0c7fba6,2025-02-21T14:15:34.213000
|
||||
CVE-2024-40946,0,0,9b4531f1eebaac6bfe55613f57985fbf5d45cfeb4ae10d8b66b05c63d1c17b2f,2024-07-15T07:15:22.053000
|
||||
CVE-2024-40947,0,0,02788f87f7b279d3c7c3e665f3aff561c91302c9c0a4e1f44d5baef4f82dc98e,2025-02-03T15:40:47.930000
|
||||
CVE-2024-40948,0,0,a230096cc632154aa290af1dde2e7fd289f7f36f66a443b442c6cb42cc1873b7,2024-11-21T09:31:55.730000
|
||||
@ -264554,7 +264556,7 @@ CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b
|
||||
CVE-2024-4212,0,0,86c29a7b1919d72ea963552028257ad6e66d351fe99835995b8488350816b1ae,2025-02-13T21:15:14.770000
|
||||
CVE-2024-42120,0,0,c55507381d2dbda42ba1186aae324969076618a383d70d402103e69c7c75737d,2024-11-21T09:33:38.673000
|
||||
CVE-2024-42121,0,0,bf6415bde3191c5f5fcd25ffd10af7590ee25a7ffb8661d1b1bd658227b8f687,2024-11-21T09:33:38.810000
|
||||
CVE-2024-42122,0,0,8f80f34dcee523cc5df99cdb9e0b5f5fb6ff4777f77fd53a4e265209d3244689,2024-12-09T13:10:02.027000
|
||||
CVE-2024-42122,0,1,1d1ecdcaf813392128a7e99c1849517b338231e15cbc291436b806970ca36eae,2025-02-21T14:15:42.880000
|
||||
CVE-2024-42123,0,0,ca40270975193cea9fadaaf2824034ae49ab2d88be452d1b1b4900086515933a,2024-11-21T09:33:39.073000
|
||||
CVE-2024-42124,0,0,e781b41b494e8934a80a32a55c31968231f9fdd1547ac2aaa22704f3a0904455,2024-11-21T09:33:39.203000
|
||||
CVE-2024-42125,0,0,90cc0dfb50e96857183724b2521e3da28104dd3eb493dbebf5655d7efa8e7960,2024-11-21T09:33:39.327000
|
||||
@ -268275,9 +268277,9 @@ CVE-2024-47250,0,0,11c644dbe63a41f5d721b32a69341c30ccc7630321c43481390341a1ac658
|
||||
CVE-2024-47253,0,0,530ab00b63e8441eac6af22fa0a9abb006f28bbe2de90227cc8791b7979c1184,2024-11-07T12:15:24.630000
|
||||
CVE-2024-47254,0,0,2ab452b813a2090516d8f238800b10e27c786f7540ac56e33f7f38e348d84cdb,2024-11-07T12:15:24.747000
|
||||
CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004efed,2024-11-07T12:15:24.857000
|
||||
CVE-2024-47256,0,0,03d9dcd9246ea96d9e0eff043db015bc1d1c14db43fb45d7f7cea0ff4d23b5b7,2025-02-06T20:15:39.533000
|
||||
CVE-2024-47256,0,1,4301094a6476a5380c4c5aae0b9d93aa83f68d1387f6e04d900365697aaa867a,2025-02-21T13:15:11.207000
|
||||
CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000
|
||||
CVE-2024-47258,0,0,300c90dbd855da523ff0d398327bbde67775e3f8dbffd37edbf2f5fc3dcdbf07,2025-02-06T20:15:39.643000
|
||||
CVE-2024-47258,0,1,9a4a5c7393716979191d8b2658cfc20c67a5be5e7a582de99084d292c7b321b8,2025-02-21T13:15:11.300000
|
||||
CVE-2024-4726,0,0,80164eca5ea22b0e80156818ae78d5bba67b0ede55266781d9d3d279eaf8b587,2025-02-19T18:33:05.473000
|
||||
CVE-2024-47264,0,0,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000
|
||||
CVE-2024-47265,0,0,8efdd4318786503cf0f39cc0c8ad040b17c802a2f969a2910ba793ae4b4f6dc6,2025-02-13T15:15:19.600000
|
||||
@ -268716,7 +268718,7 @@ CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c
|
||||
CVE-2024-47723,0,0,2615dd343a0a50695d7cb54b27f624a56434cf3fe3c0a19e9e56f98b0a895f62,2024-11-08T16:15:26.743000
|
||||
CVE-2024-47724,0,0,6e995ffaad9caecd5173ad07f7bdfa1a2a66ca7e7da8057509e45779502e9778,2024-10-23T21:41:13.390000
|
||||
CVE-2024-47725,0,0,8d79cfc5f420589203ee56c1d45c4e18a5d4c2e87a501b10347996e89a7f75b1,2024-10-23T06:15:05.200000
|
||||
CVE-2024-47726,0,0,6675858c08d5de08cfc66de2d774d1bde415cea5f17aba7737d5f56d886dcbcd,2025-01-09T16:16:20.367000
|
||||
CVE-2024-47726,0,1,9ee958b497f60dfa175b733abd5591bf54477d8a1023b2872aa5147cb4891601,2025-02-21T14:15:46.113000
|
||||
CVE-2024-47727,0,0,3196861812a33ff4255dd1448fcb4aa149876dd4b4c056bd70146e25a6f1734c,2024-10-23T20:32:53.743000
|
||||
CVE-2024-47728,0,0,7cb3d81e3c38eaa169308dc5b0c05b8df992b74b7ca28b8189228d77e1f616a4,2024-10-23T20:36:52.367000
|
||||
CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec369cb,2024-10-23T20:40:24.640000
|
||||
@ -269568,7 +269570,7 @@ CVE-2024-49116,0,0,4dfbc588e6961f4ef5cf5d3d2cddb365c463048585cdc9499236726569aa2
|
||||
CVE-2024-49117,0,0,d766e288e604ed8981abbdf09f99cdcbb1d9a4c9fe3a088d382cbdc149fe718f,2025-01-14T17:53:39.120000
|
||||
CVE-2024-49118,0,0,830464e44ae8dca50ae70c0acf88d040fcfeac4cb84ea0c2124dbe9e48ce28d4,2025-01-14T17:53:12.587000
|
||||
CVE-2024-49119,0,0,c0d7feddd7d0a5f4c64a84a64f1ca10110a0c907acaaa213ecb8eb0a3131c5d8,2025-01-14T17:53:24.597000
|
||||
CVE-2024-4912,0,0,2e32c58973d8251e1cb235e50a89f5def47ab3fcd3ac832fd6ca58856582e9b3,2024-11-21T09:43:51.157000
|
||||
CVE-2024-4912,0,1,5dd17d9ff2ac0ecc33846995dd8fdbbdbfee90d0bd10d57348016990c6c54ab1,2025-02-21T14:54:45.450000
|
||||
CVE-2024-49120,0,0,22ca40c33fd554f39d974f9adae005ce3a40b5238845165b9e4a809da0cf597f,2025-01-14T17:53:02.757000
|
||||
CVE-2024-49121,0,0,ae8ff15cf0dea7abd64b02fb2b481c1b5869540f146d23700d3e0b40890b5326,2025-01-14T17:51:40.987000
|
||||
CVE-2024-49122,0,0,4e0b196af6208d3ff306a154e2932825a8f64fa2def8da574ea2aef207af355e,2025-01-14T17:51:22.140000
|
||||
@ -269579,16 +269581,16 @@ CVE-2024-49126,0,0,025f4642ee7d0365807d3fcd19037076e7f481f9f51c1515266c4afa334e1
|
||||
CVE-2024-49127,0,0,53f9dcea57e906faa04a8d98b56a517930693af7f7a5920be00eebb456a7f874,2025-01-14T17:49:38.943000
|
||||
CVE-2024-49128,0,0,f3d4fffbdeb11d731321677871576f96c1c17203dafe86b90d89a40772d959bc,2025-01-14T17:49:20.600000
|
||||
CVE-2024-49129,0,0,fece40fd7c9ef46aef44f9b6b77bb502f0b185459aa1318105af19e9125a411b,2025-01-14T17:49:06.690000
|
||||
CVE-2024-4913,0,0,8f1077ca1f909bbf49b8f2a274026fe5a87623cec281204da7efc615ad191bc7,2024-11-21T09:43:51.293000
|
||||
CVE-2024-4913,0,1,1af5761ad4f72cfb39ce8a98f445a84f1957981a4964e04bcaeec09a27613f2d,2025-02-21T14:51:59.877000
|
||||
CVE-2024-49132,0,0,7211bb1e71eabf60217c6a6a8a30f6f1a503e606e87c1bac88fbcf7342c84c35,2025-01-14T17:48:33.683000
|
||||
CVE-2024-49138,0,0,286dc37677622c63dcdad4f86c15d7e8b98bbb3aa097b7516a11d8c38b7b5d16,2024-12-13T18:09:53.140000
|
||||
CVE-2024-4914,0,0,c1e4acb17def81a0854cc115da953100335e1c8f9a391685fb384320f3256d4e,2024-11-21T09:43:51.437000
|
||||
CVE-2024-4914,0,1,fe11f135f9d412bbd302a97fc8eb88ac3fae7ff80e734d2788c10db6291587e4,2025-02-21T14:43:26.573000
|
||||
CVE-2024-49142,0,0,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000
|
||||
CVE-2024-49147,0,0,6fba53ba9d6b385fdc5b31747e6fa75096746742b3ab2cf525cf8f2b1550ed5c,2025-01-10T18:09:53.377000
|
||||
CVE-2024-4915,0,0,0db50bbbf81e6509cf2f04f7c74802ee1539c5988eb17e78bcc8e3a916243d8d,2024-11-21T09:43:51.583000
|
||||
CVE-2024-4916,0,0,46062bb382c89200b166e2e86c9831624440cd917b76f7208234261e0e99e402,2024-11-21T09:43:51.723000
|
||||
CVE-2024-4917,0,0,95cec23e602c996c3b6188d4e4ba043035d85d558b4aed6963a603c245d41e9b,2024-11-21T09:43:51.867000
|
||||
CVE-2024-4918,0,0,190a2472cf82ddf9ece6d5f55c8371f587c5b961e6a0255efb3e1d13b0381b29,2024-11-21T09:43:52.013000
|
||||
CVE-2024-4915,0,1,d29e391411e8a60137d032f41ab432f33874ff20817c6e2da2289faca4af28d9,2025-02-21T14:41:20.890000
|
||||
CVE-2024-4916,0,1,6a3d7d7980a04645090f58c017f2506912fd78136df269cf9c49c2f7831beccb,2025-02-21T14:35:39.890000
|
||||
CVE-2024-4917,0,1,53000e8a05b2cd216dfdffe28a914f1c4ee0a988944d3c9b4a3dbfefd0c28c6e,2025-02-21T14:30:29.407000
|
||||
CVE-2024-4918,0,1,c0aa1606fd9d1686a44d0a2df0ac1eee6acaf409c511f53cf88bf45aabf0fbc4,2025-02-21T14:12:17.317000
|
||||
CVE-2024-4919,0,0,368fad74919de96a96ea1b7b705df86833ed8de7dc9bf1ce010b2942a41be4d1,2025-02-20T21:36:10.237000
|
||||
CVE-2024-49193,0,0,f107d286fb452265d3af6ba99ec3a3307a498cc5d0a571f0a12f8237ec4bf150,2024-10-16T20:35:16.380000
|
||||
CVE-2024-49194,0,0,0ec8be045d0245140372caea286e91f3e3f2b648af9aa51f5731f3d907f06384,2024-12-18T17:15:13.593000
|
||||
@ -270174,12 +270176,12 @@ CVE-2024-49915,0,0,1bc845930fcbdb9577b3bea4a651324d51336af57ecb1305a03826df223da
|
||||
CVE-2024-49916,0,0,1a7a169d61ef72224f66f7e32d73a1e9bbf613855dd00b112ca7b359b0441b18,2024-10-24T17:03:19.457000
|
||||
CVE-2024-49917,0,0,ccbd2f5854c6a865f4ae3b231864f73ec5f66017812d7f48759b953faaa80fc8,2024-12-14T21:15:28.817000
|
||||
CVE-2024-49918,0,0,2aa408debf7cf8df4a7ba355380f4a6c543bc7ce879d853fcf9198caf80f0e26,2024-10-24T16:49:57.453000
|
||||
CVE-2024-49919,0,0,3c67c30512a0690c47af891444a4c6f5690b1cc96f77e186d84d9bdb43cebee9,2024-10-25T14:55:47.027000
|
||||
CVE-2024-49919,0,1,31cca951626522b1d5a28d4ea69d0eeb2b20246649986423acbbfa60e68be09c,2025-02-21T14:15:46.800000
|
||||
CVE-2024-4992,0,0,c064672a88f1fb3d2db909f67615dd586902b6b9bb36ca6f17a613b084b201f8,2024-11-21T09:44:00.787000
|
||||
CVE-2024-49920,0,0,e1207d28b340a772dffbae7188ef0203454e3ae08a5da0f4060eae2767b1fb2f,2024-10-25T14:56:32.303000
|
||||
CVE-2024-49921,0,0,1831d9cb874f648497497e73337ec7e121babe7e7d7fb461a09340123321b14f,2024-10-25T15:01:21.077000
|
||||
CVE-2024-49922,0,0,ffc68b36562765fec5170fe1e0345c28c5823e3d8a8ddcb742f1b9dae7699e20,2024-10-25T14:56:06.057000
|
||||
CVE-2024-49923,0,0,0f879d7a00fcee7bb1596b66dff50f9095438a70fdececb4efcc2dcf410de9a0,2024-10-24T19:43:27.327000
|
||||
CVE-2024-49923,0,1,2c071776905583de23e6afabaa74b30514b94d389562b2a08866f222b9d8a99e,2025-02-21T14:15:47.720000
|
||||
CVE-2024-49924,0,0,dcce4a3a65c168bafbc9d3100a7b0a269bb75445a6fd618835da94050af45267,2024-11-08T16:15:31.683000
|
||||
CVE-2024-49925,0,0,714d6927cfc4e01a3d694ffed5bbf41505a35a8867ce843e92b14a9ec84eaca2,2024-12-14T21:15:29.247000
|
||||
CVE-2024-49926,0,0,200369179196012f1051a8d57336f17c55ea7365fe200ed02fb52ba0bbdf5804,2025-01-24T16:15:37.237000
|
||||
@ -270250,7 +270252,7 @@ CVE-2024-49985,0,0,cc7aba22aa265c1b248e2c78c17c046547e84778bb411195c18bb4a30a2e9
|
||||
CVE-2024-49986,0,0,ed7baed713344df44fcd8cf4839e63227c60ba7d910efaf44079996db9651376,2024-11-17T15:15:18.707000
|
||||
CVE-2024-49987,0,0,6d69bfa491b80a45dad42ab542fd3f94b70c09df97b5387b22e4d06e11340340,2024-10-28T16:23:44.477000
|
||||
CVE-2024-49988,0,0,6e880eb9e5336881b9aa0d04c4670078c2968f7164913d6ffb88e40fdc1618e3,2024-10-28T16:38:50.897000
|
||||
CVE-2024-49989,0,0,4388b6ec6641d7a5e97b2f8d2c2c97bc0329b1a0c266c850cf9336bd491ffe8b,2024-10-25T20:02:16.763000
|
||||
CVE-2024-49989,0,1,728f3630814c154675428f7a8bfeaa7e9c9974adbf65e4c91a5325de14e60e03,2025-02-21T14:15:48.487000
|
||||
CVE-2024-4999,0,0,07c5068dacc136de10d74341529ffa74c87015addbbcfceefacc1d786cf407cb,2024-11-21T09:44:01.143000
|
||||
CVE-2024-49990,0,0,dfc03ea778cb0740cd662462df5710f8ea70521f5a9669d27814fca3963aed04,2024-10-28T16:42:56.377000
|
||||
CVE-2024-49991,0,0,32aa83c2e038780e7428f0b83ebcffba313d68c0b3af6f3ed43ed7e614a7bea9,2024-11-17T15:15:18.800000
|
||||
@ -270329,7 +270331,7 @@ CVE-2024-50058,0,0,8f49ac4215c90d50a4d5f1ff80b2fe19d773607c840646a0312fb0c43fd7f
|
||||
CVE-2024-50059,0,0,577529404fd9fa0a1d35a86ef576d85d5107fcc14193362298bd7157ce8a723a,2024-11-08T16:15:45.267000
|
||||
CVE-2024-5006,0,0,5837c31bef582ca5d4638814ad63e32eeef8a5f2602838bc11a08790f4dd089d,2024-11-21T09:46:46.033000
|
||||
CVE-2024-50060,0,0,01dcad8cd7e5f8d2f3beeaf93497ab292892b951e329958f62a92464cf3d2176,2024-11-20T20:25:37.210000
|
||||
CVE-2024-50061,0,0,e1916955b1a22bf54c4e94d978efb7eb8dda94eb3204ea22dd37486d490b9580,2024-10-23T21:48:29.030000
|
||||
CVE-2024-50061,0,1,7bf2c4f77a17eac93db10fdc03c0ad62be89d829ad4c533fe6b9e7cd9f3cf7f4,2025-02-21T14:15:49.370000
|
||||
CVE-2024-50062,0,0,d50f044e8938707dae39384ec96cd77ececb8faa96071400b106a3c62189fac5,2024-10-23T21:48:57.737000
|
||||
CVE-2024-50063,0,0,3b5ab46f8320ec86decbfb8639e1b1e04d84924116cd0ee6210d300fde89b93d,2024-11-22T17:26:31.070000
|
||||
CVE-2024-50064,0,0,2a0293833921e1332bfd350afcf732a34eb77b0abeb7f463e77d57b5bdb3f081,2024-10-23T21:49:29.423000
|
||||
@ -270338,7 +270340,7 @@ CVE-2024-50066,0,0,5152114954b2ad4e8ec7b5c3a842d9a276a29bd9316bf6303fcd414599f10
|
||||
CVE-2024-50067,0,0,9104176565a799c30e4b5ab08e38eb10316f89060bebb875ebb360b27e4a0cc0,2024-12-11T15:15:10.943000
|
||||
CVE-2024-50068,0,0,165746773322f9f91c4968723b044a9f5e9e5ffc592c2389d486be015509505a,2024-10-30T16:57:35.427000
|
||||
CVE-2024-50069,0,0,1a3ff5e2e3c7d29ac1d15dff8ac05d381a9c14cbc1952960fbfe43f9fea6d99e,2024-10-30T16:58:19.983000
|
||||
CVE-2024-50070,0,0,59d989e5f1a3a0e881a89138493f714d298b5f74485aecf2eee32c1499028932,2024-10-30T16:59:39.013000
|
||||
CVE-2024-50070,0,1,3832dd66b53bd87d14707a1226a7600da06e200872ae526b971f3cbc34e345ed,2025-02-21T14:15:50.130000
|
||||
CVE-2024-50071,0,0,deabe94edb158198bba63869a8d8e774ebb104393fb4f4a59f15e645b616d1f8,2024-10-30T17:02:34.740000
|
||||
CVE-2024-50072,0,0,9ec3b3a7984ed91cf0149394253e55d50242b323c25ff4b0065ebb757c18e457,2024-11-08T16:15:45.547000
|
||||
CVE-2024-50073,0,0,8acd1067a72c354a4c91351e479e2534e8922d45e605cbea33839d457707b149,2024-12-11T15:15:11.137000
|
||||
@ -274402,7 +274404,7 @@ CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b
|
||||
CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000
|
||||
CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000
|
||||
CVE-2024-56548,0,0,16645d1541312215a4bf3f6392eb289c3edcde3bcdb0f4b6f92d5230f284c240,2024-12-27T14:15:34.603000
|
||||
CVE-2024-56549,0,0,b200f87b756cf787b210d42f5e26996299c43c0569406cb78295901f0f68d25f,2025-02-17T12:15:27.240000
|
||||
CVE-2024-56549,0,1,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000
|
||||
CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000
|
||||
CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000
|
||||
CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f523,2025-01-23T17:15:15.510000
|
||||
@ -278190,7 +278192,7 @@ CVE-2024-9145,0,0,3dd9bcad2a2fee7d05e394a6c147376f977693416e207026532ba073c858cc
|
||||
CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9147,0,0,4e12ed99087058c5ab273f6a2c5655dda51c7a05718eb2e9409e0779fbea7704,2024-11-06T15:53:59.983000
|
||||
CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000
|
||||
CVE-2024-9150,1,1,dcffeacda294f1b86f266516093543f60ad0dab963e948b94d79760e6baf0ec4,2025-02-21T12:15:30.463000
|
||||
CVE-2024-9150,0,0,dcffeacda294f1b86f266516093543f60ad0dab963e948b94d79760e6baf0ec4,2025-02-21T12:15:30.463000
|
||||
CVE-2024-9154,0,0,d282749ef1136bcf186accc6aa703c9bda98d2789e552864849c54e1a0cf5e43,2024-12-22T07:15:06.307000
|
||||
CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9156,0,0,f51f01b34d81b342f8758ec8a55450b2ee8e6ae57d651f88883c804dd1af5436,2024-10-15T14:40:45.093000
|
||||
@ -278935,7 +278937,7 @@ CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b
|
||||
CVE-2025-0108,0,0,32fc5b68a56685a0b9b51207f2482d34ad1064df89ea1f574e01f75f06d01c3c,2025-02-20T03:15:12.317000
|
||||
CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000
|
||||
CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000
|
||||
CVE-2025-0111,0,0,9e84534980912432b62b264d330bd3e591eeab67c643fe5189edaaafdfa72db2,2025-02-21T02:00:01.827000
|
||||
CVE-2025-0111,0,1,ed569020ca3fa5c1134a21efd6d6f5ad743d98fc5724f337e56afc10b8fe1389,2025-02-21T14:50:23.877000
|
||||
CVE-2025-0112,0,0,88a8fd5cbc7c2c881979117d133c376f494cd853ce04b18c4dd3daf2c90e4471,2025-02-20T00:15:20.640000
|
||||
CVE-2025-0113,0,0,3478c732e987ffac3f9b17ecd011e78e159149f51d0641ffa2e937f895e713a5,2025-02-12T21:15:16.950000
|
||||
CVE-2025-0142,0,0,79348507832bccb3dfb1eba9563d5795fbadbc3e9e1a05cb5ea2a751abd30411,2025-01-30T20:15:33.853000
|
||||
@ -279035,7 +279037,7 @@ CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfd
|
||||
CVE-2025-0327,0,0,078b628fa1779e106aa5151c11b6499af01eb5757d477e1454204158f66a288c,2025-02-13T07:15:10.570000
|
||||
CVE-2025-0328,0,0,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000
|
||||
CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000
|
||||
CVE-2025-0332,0,1,10e294c3bcb66386a9705e885fda97504f486a40642545ec52dba01d6b68bca7,2025-02-21T12:03:31.920000
|
||||
CVE-2025-0332,0,0,10e294c3bcb66386a9705e885fda97504f486a40642545ec52dba01d6b68bca7,2025-02-21T12:03:31.920000
|
||||
CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000
|
||||
CVE-2025-0334,0,0,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000
|
||||
CVE-2025-0335,0,0,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000
|
||||
@ -279170,7 +279172,7 @@ CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a47
|
||||
CVE-2025-0516,0,0,54ab7a64b43a5bfec8dcc0561006b4b6d888b05cbf982c088d6e719e3d73b992,2025-02-12T16:15:42.883000
|
||||
CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000
|
||||
CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000
|
||||
CVE-2025-0521,0,1,ae94a1fe73318139f9da2622de592c6e10d25105d56f65a8078c6428a35bf271,2025-02-21T12:16:09.897000
|
||||
CVE-2025-0521,0,0,ae94a1fe73318139f9da2622de592c6e10d25105d56f65a8078c6428a35bf271,2025-02-21T12:16:09.897000
|
||||
CVE-2025-0522,0,0,049494dc5db0d63aea89474c83a4309664a2b8074bd7164b1ed7fff81c86960f,2025-02-18T19:15:23.177000
|
||||
CVE-2025-0525,0,0,c288f27e7cbfee2400ae138222cd0f0778e1304ba3ca58c91a31add13accca58,2025-02-18T18:15:28.850000
|
||||
CVE-2025-0526,0,0,72c048b07f37484ff5411cf9170da2e1d74699bcf31208d52953a5f6b4d6ef19,2025-02-18T18:15:28.993000
|
||||
@ -279335,7 +279337,7 @@ CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34
|
||||
CVE-2025-0814,0,0,6e84b81253656a1d32a82ba911740347214b0ddf70b532a879c2dbfdc544f5dd,2025-02-13T07:15:10.973000
|
||||
CVE-2025-0815,0,0,7de889e4d3bd0a2a91237ff690c09d713b31f9d5f2a51b5b2591129d680ff441,2025-02-13T07:15:11.160000
|
||||
CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c34291,2025-02-13T07:15:11.353000
|
||||
CVE-2025-0817,0,1,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
|
||||
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
|
||||
CVE-2025-0821,0,0,eef623ecbc4f931b67c977737dbf8b956ec963ba6d7dfab149142eb36bc3e525,2025-02-14T11:15:10.230000
|
||||
CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d92,2025-02-15T13:15:28.847000
|
||||
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
|
||||
@ -279476,7 +279478,7 @@ CVE-2025-1083,0,0,16064cc59146b17006d53d67046a65a9c0b364257a94b2b373fa99c27da341
|
||||
CVE-2025-1084,0,0,93fee3949ec546a58cb9da1c1619fb657dbde041632da87d4ac6e93d0d865098,2025-02-07T00:15:28.180000
|
||||
CVE-2025-1085,0,0,1ad67fc3dcecff349f45b0918fd96e4db08dcd56b6d0ad12a44043dc90d21f08,2025-02-07T01:15:07.930000
|
||||
CVE-2025-1086,0,0,224643d9b2f43f102432df09cca95386bdc4432ae24da6e421d85411b67c24c6,2025-02-07T02:15:30.523000
|
||||
CVE-2025-1094,0,1,afe463c9103362ac899e2882edae895a7387cb03ad909215aec875f07598b388,2025-02-21T11:15:09.800000
|
||||
CVE-2025-1094,0,0,afe463c9103362ac899e2882edae895a7387cb03ad909215aec875f07598b388,2025-02-21T11:15:09.800000
|
||||
CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000
|
||||
CVE-2025-1099,0,0,866ea005495998eedc94be57a64f094566d9af9b611a4dc7ae3f41bc7a1f4d42,2025-02-14T12:15:29.460000
|
||||
CVE-2025-1100,0,0,006211606093ec28f1ff8daf942d69911ef4c534c65359a0897a00ee27f87cf6,2025-02-12T14:15:31.647000
|
||||
@ -279560,7 +279562,7 @@ CVE-2025-1201,0,0,bf3e8ac22ebf988432aa71d4e5462b0f09f58c2593da323d6fb54b6e8c2538
|
||||
CVE-2025-1202,0,0,52dbd111bdba6642349217f5a5e9aa58580640d5efecd8d9ccd8521dcc74d783,2025-02-18T18:02:04.383000
|
||||
CVE-2025-1206,0,0,9e7ba88164fab9a04369a4db867a9e8e6c082c4724fdd5132981ff19327e3f78,2025-02-20T20:39:04.393000
|
||||
CVE-2025-1207,0,0,518ea976e835e5d2e9daf8b69c95e3e72206f7bb3a8162c7be7b93925d62ba41,2025-02-12T16:15:44.393000
|
||||
CVE-2025-1208,0,1,d315b01d152dbab8d58f1774169e176e36efd6772420e875d3fc692e7894b488,2025-02-21T12:03:49.027000
|
||||
CVE-2025-1208,0,0,d315b01d152dbab8d58f1774169e176e36efd6772420e875d3fc692e7894b488,2025-02-21T12:03:49.027000
|
||||
CVE-2025-1209,0,0,8c71e5fca191088db0db2ac12dae4227d461afc892d89a2bdc4b8b04d0f3a7ce,2025-02-19T19:04:43.770000
|
||||
CVE-2025-1210,0,0,f28950e134a15e9426e5bc1eace543698800081ebe92aca0a069c7a1f123f194,2025-02-19T19:03:10.870000
|
||||
CVE-2025-1211,0,0,38ce788c374a72bbc1ba3c8209de97adc3b8b37f2859b77797e85b3a9273ddba,2025-02-11T16:15:50.660000
|
||||
@ -279634,7 +279636,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b
|
||||
CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000
|
||||
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
|
||||
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
|
||||
CVE-2025-1402,1,1,d705975e2d4d051899b63fd949106f689e6c20cfe60f25e8d672a004176300f9,2025-02-21T12:15:30.607000
|
||||
CVE-2025-1402,0,0,d705975e2d4d051899b63fd949106f689e6c20cfe60f25e8d672a004176300f9,2025-02-21T12:15:30.607000
|
||||
CVE-2025-1406,0,0,4b4d1ff21a0ba0811215bc35d6774baf51e77603ba63fc9e650d11b6ceed4f86,2025-02-21T04:15:10.347000
|
||||
CVE-2025-1407,0,0,70f77407081cff4de8b8d13a9badac21a5019470fe2d018139382b1f1331d1e8,2025-02-21T04:15:10.510000
|
||||
CVE-2025-1410,0,0,f4fa6259cc030a3c18635b5a57715bd57396d86c3ee145748700746fe04576c9,2025-02-21T09:15:10.200000
|
||||
@ -279648,9 +279650,9 @@ CVE-2025-1465,0,0,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3
|
||||
CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c00,2025-02-21T10:15:11.243000
|
||||
CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000
|
||||
CVE-2025-1483,0,0,76cafe28555a10dbbf45546d6f75e89aec9e95ad54aaa4bc0e47714c7e682b94,2025-02-20T10:15:12.537000
|
||||
CVE-2025-1489,1,1,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000
|
||||
CVE-2025-1489,0,0,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000
|
||||
CVE-2025-1492,0,0,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1535,1,1,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000
|
||||
CVE-2025-1535,0,0,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -280171,10 +280173,10 @@ CVE-2025-21680,0,0,ab176bb9040b4730f514a36acb954e8ef4736becce0eddc54061e7998d46f
|
||||
CVE-2025-21681,0,0,c762e0dffab812bde06604541722b1d7f7e956444bb5630804b957a593fcf627,2025-01-31T12:15:29.260000
|
||||
CVE-2025-21682,0,0,462d4deac5e2e59ee2d3e31f4dfc91555e87d58a1e47d6fecad84acad53c8a69,2025-02-04T15:25:48.707000
|
||||
CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
|
||||
CVE-2025-21684,0,0,2f956d860130e6337d0fabc47d6eb0a3769264253b41d76d2b8bb060797c168a,2025-02-11T16:12:41.533000
|
||||
CVE-2025-21684,0,1,de5856d3b307402a660ae10df3d9a42e6c6793685f8030f7896a6f7cf99333ff,2025-02-21T14:15:52.103000
|
||||
CVE-2025-21685,0,0,ddcc9f74d2788921662827130d064ca08f136819e30b8929e36a7dc983d8aa08,2025-02-11T16:11:19.543000
|
||||
CVE-2025-21686,0,0,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b4db,2025-02-10T16:15:38.100000
|
||||
CVE-2025-21687,0,0,2c2c627af4c6b661b7475ed3a3c45fd810de911af720cf67e0295da31022b70d,2025-02-17T12:15:27.790000
|
||||
CVE-2025-21687,0,1,a61d5c25309cce3ec9bd7ca2eac392fe8a8cb973e72c4ef00d5280a62c58e66a,2025-02-21T14:15:52.733000
|
||||
CVE-2025-21688,0,0,630d962152a5ef8c0af287b3cac9b1b0d8ac4e898b90cadc37f867db1dac2020,2025-02-10T16:15:38.323000
|
||||
CVE-2025-21689,0,0,af95d512c25672f1182cbdc285afa556f5984fc59f0b9ac3275c3c40288f0d7b,2025-02-10T16:15:38.447000
|
||||
CVE-2025-21690,0,0,af1632176e641a0691e2d0045bd50a0fd357491868cdeecd328ada4c2ffbcdee,2025-02-10T16:15:38.553000
|
||||
@ -280187,10 +280189,10 @@ CVE-2025-21696,0,0,1975fb41b3a7a51147bd9e4268307cc5da44b8ee25ffeb96d8fe52b1da77a
|
||||
CVE-2025-21697,0,0,a47524e2be039422746187d433904ec2c7edd2dfdfd45557e9bc03e82a52aef3,2025-02-14T14:13:39.943000
|
||||
CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1314,2025-02-13T16:16:48.690000
|
||||
CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000
|
||||
CVE-2025-21700,0,0,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000
|
||||
CVE-2025-21701,0,0,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000
|
||||
CVE-2025-21700,0,1,3fc056d46af8f0b78d97452f108ed5d658c922ab699c8a2bb43cbeaf9fbd76c6,2025-02-21T14:15:54.717000
|
||||
CVE-2025-21701,0,1,d7c054d565dcf2a6e8d7012de1892a0a2fe63adaff9755c9d55124b93699efd4,2025-02-21T14:15:55.747000
|
||||
CVE-2025-21702,0,0,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000
|
||||
CVE-2025-21703,0,0,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000
|
||||
CVE-2025-21703,0,1,1b70a75eeb992a0cedbee9d2af799a85c7fa5ad6d64038ed6ea31d816ef224ad,2025-02-21T14:15:56.627000
|
||||
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
|
||||
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
|
||||
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
|
||||
@ -280217,8 +280219,8 @@ CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a73809173
|
||||
CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000
|
||||
CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000
|
||||
CVE-2025-22207,0,0,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000
|
||||
CVE-2025-22208,0,0,d7fc4d9179638f274f61c81fb964891591352d39fb784a96aa52f976876a6e2b,2025-02-18T21:15:26.527000
|
||||
CVE-2025-22209,0,0,0b2a46f661b5a1cab138ee703e1d8e3bf565f672fb478dfa1ddf2028c7e23a1b,2025-02-18T21:15:26.670000
|
||||
CVE-2025-22208,0,1,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000
|
||||
CVE-2025-22209,0,1,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
|
||||
CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000
|
||||
@ -280727,7 +280729,7 @@ CVE-2025-23205,0,0,13a68cb9c97041e77ea2e9c62ea3cdaa6d25fcbb9b0e282f62adcb7dbf3d3
|
||||
CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87fea8,2025-01-17T21:15:12.003000
|
||||
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
|
||||
CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
|
||||
CVE-2025-23209,0,0,c75d33f86e392a22c693917d6cad06a1dc9b1652292b88d4dd85590381733549,2025-02-21T02:00:01.827000
|
||||
CVE-2025-23209,0,1,5039cc636732004b36d1abe67ffc1f35372cacab530b3970be9516a2d86f22df,2025-02-21T14:48:55.367000
|
||||
CVE-2025-23210,0,0,32d162be570f15707398d5f05144ef46c38670b733e83ab1c9065d61d1122fcc,2025-02-03T22:15:28.187000
|
||||
CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6770,2025-01-28T17:15:26.160000
|
||||
CVE-2025-23212,0,0,a254c6cafc1b01dff612632fa5582bc4bfe7d1dec0c6404fbbe7e7b50bce51f1,2025-01-28T17:15:26.273000
|
||||
@ -281991,6 +281993,7 @@ CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b
|
||||
CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000
|
||||
CVE-2025-26791,0,0,26890395366e56c551a6ef36e1b66be0cbc180a8be1a68af298b9b716ff6b5e5,2025-02-14T16:15:37.350000
|
||||
CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6bf7f,2025-02-15T15:15:23.587000
|
||||
CVE-2025-26794,1,1,20bf4ed8cd771fd4074b23317199089afc186d50710727ec050836eeab442b47,2025-02-21T13:15:11.687000
|
||||
CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000
|
||||
CVE-2025-26856,0,0,97d830a9ee806f0ef850d5b5eea5c095e7e2e4dee4401ad5b7fd9fb34c2341f7,2025-02-20T06:15:21.673000
|
||||
CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user