mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-10T21:00:20.174126+00:00
This commit is contained in:
parent
d2a900e410
commit
cf757d9464
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-34908",
|
"id": "CVE-2022-34908",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-02-27T13:15:10.107",
|
"published": "2023-02-27T13:15:10.107",
|
||||||
"lastModified": "2024-11-21T07:10:24.703",
|
"lastModified": "2025-03-10T20:15:12.223",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -65,6 +65,16 @@
|
|||||||
"value": "CWE-287"
|
"value": "CWE-287"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-306"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-34909",
|
"id": "CVE-2022-34909",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-02-27T13:15:10.190",
|
"published": "2023-02-27T13:15:10.190",
|
||||||
"lastModified": "2024-11-21T07:10:24.863",
|
"lastModified": "2025-03-10T20:15:13.420",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -65,6 +65,16 @@
|
|||||||
"value": "CWE-89"
|
"value": "CWE-89"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
33
CVE-2022/CVE-2022-434xx/CVE-2022-43454.json
Normal file
33
CVE-2022/CVE-2022-434xx/CVE-2022-43454.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-43454",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T20:15:13.593",
|
||||||
|
"lastModified": "2025-03-10T20:15:13.593",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A double free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102741",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102807",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102808",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102836",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4757",
|
"id": "CVE-2022-4757",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.267",
|
"published": "2023-02-27T16:15:11.267",
|
||||||
"lastModified": "2024-11-21T07:35:52.970",
|
"lastModified": "2025-03-10T19:15:35.827",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
29
CVE-2022/CVE-2022-486xx/CVE-2022-48610.json
Normal file
29
CVE-2022/CVE-2022-486xx/CVE-2022-48610.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-48610",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T20:15:13.713",
|
||||||
|
"lastModified": "2025-03-10T20:15:13.713",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2. An app may be able to access user-sensitive data."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102741",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102807",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/102808",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4829",
|
"id": "CVE-2022-4829",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.493",
|
"published": "2023-02-27T16:15:11.493",
|
||||||
"lastModified": "2024-11-21T07:36:01.690",
|
"lastModified": "2025-03-10T19:15:36.653",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49590",
|
"id": "CVE-2022-49590",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:34.573",
|
"published": "2025-02-26T07:01:34.573",
|
||||||
"lastModified": "2025-02-26T07:01:34.573",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,202 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igmp: Se corrigen las ejecuciones de datos en torno a sysctl_igmp_llm_reports. Al leer sysctl_igmp_llm_reports, se puede cambiar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores. Esta prueba se puede empaquetar en un asistente, por lo que dichos cambios estar\u00e1n en la serie de seguimiento despu\u00e9s de que net se fusione con net-next. if (ipv4_is_local_multicast(pmc->multiaddr) && !READ_ONCE(net->ipv4.sysctl_igmp_llm_reports))"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igmp: Se corrigen las ejecuciones de datos en torno a sysctl_igmp_llm_reports. Al leer sysctl_igmp_llm_reports, se puede cambiar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores. Esta prueba se puede empaquetar en un asistente, por lo que dichos cambios estar\u00e1n en la serie de seguimiento despu\u00e9s de que net se fusione con net-next. if (ipv4_is_local_multicast(pmc->multiaddr) && !READ_ONCE(net->ipv4.sysctl_igmp_llm_reports))"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.3",
|
||||||
|
"versionEndExcluding": "4.9.325",
|
||||||
|
"matchCriteriaId": "443CB341-7435-4A5F-B08C-A31660B42A63"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.10",
|
||||||
|
"versionEndExcluding": "4.14.290",
|
||||||
|
"matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.15",
|
||||||
|
"versionEndExcluding": "4.19.254",
|
||||||
|
"matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1656ecaddf90e2a070ec2d2404cdae3edf80faca",
|
"url": "https://git.kernel.org/stable/c/1656ecaddf90e2a070ec2d2404cdae3edf80faca",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/260446eb8e5541402b271343a4516f2b33dec1e4",
|
"url": "https://git.kernel.org/stable/c/260446eb8e5541402b271343a4516f2b33dec1e4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/46307adceb67bdf2ec38408dd9cebc378a6b5c46",
|
"url": "https://git.kernel.org/stable/c/46307adceb67bdf2ec38408dd9cebc378a6b5c46",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/473aad9ad57ff760005377e6f45a2ad4210e08ce",
|
"url": "https://git.kernel.org/stable/c/473aad9ad57ff760005377e6f45a2ad4210e08ce",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a84b4afaca2573ed3aed1f8854aefe3ca5a82e72",
|
"url": "https://git.kernel.org/stable/c/a84b4afaca2573ed3aed1f8854aefe3ca5a82e72",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d77969e7d4ccc26bf1f414a39ef35050a83ba6d5",
|
"url": "https://git.kernel.org/stable/c/d77969e7d4ccc26bf1f414a39ef35050a83ba6d5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ed876e99ccf417b8bd7fd8408ba5e8b008e46cc8",
|
"url": "https://git.kernel.org/stable/c/ed876e99ccf417b8bd7fd8408ba5e8b008e46cc8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f6da2267e71106474fbc0943dc24928b9cb79119",
|
"url": "https://git.kernel.org/stable/c/f6da2267e71106474fbc0943dc24928b9cb79119",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49591",
|
"id": "CVE-2022-49591",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:34.667",
|
"published": "2025-02-26T07:01:34.667",
|
||||||
"lastModified": "2025-02-26T07:01:34.667",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,127 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: microchip: ksz_common: Se corrige el error de p\u00e9rdida de recuento de referencias. En ksz_switch_register(), debemos llamar a of_node_put() para la referencia devuelta por of_get_child_by_name() que ha aumentado el recuento de referencias."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: microchip: ksz_common: Se corrige el error de p\u00e9rdida de recuento de referencias. En ksz_switch_register(), debemos llamar a of_node_put() para la referencia devuelta por of_get_child_by_name() que ha aumentado el recuento de referencias."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.9",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "37654B03-0BD2-4BDB-8E49-08840D5ECD72"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4165e02716518bbbe9c9104b39530d40928bc7ce",
|
"url": "https://git.kernel.org/stable/c/4165e02716518bbbe9c9104b39530d40928bc7ce",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/88ec2ff42da3ac93b2437dc52fe25cd4372148e6",
|
"url": "https://git.kernel.org/stable/c/88ec2ff42da3ac93b2437dc52fe25cd4372148e6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a14bd7475452c51835dd5a0cee4c8fa48dd0b539",
|
"url": "https://git.kernel.org/stable/c/a14bd7475452c51835dd5a0cee4c8fa48dd0b539",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49593",
|
"id": "CVE-2022-49593",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:34.853",
|
"published": "2025-02-26T07:01:34.853",
|
||||||
"lastModified": "2025-02-26T07:01:34.853",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,35 +15,180 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_interval. Al leer sysctl_tcp_probe_interval, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_interval. Al leer sysctl_tcp_probe_interval, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.1",
|
||||||
|
"versionEndExcluding": "4.14.290",
|
||||||
|
"matchCriteriaId": "BB72A895-C527-4FD1-AB91-6F4B520F2542"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.15",
|
||||||
|
"versionEndExcluding": "4.19.254",
|
||||||
|
"matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2a85388f1d94a9f8b5a529118a2c5eaa0520d85c",
|
"url": "https://git.kernel.org/stable/c/2a85388f1d94a9f8b5a529118a2c5eaa0520d85c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/73a11588751a2c13f25d9da8117efc9a79b1843f",
|
"url": "https://git.kernel.org/stable/c/73a11588751a2c13f25d9da8117efc9a79b1843f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/80dabd089086e6553b7acfcff2ec223bdada87a1",
|
"url": "https://git.kernel.org/stable/c/80dabd089086e6553b7acfcff2ec223bdada87a1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b14cc8afbbcbc6dce4797913c0b85266b897f541",
|
"url": "https://git.kernel.org/stable/c/b14cc8afbbcbc6dce4797913c0b85266b897f541",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b3798d3519eda9c409bb0815b0102f27ec42468d",
|
"url": "https://git.kernel.org/stable/c/b3798d3519eda9c409bb0815b0102f27ec42468d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c61aede097d350d890fa1edc9521b0072e14a0b8",
|
"url": "https://git.kernel.org/stable/c/c61aede097d350d890fa1edc9521b0072e14a0b8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e6b6f027e2854a51f345a5e3e808d7a88001d4f8",
|
"url": "https://git.kernel.org/stable/c/e6b6f027e2854a51f345a5e3e808d7a88001d4f8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49594",
|
"id": "CVE-2022-49594",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:34.947",
|
"published": "2025-02-26T07:01:34.947",
|
||||||
"lastModified": "2025-02-26T07:01:34.947",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,152 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_mtu_probe_floor. Al leer sysctl_tcp_mtu_probe_floor, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_mtu_probe_floor. Al leer sysctl_tcp_mtu_probe_floor, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.4",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "7E96E649-47EC-458E-8AC7-5A642A2EF7A6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/033963b220633ed1602d458e7e4ac06afa9fefb2",
|
"url": "https://git.kernel.org/stable/c/033963b220633ed1602d458e7e4ac06afa9fefb2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8e92d4423615a5257d0d871fc067aa561f597deb",
|
"url": "https://git.kernel.org/stable/c/8e92d4423615a5257d0d871fc067aa561f597deb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cc36c37f5fe066c4708e623ead96dc8f57224bf5",
|
"url": "https://git.kernel.org/stable/c/cc36c37f5fe066c4708e623ead96dc8f57224bf5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d5bece4df6090395f891110ef52a6f82d16685db",
|
"url": "https://git.kernel.org/stable/c/d5bece4df6090395f891110ef52a6f82d16685db",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e2ecbf3f0aa88277d43908c53b99399d55729ff9",
|
"url": "https://git.kernel.org/stable/c/e2ecbf3f0aa88277d43908c53b99399d55729ff9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49595",
|
"id": "CVE-2022-49595",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:35.040",
|
"published": "2025-02-26T07:01:35.040",
|
||||||
"lastModified": "2025-02-26T07:01:35.040",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,39 +15,194 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_threshold. Al leer sysctl_tcp_probe_threshold, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_probe_threshold. Al leer sysctl_tcp_probe_threshold, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.1",
|
||||||
|
"versionEndExcluding": "4.9.325",
|
||||||
|
"matchCriteriaId": "59349928-C040-410F-9AEF-F0E37775F4F0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.10",
|
||||||
|
"versionEndExcluding": "4.14.290",
|
||||||
|
"matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.15",
|
||||||
|
"versionEndExcluding": "4.19.254",
|
||||||
|
"matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/44768749980d53bc01980d9c060f736808d11af0",
|
"url": "https://git.kernel.org/stable/c/44768749980d53bc01980d9c060f736808d11af0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/92c0aa4175474483d6cf373314343d4e624e882a",
|
"url": "https://git.kernel.org/stable/c/92c0aa4175474483d6cf373314343d4e624e882a",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/96900fa61777402eb5056269d8000aace33a8b6c",
|
"url": "https://git.kernel.org/stable/c/96900fa61777402eb5056269d8000aace33a8b6c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
|
"url": "https://git.kernel.org/stable/c/9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b04817c94fbd285a967d9b830b274fe9998c9c0b",
|
"url": "https://git.kernel.org/stable/c/b04817c94fbd285a967d9b830b274fe9998c9c0b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
|
"url": "https://git.kernel.org/stable/c/d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
|
"url": "https://git.kernel.org/stable/c/f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fa5fb2cf9393db898772db8cb897ed5fd265eb78",
|
"url": "https://git.kernel.org/stable/c/fa5fb2cf9393db898772db8cb897ed5fd265eb78",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49596",
|
"id": "CVE-2022-49596",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:35.133",
|
"published": "2025-02-26T07:01:35.133",
|
||||||
"lastModified": "2025-02-26T07:01:35.133",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,187 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se corrigen las ejecuciones de datos en torno a sysctl_tcp_min_snd_mss. Al leer sysctl_tcp_min_snd_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se corrigen las ejecuciones de datos en torno a sysctl_tcp_min_snd_mss. Al leer sysctl_tcp_min_snd_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.16.69",
|
||||||
|
"versionEndExcluding": "3.17",
|
||||||
|
"matchCriteriaId": "142E4A1F-B3D2-42A7-B6C0-CFFCA71E9DE1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.4.182",
|
||||||
|
"versionEndExcluding": "4.5",
|
||||||
|
"matchCriteriaId": "80679710-597A-438F-916F-EB59ACAC536F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.9.182",
|
||||||
|
"versionEndExcluding": "4.10",
|
||||||
|
"matchCriteriaId": "EBFC612F-00B5-4DB2-955B-F7FBE68B0DFF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.14.127",
|
||||||
|
"versionEndExcluding": "4.15",
|
||||||
|
"matchCriteriaId": "BA040817-C3CC-4162-9719-DAC2271AAFC9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.19.52",
|
||||||
|
"versionEndExcluding": "4.20",
|
||||||
|
"matchCriteriaId": "3E9FBBF0-D54E-42D5-B04A-66E62644978C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.1.11",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "17831D82-0E1D-4A6E-9D29-A098431016D2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0d8a39feb58910a7f7746b1770ee5578cc551fe6",
|
"url": "https://git.kernel.org/stable/c/0d8a39feb58910a7f7746b1770ee5578cc551fe6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0fc9357282df055e30990b29f4b7afa53ab42cdb",
|
"url": "https://git.kernel.org/stable/c/0fc9357282df055e30990b29f4b7afa53ab42cdb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
|
"url": "https://git.kernel.org/stable/c/78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/97992e8feff33b3ae154a113ec398546bbacda80",
|
"url": "https://git.kernel.org/stable/c/97992e8feff33b3ae154a113ec398546bbacda80",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fdb96b69f5909ffcdd6f1e0902219fc6d7689ff7",
|
"url": "https://git.kernel.org/stable/c/fdb96b69f5909ffcdd6f1e0902219fc6d7689ff7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49597",
|
"id": "CVE-2022-49597",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:35.220",
|
"published": "2025-02-26T07:01:35.220",
|
||||||
"lastModified": "2025-02-26T07:01:35.220",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,152 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_base_mss. Al leer sysctl_tcp_base_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_base_mss. Al leer sysctl_tcp_base_mss, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.6.17",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "39FC5A69-1DAE-4AD2-B4AB-14DD87E3ED97"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
|
"url": "https://git.kernel.org/stable/c/30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4d7dea651b7fe0322be95054f64e3711afccc543",
|
"url": "https://git.kernel.org/stable/c/4d7dea651b7fe0322be95054f64e3711afccc543",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/514d2254c7b8aa2d257f5ffc79f0d96be2d6bfda",
|
"url": "https://git.kernel.org/stable/c/514d2254c7b8aa2d257f5ffc79f0d96be2d6bfda",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/88d78bc097cd8ebc6541e93316c9d9bf651b13e8",
|
"url": "https://git.kernel.org/stable/c/88d78bc097cd8ebc6541e93316c9d9bf651b13e8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9ca18116bc16ec31b9a3ce28ea1350badfa36128",
|
"url": "https://git.kernel.org/stable/c/9ca18116bc16ec31b9a3ce28ea1350badfa36128",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49598",
|
"id": "CVE-2022-49598",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:35.310",
|
"published": "2025-02-26T07:01:35.310",
|
||||||
"lastModified": "2025-02-26T07:01:35.310",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,31 +15,166 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_mtu_probing. Al leer sysctl_tcp_mtu_probing, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_mtu_probing. Al leer sysctl_tcp_mtu_probing, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "2.6.17",
|
||||||
|
"versionEndExcluding": "4.19.254",
|
||||||
|
"matchCriteriaId": "7949E902-CD08-4402-A5D4-69B7306B4EF2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.20",
|
||||||
|
"versionEndExcluding": "5.4.208",
|
||||||
|
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.5",
|
||||||
|
"versionEndExcluding": "5.10.134",
|
||||||
|
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/77a04845f0d28a3561494a5f3121488470a968a4",
|
"url": "https://git.kernel.org/stable/c/77a04845f0d28a3561494a5f3121488470a968a4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7e8fc428a7f680f1c4994a40e52d7f95a9a93038",
|
"url": "https://git.kernel.org/stable/c/7e8fc428a7f680f1c4994a40e52d7f95a9a93038",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/aabe9438fdfe004e021d5a206227ec105dbe2416",
|
"url": "https://git.kernel.org/stable/c/aabe9438fdfe004e021d5a206227ec105dbe2416",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b0920ca09d9ce19980c8391b9002455baa9c1417",
|
"url": "https://git.kernel.org/stable/c/b0920ca09d9ce19980c8391b9002455baa9c1417",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f47d00e077e7d61baf69e46dde3210c886360207",
|
"url": "https://git.kernel.org/stable/c/f47d00e077e7d61baf69e46dde3210c886360207",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f966773e13cdd3f12baa90071b7b660f6c633ccb",
|
"url": "https://git.kernel.org/stable/c/f966773e13cdd3f12baa90071b7b660f6c633ccb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49599",
|
"id": "CVE-2022-49599",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:35.403",
|
"published": "2025-02-26T07:01:35.403",
|
||||||
"lastModified": "2025-02-26T07:01:35.403",
|
"lastModified": "2025-03-10T20:23:01.223",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_l3mdev_accept. Al leer sysctl_tcp_l3mdev_accept, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_l3mdev_accept. Al leer sysctl_tcp_l3mdev_accept, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.5",
|
||||||
|
"versionEndExcluding": "5.10.137",
|
||||||
|
"matchCriteriaId": "9871FC5B-B802-4E9A-99C3-65D7CE6FF883"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.11",
|
||||||
|
"versionEndExcluding": "5.15.58",
|
||||||
|
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "5.18.15",
|
||||||
|
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/08a75f10679470552a3a443f9aefd1399604d31d",
|
"url": "https://git.kernel.org/stable/c/08a75f10679470552a3a443f9aefd1399604d31d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1d9c81833dec46ccb52a1d0db970fefb7c4fa071",
|
"url": "https://git.kernel.org/stable/c/1d9c81833dec46ccb52a1d0db970fefb7c4fa071",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7d38d86b818104cf88961f3aebea34da89364a8e",
|
"url": "https://git.kernel.org/stable/c/7d38d86b818104cf88961f3aebea34da89364a8e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9ba9cd43b5776c27d25e5a32dde9e80bdeb1c6a1",
|
"url": "https://git.kernel.org/stable/c/9ba9cd43b5776c27d25e5a32dde9e80bdeb1c6a1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0043",
|
"id": "CVE-2023-0043",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.580",
|
"published": "2023-02-27T16:15:11.580",
|
||||||
"lastModified": "2024-11-21T07:36:26.947",
|
"lastModified": "2025-03-10T19:15:36.813",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0278",
|
"id": "CVE-2023-0278",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.807",
|
"published": "2023-02-27T16:15:11.807",
|
||||||
"lastModified": "2024-11-21T07:36:52.977",
|
"lastModified": "2025-03-10T19:15:36.980",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0279",
|
"id": "CVE-2023-0279",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.883",
|
"published": "2023-02-27T16:15:11.883",
|
||||||
"lastModified": "2024-11-21T07:36:53.070",
|
"lastModified": "2025-03-10T19:15:37.140",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0331",
|
"id": "CVE-2023-0331",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:11.967",
|
"published": "2023-02-27T16:15:11.967",
|
||||||
"lastModified": "2024-11-21T07:36:59.217",
|
"lastModified": "2025-03-10T19:15:37.300",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0535",
|
"id": "CVE-2023-0535",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-02-27T16:15:12.313",
|
"published": "2023-02-27T16:15:12.313",
|
||||||
"lastModified": "2024-11-21T07:37:21.773",
|
"lastModified": "2025-03-10T19:15:37.457",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-24045",
|
"id": "CVE-2023-24045",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-03-01T01:15:10.537",
|
"published": "2023-03-01T01:15:10.537",
|
||||||
"lastModified": "2024-11-21T07:47:18.897",
|
"lastModified": "2025-03-10T19:15:37.617",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,6 +32,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -45,6 +65,16 @@
|
|||||||
"value": "CWE-434"
|
"value": "CWE-434"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27768",
|
"id": "CVE-2024-27768",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:08.290",
|
"published": "2024-03-18T14:15:08.290",
|
||||||
"lastModified": "2024-11-21T09:05:01.313",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27769",
|
"id": "CVE-2024-27769",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:08.547",
|
"published": "2024-03-18T14:15:08.547",
|
||||||
"lastModified": "2024-11-21T09:05:01.453",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,64 @@
|
|||||||
"value": "CWE-200"
|
"value": "CWE-200"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27770",
|
"id": "CVE-2024-27770",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:08.767",
|
"published": "2024-03-18T14:15:08.767",
|
||||||
"lastModified": "2024-11-21T09:05:01.600",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,64 @@
|
|||||||
"value": "CWE-23"
|
"value": "CWE-23"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27771",
|
"id": "CVE-2024-27771",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:08.997",
|
"published": "2024-03-18T14:15:08.997",
|
||||||
"lastModified": "2024-11-21T09:05:01.737",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27772",
|
"id": "CVE-2024-27772",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:09.210",
|
"published": "2024-03-18T14:15:09.210",
|
||||||
"lastModified": "2024-11-21T09:05:01.870",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27773",
|
"id": "CVE-2024-27773",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:09.447",
|
"published": "2024-03-18T14:15:09.447",
|
||||||
"lastModified": "2024-11-21T09:05:02.000",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,64 @@
|
|||||||
"value": "CWE-348"
|
"value": "CWE-348"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-345"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27774",
|
"id": "CVE-2024-27774",
|
||||||
"sourceIdentifier": "cna@cyber.gov.il",
|
"sourceIdentifier": "cna@cyber.gov.il",
|
||||||
"published": "2024-03-18T14:15:09.703",
|
"published": "2024-03-18T14:15:09.703",
|
||||||
"lastModified": "2024-11-21T09:05:02.147",
|
"lastModified": "2025-03-10T18:34:58.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.6,
|
"exploitabilityScore": 1.6,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,24 +69,64 @@
|
|||||||
"value": "CWE-259"
|
"value": "CWE-259"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-798"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:unitronics:unilogic:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.35.227",
|
||||||
|
"matchCriteriaId": "83F6397D-8B10-4F64-B2E6-693E63BEA027"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "cna@cyber.gov.il"
|
"source": "cna@cyber.gov.il",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
"url": "https://claroty.com/team82/blog/new-critical-vulnerabilities-in-unitronics-unistream-devices-uncovered",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
"url": "https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
29
CVE-2024/CVE-2024-441xx/CVE-2024-44179.json
Normal file
29
CVE-2024/CVE-2024-441xx/CVE-2024-44179.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-44179",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:37.960",
|
||||||
|
"lastModified": "2025-03-10T19:15:37.960",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sequoia 15. An attacker with physical access to a device may be able to read contact numbers from the lock screen."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121246",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
41
CVE-2024/CVE-2024-441xx/CVE-2024-44192.json
Normal file
41
CVE-2024/CVE-2024-441xx/CVE-2024-44192.json
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-44192",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.080",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.080",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121240",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121241",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121248",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121249",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-442xx/CVE-2024-44227.json
Normal file
25
CVE-2024/CVE-2024-442xx/CVE-2024-44227.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-44227",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.187",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.187",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-544xx/CVE-2024-54463.json
Normal file
21
CVE-2024/CVE-2024-544xx/CVE-2024-54463.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54463",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.290",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.290",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was addressed with improved entitlements. This issue is fixed in macOS Sequoia 15. An app may be able to access removable volumes without user consent."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
41
CVE-2024/CVE-2024-544xx/CVE-2024-54467.json
Normal file
41
CVE-2024/CVE-2024-544xx/CVE-2024-54467.json
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54467",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.387",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.387",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A cookie management issue was addressed with improved state management. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121240",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121241",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121248",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121249",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
CVE-2024/CVE-2024-544xx/CVE-2024-54469.json
Normal file
37
CVE-2024/CVE-2024-544xx/CVE-2024-54469.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54469",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.493",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.493",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121234",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121247",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121249",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-544xx/CVE-2024-54473.json
Normal file
21
CVE-2024/CVE-2024-544xx/CVE-2024-54473.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54473",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.600",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.600",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-545xx/CVE-2024-54546.json
Normal file
21
CVE-2024/CVE-2024-545xx/CVE-2024-54546.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54546",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.697",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.697",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-545xx/CVE-2024-54558.json
Normal file
25
CVE-2024/CVE-2024-545xx/CVE-2024-54558.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54558",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.790",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.790",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A clickjacking issue was addressed with improved out-of-process view handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to trick a user into granting access to photos from the user's photo library."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-545xx/CVE-2024-54560.json
Normal file
33
CVE-2024/CVE-2024-545xx/CVE-2024-54560.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54560",
|
||||||
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
|
"published": "2025-03-10T19:15:38.883",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.883",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121238",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121240",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121248",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121250",
|
||||||
|
"source": "product-security@apple.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-55581",
|
"id": "CVE-2024-55581",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-26T22:15:14.137",
|
"published": "2025-02-26T22:15:14.137",
|
||||||
"lastModified": "2025-03-04T20:15:36.677",
|
"lastModified": "2025-03-10T20:15:13.987",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -56,6 +56,10 @@
|
|||||||
"url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf",
|
"url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00007.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf",
|
"url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf",
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56184.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56184.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56184",
|
||||||
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
|
"published": "2025-03-10T19:15:38.983",
|
||||||
|
"lastModified": "2025-03-10T19:15:38.983",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01",
|
||||||
|
"source": "dsap-vuln-management@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56185.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56185.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56185",
|
||||||
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
|
"published": "2025-03-10T19:15:39.097",
|
||||||
|
"lastModified": "2025-03-10T19:15:39.097",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In ProtocolUnsolOnSSAdapter::GetServiceClass() of protocolcalladapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01",
|
||||||
|
"source": "dsap-vuln-management@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56186.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56186.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56186",
|
||||||
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
|
"published": "2025-03-10T19:15:39.193",
|
||||||
|
"lastModified": "2025-03-10T19:15:39.193",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In closeChannel of secureelementimpl.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01",
|
||||||
|
"source": "dsap-vuln-management@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56187.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56187.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56187",
|
||||||
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
|
"published": "2025-03-10T19:15:39.293",
|
||||||
|
"lastModified": "2025-03-10T19:15:39.293",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In ppcfw_deny_sec_dram_access of ppcfw.c, there is a possible arbitrary read from TEE memory due to a logic error in the code. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01",
|
||||||
|
"source": "dsap-vuln-management@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56188.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56188.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56188",
|
||||||
|
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||||
|
"published": "2025-03-10T19:15:39.393",
|
||||||
|
"lastModified": "2025-03-10T19:15:39.393",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "there is a possible way to crash the modem due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://source.android.com/security/bulletin/pixel/2025-03-01",
|
||||||
|
"source": "dsap-vuln-management@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-0604",
|
"id": "CVE-2025-0604",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2025-01-22T15:15:14.827",
|
"published": "2025-01-22T15:15:14.827",
|
||||||
"lastModified": "2025-03-10T18:15:30.100",
|
"lastModified": "2025-03-10T19:15:39.487",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -52,6 +52,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:2544",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2025:2545",
|
"url": "https://access.redhat.com/errata/RHSA-2025:2545",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-1015",
|
"id": "CVE-2025-1015",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2025-02-04T14:15:32.363",
|
"published": "2025-02-04T14:15:32.363",
|
||||||
"lastModified": "2025-02-06T22:15:40.247",
|
"lastModified": "2025-03-10T19:15:39.590",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the \u201cOther\u201d field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7."
|
"value": "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the \u201cOther\u201d field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -114,6 +114,10 @@
|
|||||||
"tags": [
|
"tags": [
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2025-11/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-1391",
|
"id": "CVE-2025-1391",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2025-02-17T14:15:08.413",
|
"published": "2025-02-17T14:15:08.413",
|
||||||
"lastModified": "2025-03-10T18:15:30.410",
|
"lastModified": "2025-03-10T19:15:39.860",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -52,6 +52,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:2544",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2025:2545",
|
"url": "https://access.redhat.com/errata/RHSA-2025:2545",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
90
CVE-2025/CVE-2025-226xx/CVE-2025-22603.json
Normal file
90
CVE-2025/CVE-2025-226xx/CVE-2025-22603.json
Normal file
@ -0,0 +1,90 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-22603",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-10T19:15:39.970",
|
||||||
|
"lastModified": "2025-03-10T19:15:39.970",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Versions prior to autogpt-platform-beta-v0.4.2 contains a server-side request forgery (SSRF) vulnerability inside component (or block) `Send Web Request`. The root cause is that IPV6 address is not restricted or filtered, which allows attackers to perform a server side request forgery to visit an IPV6 service. autogpt-platform-beta-v0.4.2 fixes the issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://boatneck-faucet-cba.notion.site/SSRF-of-AutoGPT-153b650a4d88804d923ad65a015a7d61",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Significant-Gravitas/AutoGPT/blob/2121ffd06b26a438706bf642372cc46d81c94ddc/autogpt_platform/backend/backend/util/request.py#L11",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Significant-Gravitas/AutoGPT/commit/26214e1b2c6777e0fae866642b23420adaadd6c4",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-4c8v-hwxc-2356",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-24813",
|
"id": "CVE-2025-24813",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2025-03-10T17:15:35.067",
|
"published": "2025-03-10T17:15:35.067",
|
||||||
"lastModified": "2025-03-10T17:15:35.067",
|
"lastModified": "2025-03-10T19:15:40.123",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -32,6 +32,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq",
|
"url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/03/10/5",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
68
CVE-2025/CVE-2025-253xx/CVE-2025-25306.json
Normal file
68
CVE-2025/CVE-2025-253xx/CVE-2025-25306.json
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-25306",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-10T19:15:40.230",
|
||||||
|
"lastModified": "2025-03-10T19:15:40.230",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Misskey is an open source, federated social media platform. The patch for CVE-2024-52591 did not sufficiently validate the relation between the `id` and `url` fields of ActivityPub objects. An attacker can forge an object where they claim authority in the `url` field even if the specific ActivityPub object type require authority in the `id` field. Version 2025.2.1 addresses the issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N",
|
||||||
|
"baseScore": 9.3,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-346"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-441"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1025"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/misskey-dev/misskey/releases/tag/2025.2.1",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/misskey-dev/misskey/security/advisories/GHSA-6w2c-vf6f-xf26",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-25614",
|
"id": "CVE-2025-25614",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-10T15:15:37.330",
|
"published": "2025-03-10T15:15:37.330",
|
||||||
"lastModified": "2025-03-10T15:15:37.330",
|
"lastModified": "2025-03-10T20:15:14.280",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers."
|
"value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/armaansidana2003/CVE-2025-25614",
|
"url": "https://github.com/armaansidana2003/CVE-2025-25614",
|
||||||
@ -20,6 +55,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://github.com/changeweb/Unifiedtransform",
|
"url": "https://github.com/changeweb/Unifiedtransform",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/armaansidana2003/CVE-2025-25614",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-25620",
|
"id": "CVE-2025-25620",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-10T15:15:37.490",
|
"published": "2025-03-10T15:15:37.490",
|
||||||
"lastModified": "2025-03-10T15:15:37.490",
|
"lastModified": "2025-03-10T19:15:40.393",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function."
|
"value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/armaansidana2003/CVE-2025-25620",
|
"url": "https://github.com/armaansidana2003/CVE-2025-25620",
|
||||||
|
29
CVE-2025/CVE-2025-266xx/CVE-2025-26695.json
Normal file
29
CVE-2025/CVE-2025-266xx/CVE-2025-26695.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-26695",
|
||||||
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
|
"published": "2025-03-10T19:15:40.567",
|
||||||
|
"lastModified": "2025-03-10T19:15:40.567",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883039",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2025-17/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2025-18/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
29
CVE-2025/CVE-2025-266xx/CVE-2025-26696.json
Normal file
29
CVE-2025/CVE-2025-266xx/CVE-2025-26696.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-26696",
|
||||||
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
|
"published": "2025-03-10T19:15:40.670",
|
||||||
|
"lastModified": "2025-03-10T19:15:40.670",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Certain crafted MIME email messages that claimed to contain an encrypted OpenPGP message, which instead contained an OpenPGP signed message, were wrongly shown as being encrypted. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864205",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2025-17/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2025-18/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
82
CVE-2025/CVE-2025-271xx/CVE-2025-27136.json
Normal file
82
CVE-2025/CVE-2025-271xx/CVE-2025-27136.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27136",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-10T19:15:40.770",
|
||||||
|
"lastModified": "2025-03-10T19:15:40.770",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "LocalS3 is an Amazon S3 mock service for testing and local development. Prior to version 1.21, the LocalS3 service's bucket creation endpoint is vulnerable to XML External Entity (XXE) injection. When processing the CreateBucketConfiguration XML document during bucket creation, the service's XML parser is configured to resolve external entities. This allows an attacker to declare an external entity that references an internal URL, which the server will then attempt to fetch when parsing the XML. The vulnerability specifically occurs in the location constraint processing, where the XML parser resolves external entities without proper validation or restrictions. When the external entity is resolved, the server makes an HTTP request to the specified URL and includes the response content in the parsed XML document. This vulnerability can be exploited to perform server-side request forgery (SSRF) attacks, allowing an attacker to make requests to internal services or resources that should not be accessible from external networks. The server will include the responses from these internal requests in the resulting bucket configuration, effectively leaking sensitive information. The attacker only needs to be able to send HTTP requests to the LocalS3 service to exploit this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "LOW",
|
||||||
|
"subIntegrityImpact": "LOW",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Robothy/local-s3/commit/d6ed756ceb30c1eb9d4263321ac683d734f8836f",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Robothy/local-s3/security/advisories/GHSA-g6wm-2v64-wq36",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
68
CVE-2025/CVE-2025-276xx/CVE-2025-27615.json
Normal file
68
CVE-2025/CVE-2025-276xx/CVE-2025-27615.json
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27615",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-10T19:15:40.917",
|
||||||
|
"lastModified": "2025-03-10T19:15:40.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "umatiGateway is software for connecting OPC Unified Architecture servers with an MQTT broker utilizing JSON messages. The user interface may possibly be publicly accessible with umatiGateway's provided docker-compose file. With this access, the configuration can be viewed and altered. Commit 5d81a3412bc0051754a3095d89a06d6d743f2b16 uses `127.0.0.1:8080:8080` to limit access to the local network. For those who are unable to use this proposed patch, a firewall on Port 8080 may block remote access, but the workaround may not be perfect because Docker may also bypass a firewall by its iptable based rules for port forwarding."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||||
|
"baseScore": 8.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 4.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/umati/umatiGateway/blob/abe73096a17307327f0d6dc0ed4db1fb93464521/README.md?plain=1#L34-L35",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/umati/umatiGateway/commit/5d81a3412bc0051754a3095d89a06d6d743f2b16",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/umati/umatiGateway/pull/101",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/umati/umatiGateway/security/advisories/GHSA-qf9w-x9qx-2mq7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
76
CVE-2025/CVE-2025-276xx/CVE-2025-27616.json
Normal file
76
CVE-2025/CVE-2025-276xx/CVE-2025-27616.json
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27616",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-10T19:15:41.080",
|
||||||
|
"lastModified": "2025-03-10T19:15:41.080",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Prior to versions 0.25.3 and 0.26.3, by spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository. These secrets could be exfiltrated by follow up builds to the repository. Users with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit, and any user with access to the CI instance and the linked source control manager can perform the exploit. Versions 0.25.3 and 0.26.3 fix the issue. No known workarounds are available."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-290"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-345"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/go-vela/server/commit/257886e5a3eea518548387885894e239668584f5",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/go-vela/server/commit/67c1892e2464dc54b8d2588815dfb7819222500b",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/go-vela/server/releases/tag/v0.25.3",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/go-vela/server/releases/tag/v0.26.3",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/go-vela/server/security/advisories/GHSA-9m63-33q3-xq5x",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2025-27636",
|
"id": "CVE-2025-27636",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2025-03-09T13:15:34.403",
|
"published": "2025-03-09T13:15:34.403",
|
||||||
"lastModified": "2025-03-10T14:15:25.827",
|
"lastModified": "2025-03-10T19:15:41.240",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Bypass/Injection vulnerability in Apache Camel-Bean component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3.\n\nUsers are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.\n\nThis vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components\n\n * camel-servlet\n * camel-jetty\n * camel-undertow\n * camel-platform-http\n * camel-netty-http\n\n\nand in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular:\u00a0\n\n * The bean invocation (is only affected if you use any of the above\u00a0together with camel-bean component).\n\n * The bean that can be called, has\u00a0more than 1 method implemented.\nIn these conditions an attacker could be able to forge a Camel header name and make the bean component invoking other methods in the same bean.\n\nThe vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with \"Camel\", \"camel\", or \"org.apache.camel.\".\u00a0\n\n\nMitigation:\u00a0You can easily work around this in your Camel applications by removing the\u00a0headers in your Camel routes. There are many ways of doing this, also\u00a0globally or per route. This means you could use the removeHeaders EIP, to filter out anything like \"cAmel, cAMEL\" etc, or in general everything not starting with \"Camel\", \"camel\" or \"org.apache.camel.\"."
|
"value": "Bypass/Injection vulnerability in Apache Camel-Bean component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3.\n\nUsers are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.\n\nThis vulnerability is only present in the following situation. The user is using one of the following HTTP Servers via one the of the following Camel components\n\n * camel-servlet\n * camel-jetty\n * camel-undertow\n * camel-platform-http\n * camel-netty-http\n\n\nand in the route, the exchange will be routed to a camel-bean producer. So ONLY camel-bean component is affected. In particular:\u00a0\n\n * The bean invocation (is only affected if you use any of the above\u00a0together with camel-bean component).\n\n * The bean that can be called, has\u00a0more than 1 method implemented.\nIn these conditions an attacker could be able to forge a Camel header name and make the bean component invoking other methods in the same bean.\n\nThe vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with \"Camel\", \"camel\", or \"org.apache.camel.\".\u00a0\n\n\nMitigation:\u00a0You can easily work around this in your Camel applications by removing the\u00a0headers in your Camel routes. There are many ways of doing this, also\u00a0globally or per route. This means you could use the removeHeaders EIP, to filter out anything like \"cAmel, cAMEL\" etc, or in general everything not starting with \"Camel\", \"camel\" or \"org.apache.camel.\"."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de bypass/inyecci\u00f3n en el componente Apache Camel-Bean en determinadas condiciones. Este problema afecta a Apache Camel: desde la versi\u00f3n 4.10.0 hasta la <= 4.10.1, desde la versi\u00f3n 4.8.0 hasta la <= 4.8.4, desde la versi\u00f3n 3.10.0 hasta la <= 3.22.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 4.10.2 para 4.10.x LTS, 4.8.5 para 4.8.x LTS y 3.22.4 para las versiones 3.x. Esta vulnerabilidad solo est\u00e1 presente en la siguiente situaci\u00f3n. El usuario est\u00e1 utilizando uno de los siguientes servidores HTTP a trav\u00e9s de uno de los siguientes componentes Camel * camel-servlet * camel-jetty * camel-undertow * camel-platform-http * camel-netty-http y en la ruta, el intercambio se enrutar\u00e1 a un productor de camel-bean. Por lo tanto, SOLO el componente camel-bean est\u00e1 afectado. En particular: * La invocaci\u00f3n del bean (solo se ve afectada si usas cualquiera de los anteriores junto con el componente camel-bean). * El bean que se puede llamar tiene m\u00e1s de 1 m\u00e9todo implementado. En estas condiciones, un atacante podr\u00eda falsificar un nombre de encabezado de Camel y hacer que el componente bean invoque otros m\u00e9todos en el mismo bean. La vulnerabilidad surge debido a un error en el mecanismo de filtrado predeterminado que solo bloquea los encabezados que comienzan con \"Camel\", \"camel\" u \"org.apache.camel\". Mitigaci\u00f3n: puedes solucionar esto f\u00e1cilmente en tus aplicaciones Camel eliminando los encabezados en tus rutas Camel. Hay muchas formas de hacer esto, tambi\u00e9n globalmente o por ruta. Esto significa que puedes usar el EIP removeHeaders para filtrar cualquier cosa como \"cAmel, cAMEL\", etc., o en general todo lo que no comience con \"Camel\", \"camel\" u \"org.apache.camel\"."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 5.6,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-178"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://camel.apache.org/security/CVE-2025-27636.html",
|
"url": "https://camel.apache.org/security/CVE-2025-27636.html",
|
||||||
@ -28,6 +67,14 @@
|
|||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/09/1",
|
"url": "http://www.openwall.com/lists/oss-security/2025/03/09/1",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://camel.apache.org/security/CVE-2025-27636.txt.asc",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC/blob/main/src/main/java/com/example/camel/VulnerableCamel.java",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
21
CVE-2025/CVE-2025-279xx/CVE-2025-27913.json
Normal file
21
CVE-2025/CVE-2025-279xx/CVE-2025-27913.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27913",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-10T20:15:14.500",
|
||||||
|
"lastModified": "2025-03-10T20:15:14.500",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.passbolt.com/incidents/host-header-injection",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
90
README.md
90
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-10T19:00:20.273143+00:00
|
2025-03-10T21:00:20.174126+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-10T18:34:58.663000+00:00
|
2025-03-10T20:23:01.223000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,49 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
284627
|
284652
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `5`
|
Recently added CVEs: `25`
|
||||||
|
|
||||||
- [CVE-2024-52812](CVE-2024/CVE-2024-528xx/CVE-2024-52812.json) (`2025-03-10T18:15:29.207`)
|
- [CVE-2022-43454](CVE-2022/CVE-2022-434xx/CVE-2022-43454.json) (`2025-03-10T20:15:13.593`)
|
||||||
- [CVE-2024-53307](CVE-2024/CVE-2024-533xx/CVE-2024-53307.json) (`2025-03-10T18:15:29.373`)
|
- [CVE-2022-48610](CVE-2022/CVE-2022-486xx/CVE-2022-48610.json) (`2025-03-10T20:15:13.713`)
|
||||||
- [CVE-2024-55199](CVE-2024/CVE-2024-551xx/CVE-2024-55199.json) (`2025-03-10T18:15:29.757`)
|
- [CVE-2024-44179](CVE-2024/CVE-2024-441xx/CVE-2024-44179.json) (`2025-03-10T19:15:37.960`)
|
||||||
- [CVE-2025-1296](CVE-2025/CVE-2025-12xx/CVE-2025-1296.json) (`2025-03-10T18:15:30.237`)
|
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-10T19:15:38.080`)
|
||||||
- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T17:15:35.067`)
|
- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-10T19:15:38.187`)
|
||||||
|
- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-10T19:15:38.290`)
|
||||||
|
- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-10T19:15:38.387`)
|
||||||
|
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-10T19:15:38.493`)
|
||||||
|
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-10T19:15:38.600`)
|
||||||
|
- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-10T19:15:38.697`)
|
||||||
|
- [CVE-2024-54558](CVE-2024/CVE-2024-545xx/CVE-2024-54558.json) (`2025-03-10T19:15:38.790`)
|
||||||
|
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-10T19:15:38.883`)
|
||||||
|
- [CVE-2024-56184](CVE-2024/CVE-2024-561xx/CVE-2024-56184.json) (`2025-03-10T19:15:38.983`)
|
||||||
|
- [CVE-2024-56185](CVE-2024/CVE-2024-561xx/CVE-2024-56185.json) (`2025-03-10T19:15:39.097`)
|
||||||
|
- [CVE-2024-56186](CVE-2024/CVE-2024-561xx/CVE-2024-56186.json) (`2025-03-10T19:15:39.193`)
|
||||||
|
- [CVE-2024-56187](CVE-2024/CVE-2024-561xx/CVE-2024-56187.json) (`2025-03-10T19:15:39.293`)
|
||||||
|
- [CVE-2024-56188](CVE-2024/CVE-2024-561xx/CVE-2024-56188.json) (`2025-03-10T19:15:39.393`)
|
||||||
|
- [CVE-2025-22603](CVE-2025/CVE-2025-226xx/CVE-2025-22603.json) (`2025-03-10T19:15:39.970`)
|
||||||
|
- [CVE-2025-25306](CVE-2025/CVE-2025-253xx/CVE-2025-25306.json) (`2025-03-10T19:15:40.230`)
|
||||||
|
- [CVE-2025-26695](CVE-2025/CVE-2025-266xx/CVE-2025-26695.json) (`2025-03-10T19:15:40.567`)
|
||||||
|
- [CVE-2025-26696](CVE-2025/CVE-2025-266xx/CVE-2025-26696.json) (`2025-03-10T19:15:40.670`)
|
||||||
|
- [CVE-2025-27136](CVE-2025/CVE-2025-271xx/CVE-2025-27136.json) (`2025-03-10T19:15:40.770`)
|
||||||
|
- [CVE-2025-27615](CVE-2025/CVE-2025-276xx/CVE-2025-27615.json) (`2025-03-10T19:15:40.917`)
|
||||||
|
- [CVE-2025-27616](CVE-2025/CVE-2025-276xx/CVE-2025-27616.json) (`2025-03-10T19:15:41.080`)
|
||||||
|
- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T20:15:14.500`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `55`
|
Recently modified CVEs: `34`
|
||||||
|
|
||||||
- [CVE-2024-26640](CVE-2024/CVE-2024-266xx/CVE-2024-26640.json) (`2025-03-10T16:58:35.783`)
|
- [CVE-2022-49596](CVE-2022/CVE-2022-495xx/CVE-2022-49596.json) (`2025-03-10T20:23:01.223`)
|
||||||
- [CVE-2024-27767](CVE-2024/CVE-2024-277xx/CVE-2024-27767.json) (`2025-03-10T18:34:58.663`)
|
- [CVE-2022-49597](CVE-2022/CVE-2022-495xx/CVE-2022-49597.json) (`2025-03-10T20:23:01.223`)
|
||||||
- [CVE-2024-28793](CVE-2024/CVE-2024-287xx/CVE-2024-28793.json) (`2025-03-10T18:13:04.007`)
|
- [CVE-2022-49598](CVE-2022/CVE-2022-495xx/CVE-2022-49598.json) (`2025-03-10T20:23:01.223`)
|
||||||
- [CVE-2024-38319](CVE-2024/CVE-2024-383xx/CVE-2024-38319.json) (`2025-03-10T18:13:04.007`)
|
- [CVE-2022-49599](CVE-2022/CVE-2022-495xx/CVE-2022-49599.json) (`2025-03-10T20:23:01.223`)
|
||||||
- [CVE-2024-42733](CVE-2024/CVE-2024-427xx/CVE-2024-42733.json) (`2025-03-10T17:15:34.673`)
|
- [CVE-2023-0043](CVE-2023/CVE-2023-00xx/CVE-2023-0043.json) (`2025-03-10T19:15:36.813`)
|
||||||
- [CVE-2024-43291](CVE-2024/CVE-2024-432xx/CVE-2024-43291.json) (`2025-03-10T17:06:30.757`)
|
- [CVE-2023-0278](CVE-2023/CVE-2023-02xx/CVE-2023-0278.json) (`2025-03-10T19:15:36.980`)
|
||||||
- [CVE-2024-49281](CVE-2024/CVE-2024-492xx/CVE-2024-49281.json) (`2025-03-10T17:06:30.757`)
|
- [CVE-2023-0279](CVE-2023/CVE-2023-02xx/CVE-2023-0279.json) (`2025-03-10T19:15:37.140`)
|
||||||
- [CVE-2024-51747](CVE-2024/CVE-2024-517xx/CVE-2024-51747.json) (`2025-03-10T17:06:30.757`)
|
- [CVE-2023-0331](CVE-2023/CVE-2023-03xx/CVE-2023-0331.json) (`2025-03-10T19:15:37.300`)
|
||||||
- [CVE-2024-51748](CVE-2024/CVE-2024-517xx/CVE-2024-51748.json) (`2025-03-10T17:06:30.757`)
|
- [CVE-2023-0535](CVE-2023/CVE-2023-05xx/CVE-2023-0535.json) (`2025-03-10T19:15:37.457`)
|
||||||
- [CVE-2024-54001](CVE-2024/CVE-2024-540xx/CVE-2024-54001.json) (`2025-03-10T17:06:30.757`)
|
- [CVE-2023-24045](CVE-2023/CVE-2023-240xx/CVE-2023-24045.json) (`2025-03-10T19:15:37.617`)
|
||||||
- [CVE-2024-57011](CVE-2024/CVE-2024-570xx/CVE-2024-57011.json) (`2025-03-10T17:20:52.287`)
|
- [CVE-2024-27768](CVE-2024/CVE-2024-277xx/CVE-2024-27768.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57012](CVE-2024/CVE-2024-570xx/CVE-2024-57012.json) (`2025-03-10T17:20:52.287`)
|
- [CVE-2024-27769](CVE-2024/CVE-2024-277xx/CVE-2024-27769.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57013](CVE-2024/CVE-2024-570xx/CVE-2024-57013.json) (`2025-03-10T17:20:52.287`)
|
- [CVE-2024-27770](CVE-2024/CVE-2024-277xx/CVE-2024-27770.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57014](CVE-2024/CVE-2024-570xx/CVE-2024-57014.json) (`2025-03-10T17:20:52.287`)
|
- [CVE-2024-27771](CVE-2024/CVE-2024-277xx/CVE-2024-27771.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57015](CVE-2024/CVE-2024-570xx/CVE-2024-57015.json) (`2025-03-10T17:20:52.287`)
|
- [CVE-2024-27772](CVE-2024/CVE-2024-277xx/CVE-2024-27772.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57016](CVE-2024/CVE-2024-570xx/CVE-2024-57016.json) (`2025-03-10T17:23:12.970`)
|
- [CVE-2024-27773](CVE-2024/CVE-2024-277xx/CVE-2024-27773.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57017](CVE-2024/CVE-2024-570xx/CVE-2024-57017.json) (`2025-03-10T17:23:12.970`)
|
- [CVE-2024-27774](CVE-2024/CVE-2024-277xx/CVE-2024-27774.json) (`2025-03-10T18:34:58.663`)
|
||||||
- [CVE-2024-57018](CVE-2024/CVE-2024-570xx/CVE-2024-57018.json) (`2025-03-10T17:23:12.970`)
|
- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-10T20:15:13.987`)
|
||||||
- [CVE-2024-57019](CVE-2024/CVE-2024-570xx/CVE-2024-57019.json) (`2025-03-10T17:23:12.970`)
|
- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T19:15:39.487`)
|
||||||
- [CVE-2024-57020](CVE-2024/CVE-2024-570xx/CVE-2024-57020.json) (`2025-03-10T17:25:21.297`)
|
- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-03-10T19:15:39.590`)
|
||||||
- [CVE-2024-57021](CVE-2024/CVE-2024-570xx/CVE-2024-57021.json) (`2025-03-10T17:25:21.297`)
|
- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T19:15:39.860`)
|
||||||
- [CVE-2024-57022](CVE-2024/CVE-2024-570xx/CVE-2024-57022.json) (`2025-03-10T17:25:21.297`)
|
- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T19:15:40.123`)
|
||||||
- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T18:15:30.100`)
|
- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T20:15:14.280`)
|
||||||
- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T18:15:30.410`)
|
- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T19:15:40.393`)
|
||||||
- [CVE-2025-2097](CVE-2025/CVE-2025-20xx/CVE-2025-2097.json) (`2025-03-10T18:15:30.680`)
|
- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T19:15:41.240`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
207
_state.csv
207
_state.csv
@ -202490,8 +202490,8 @@ CVE-2022-34902,0,0,3bca642036a7f5fbef7abb4384927b60af66690baf9b9711fd545cc79d136
|
|||||||
CVE-2022-34903,0,0,a6056b96bd3a0cfd0bd50472138c4b711587fbfdb78b1d8479eb2f1688841410,2024-11-21T07:10:24.240000
|
CVE-2022-34903,0,0,a6056b96bd3a0cfd0bd50472138c4b711587fbfdb78b1d8479eb2f1688841410,2024-11-21T07:10:24.240000
|
||||||
CVE-2022-34906,0,0,e6188b730417ea61c7bb7ebf52009083f4a7cb4dbce27bcd12f7111ffbae3126,2024-11-21T07:10:24.403000
|
CVE-2022-34906,0,0,e6188b730417ea61c7bb7ebf52009083f4a7cb4dbce27bcd12f7111ffbae3126,2024-11-21T07:10:24.403000
|
||||||
CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749a7f,2024-11-21T07:10:24.560000
|
CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749a7f,2024-11-21T07:10:24.560000
|
||||||
CVE-2022-34908,0,0,e372e6e4ad38103870ef9ceb4a9207d87f8f4045404cf5bfa60880c2b13c9b58,2024-11-21T07:10:24.703000
|
CVE-2022-34908,0,1,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000
|
||||||
CVE-2022-34909,0,0,fd35bc802b835478546da3a07bd2709024c072e0e0f1103ce5b1115076dcdc59,2024-11-21T07:10:24.863000
|
CVE-2022-34909,0,1,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000
|
||||||
CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000
|
CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000
|
||||||
CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000
|
CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000
|
||||||
CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000
|
CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000
|
||||||
@ -209145,6 +209145,7 @@ CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff
|
|||||||
CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000
|
CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000
|
||||||
CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000
|
CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000
|
||||||
CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000
|
CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000
|
||||||
|
CVE-2022-43454,1,1,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000
|
||||||
CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000
|
CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000
|
||||||
CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000
|
CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000
|
||||||
CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000
|
CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000
|
||||||
@ -212063,7 +212064,7 @@ CVE-2022-4756,0,0,9e970853f5aac5d7f6051f102cceedd8f99418abe211ab6b4e2528e717d24f
|
|||||||
CVE-2022-47560,0,0,5616db9aa528c40205c29824050b905c2e88ea51b1e926c93bed02b5e4ec18c6,2024-11-21T07:32:11.777000
|
CVE-2022-47560,0,0,5616db9aa528c40205c29824050b905c2e88ea51b1e926c93bed02b5e4ec18c6,2024-11-21T07:32:11.777000
|
||||||
CVE-2022-47561,0,0,454b37f7fd9c11c3656067782562c54987945e78afe479ca0f20e9d7f49ec371,2024-11-21T07:32:11.913000
|
CVE-2022-47561,0,0,454b37f7fd9c11c3656067782562c54987945e78afe479ca0f20e9d7f49ec371,2024-11-21T07:32:11.913000
|
||||||
CVE-2022-47562,0,0,64dac3d60c8b8f4b61b8e11f0539d75ff755f60ed046d7be0cc3bfc35090556c,2024-11-21T07:32:12.047000
|
CVE-2022-47562,0,0,64dac3d60c8b8f4b61b8e11f0539d75ff755f60ed046d7be0cc3bfc35090556c,2024-11-21T07:32:12.047000
|
||||||
CVE-2022-4757,0,0,7dc15139d98de2a86a5975751588909bbbe292abf740d3b5b31da8de45a4f307,2024-11-21T07:35:52.970000
|
CVE-2022-4757,0,1,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000
|
||||||
CVE-2022-47577,0,0,9550a922f1829c9398ee175ef3ac239bec1ad3c7148c35d57f01a11d7f1789f1,2024-11-21T07:32:12.187000
|
CVE-2022-47577,0,0,9550a922f1829c9398ee175ef3ac239bec1ad3c7148c35d57f01a11d7f1789f1,2024-11-21T07:32:12.187000
|
||||||
CVE-2022-47578,0,0,37fbfce9feaf52d993443117ac1a6355cd7a044484cc92ee5e869312941de9d0,2024-11-21T07:32:12.360000
|
CVE-2022-47578,0,0,37fbfce9feaf52d993443117ac1a6355cd7a044484cc92ee5e869312941de9d0,2024-11-21T07:32:12.360000
|
||||||
CVE-2022-4758,0,0,46b648ad13c452add0819ad569687b406e8aabbc253f4a165ea41d12a6100cca,2024-11-21T07:35:53.073000
|
CVE-2022-4758,0,0,46b648ad13c452add0819ad569687b406e8aabbc253f4a165ea41d12a6100cca,2024-11-21T07:35:53.073000
|
||||||
@ -212242,7 +212243,7 @@ CVE-2022-47943,0,0,6fed2aad337ab091392ac44913487de3665a0a14f1640eac5a709d8bd7b00
|
|||||||
CVE-2022-47945,0,0,57405884bdcd1ba6eb1c80919085ce13225e24da51371e79eb0b976df43e466f,2024-11-21T07:32:36.703000
|
CVE-2022-47945,0,0,57405884bdcd1ba6eb1c80919085ce13225e24da51371e79eb0b976df43e466f,2024-11-21T07:32:36.703000
|
||||||
CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca672,2024-11-21T07:32:36.927000
|
CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca672,2024-11-21T07:32:36.927000
|
||||||
CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000
|
CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000
|
||||||
CVE-2022-4795,0,1,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000
|
CVE-2022-4795,0,0,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000
|
||||||
CVE-2022-47950,0,0,003354ded967d7f0656182efcdefcb02844991e48622def15771f5148d7f730b,2024-11-21T07:32:37.363000
|
CVE-2022-47950,0,0,003354ded967d7f0656182efcdefcb02844991e48622def15771f5148d7f730b,2024-11-21T07:32:37.363000
|
||||||
CVE-2022-47951,0,0,481e357c755abcd47148b16b7b723bb646738cb20fb8e6121dbb931406f4c0c1,2024-11-21T07:32:37.573000
|
CVE-2022-47951,0,0,481e357c755abcd47148b16b7b723bb646738cb20fb8e6121dbb931406f4c0c1,2024-11-21T07:32:37.573000
|
||||||
CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000
|
CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000
|
||||||
@ -212427,7 +212428,7 @@ CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96
|
|||||||
CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000
|
CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000
|
||||||
CVE-2022-48288,0,0,53624dc7dedd158cf2e34bcf6d37d3940a853ce7cfc5079c02d9b9beb2969500,2024-11-21T07:33:05.757000
|
CVE-2022-48288,0,0,53624dc7dedd158cf2e34bcf6d37d3940a853ce7cfc5079c02d9b9beb2969500,2024-11-21T07:33:05.757000
|
||||||
CVE-2022-48289,0,0,b5b366f7e746d95cd74726054f258dc90ba5d828687acb098d0143f33c425f64,2024-11-21T07:33:05.897000
|
CVE-2022-48289,0,0,b5b366f7e746d95cd74726054f258dc90ba5d828687acb098d0143f33c425f64,2024-11-21T07:33:05.897000
|
||||||
CVE-2022-4829,0,0,8b9ddff4b04c3f527cf1c36861c9e9abbc4e90d34d328f8934fb482e6d66cc92,2024-11-21T07:36:01.690000
|
CVE-2022-4829,0,1,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000
|
||||||
CVE-2022-48290,0,0,a18a7f7669377ff6d4a7ef738b38d89f2aa8b56899df8cbcaaa74e53e24c5978,2024-11-21T07:33:06.020000
|
CVE-2022-48290,0,0,a18a7f7669377ff6d4a7ef738b38d89f2aa8b56899df8cbcaaa74e53e24c5978,2024-11-21T07:33:06.020000
|
||||||
CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6ef5,2024-11-21T07:33:06.130000
|
CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6ef5,2024-11-21T07:33:06.130000
|
||||||
CVE-2022-48292,0,0,4580e619ac80f5659a384b768187cc9d60d1eda7933d4c8a5ea11acef9450061,2024-11-21T07:33:06.260000
|
CVE-2022-48292,0,0,4580e619ac80f5659a384b768187cc9d60d1eda7933d4c8a5ea11acef9450061,2024-11-21T07:33:06.260000
|
||||||
@ -212695,6 +212696,7 @@ CVE-2022-48604,0,0,b7085c3e4c6adaacb59f90e568dbbe0fd9c06f7150463b110ec956aae9dc3
|
|||||||
CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000
|
CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000
|
||||||
CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000
|
CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000
|
||||||
CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000
|
CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000
|
||||||
|
CVE-2022-48610,1,1,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000
|
||||||
CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000
|
CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000
|
||||||
CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000
|
CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000
|
||||||
CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000
|
CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000
|
||||||
@ -213761,16 +213763,16 @@ CVE-2022-49587,0,0,045dfa49579766af5db3b307fa6fccc91442356d8f98685bbe7c4c2e730f7
|
|||||||
CVE-2022-49588,0,0,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000
|
CVE-2022-49588,0,0,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000
|
||||||
CVE-2022-49589,0,0,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000
|
CVE-2022-49589,0,0,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000
|
||||||
CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000
|
CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000
|
||||||
CVE-2022-49590,0,0,e901dd69c67dc719a295c49d0b508bca98a06b0bf33b9e656239520776a1187e,2025-02-26T07:01:34.573000
|
CVE-2022-49590,0,1,20cd3c2daa264623e56a323e402735c867806a89472d26c1ed45d8d3ae8e100c,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49591,0,0,cf3ff33bf8faedc1e67d17369ac2be6e3a5a1baf8540a23bdbb24c08298a0012,2025-02-26T07:01:34.667000
|
CVE-2022-49591,0,1,0cc8543ea627147ea0bf828758a275a1f14ea9d390d5ffa1e7b74f404a8593b8,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49592,0,0,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000
|
CVE-2022-49592,0,0,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000
|
||||||
CVE-2022-49593,0,0,e5f1303a652842d3b18f50e804cbd8b7648b3bc37458a06fe6db95793bb227fb,2025-02-26T07:01:34.853000
|
CVE-2022-49593,0,1,a490d84d1db8d08c1bd74f1bbffbd14e057da73f802032361a953fc57bba4b2a,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49594,0,0,cd4b7b4e5b4bbbf1c4c76df7cdb5a625b549e358714ddf40517b32b3e1240580,2025-02-26T07:01:34.947000
|
CVE-2022-49594,0,1,68c11eaa5cee315d2058915886cf4743aec7164a60d951e32eded865eae0e0a5,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49595,0,0,422f7e67ccc1235d8f9da3cba0a8531a9af59ec4580cfa63212ec1ad1606679b,2025-02-26T07:01:35.040000
|
CVE-2022-49595,0,1,cb3cc118f10224c75b44427115256c50de660f489bf615954bd09294bb83f634,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49596,0,0,2dd4161256225c6c674124c7459b85f3943c1f0aa622a2edb991ee572c0724e9,2025-02-26T07:01:35.133000
|
CVE-2022-49596,0,1,337ae6121adf3254b498227e6016c5ad49661dd3458af5805aaecedbb5c23a5e,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49597,0,0,9aae8a41dfa5e280af982ea517cc043e654120719e830ffaabcf01ba0c57e46a,2025-02-26T07:01:35.220000
|
CVE-2022-49597,0,1,087db79fce42e862ebc19f60a0cd8a4d276064edbfecda432de024386a2abe2b,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49598,0,0,852460f00e7b8a6601c3cf4a55aa9bcd60ab4e99e5a0f42ec71331284fdc5767,2025-02-26T07:01:35.310000
|
CVE-2022-49598,0,1,4513ae3cbce03da98d4d53eb6584e35a52b0ecf09877c7c7fcd58e1e04f9ada3,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-49599,0,0,f7dd814f9c7e8eb79adfc8bf1928c5ea2c0239a0e501695d0bba13ec00d3f2ed,2025-02-26T07:01:35.403000
|
CVE-2022-49599,0,1,dea4f25c68b18e3924ae0cebca86bba06c445790ab725462667c62f83f5b5d96,2025-03-10T20:23:01.223000
|
||||||
CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000
|
CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000
|
||||||
CVE-2022-49600,0,0,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000
|
CVE-2022-49600,0,0,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000
|
||||||
CVE-2022-49601,0,0,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000
|
CVE-2022-49601,0,0,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000
|
||||||
@ -213960,7 +213962,7 @@ CVE-2023-0039,0,0,d8fc5a260515ca8bf2d6438e2d24484997e6b69319da7eb48b0fdfda987637
|
|||||||
CVE-2023-0040,0,0,1c92c868dbbb373cc9e61bd563e0122ca4213b995b7eceebca4ef72e2b010054,2024-11-21T07:36:26.600000
|
CVE-2023-0040,0,0,1c92c868dbbb373cc9e61bd563e0122ca4213b995b7eceebca4ef72e2b010054,2024-11-21T07:36:26.600000
|
||||||
CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000
|
CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000
|
||||||
CVE-2023-0042,0,0,9b1a6decc351f08b4eff07cee0d8cf1c5c59713d547ae72a1b1cdb4625fb24f2,2024-11-21T07:36:26.833000
|
CVE-2023-0042,0,0,9b1a6decc351f08b4eff07cee0d8cf1c5c59713d547ae72a1b1cdb4625fb24f2,2024-11-21T07:36:26.833000
|
||||||
CVE-2023-0043,0,0,d84f4a83da715b89809f0d18897b893dbcab6f95fe4a94206704aa05f0816dd0,2024-11-21T07:36:26.947000
|
CVE-2023-0043,0,1,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000
|
||||||
CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000
|
CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000
|
||||||
CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000
|
CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000
|
||||||
CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000
|
CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000
|
||||||
@ -214143,7 +214145,7 @@ CVE-2023-0225,0,0,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e
|
|||||||
CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000
|
CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000
|
||||||
CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000
|
CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000
|
||||||
CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000
|
CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000
|
||||||
CVE-2023-0230,0,1,c888c4e4e602f029814ba8a085aca6cf28a9ef06b8915eb3955bcefa69bbd019,2025-03-10T18:15:25.660000
|
CVE-2023-0230,0,0,c888c4e4e602f029814ba8a085aca6cf28a9ef06b8915eb3955bcefa69bbd019,2025-03-10T18:15:25.660000
|
||||||
CVE-2023-0231,0,0,db877aacf7fbd4ab292656ffa763c993cd207348eea4e2a4a5be93a66b63d92e,2024-11-21T07:36:47.330000
|
CVE-2023-0231,0,0,db877aacf7fbd4ab292656ffa763c993cd207348eea4e2a4a5be93a66b63d92e,2024-11-21T07:36:47.330000
|
||||||
CVE-2023-0232,0,0,b38904e9121f618269c5c08599e7497bb10e3ac65e24b8d2e080a9d12cef4f40,2024-11-21T07:36:47.437000
|
CVE-2023-0232,0,0,b38904e9121f618269c5c08599e7497bb10e3ac65e24b8d2e080a9d12cef4f40,2024-11-21T07:36:47.437000
|
||||||
CVE-2023-0233,0,0,1d93dc703aecdfcb31bf431fa450ffba327ed668daa1f122d3d0796177d316f5,2025-01-14T19:15:28.447000
|
CVE-2023-0233,0,0,1d93dc703aecdfcb31bf431fa450ffba327ed668daa1f122d3d0796177d316f5,2025-01-14T19:15:28.447000
|
||||||
@ -214190,8 +214192,8 @@ CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923
|
|||||||
CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000
|
CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000
|
||||||
CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000
|
CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000
|
||||||
CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000
|
CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000
|
||||||
CVE-2023-0278,0,0,3a4b2bda32dda84a6dc747ab184d2c67d895ef254cbed08fe2c7b9e223c853e6,2024-11-21T07:36:52.977000
|
CVE-2023-0278,0,1,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000
|
||||||
CVE-2023-0279,0,0,551024725818964cc44503fe7f4c9317ea6df7b6af03ca92ead87091a210218e,2024-11-21T07:36:53.070000
|
CVE-2023-0279,0,1,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000
|
||||||
CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000
|
CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000
|
||||||
CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000
|
CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000
|
||||||
CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000
|
CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000
|
||||||
@ -214242,10 +214244,10 @@ CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f
|
|||||||
CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000
|
CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000
|
||||||
CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000
|
CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000
|
||||||
CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000
|
CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000
|
||||||
CVE-2023-0331,0,0,6bc9688deeae710cbf744fa07feeea2933d7392453d27f8553fbe1cb355de2dc,2024-11-21T07:36:59.217000
|
CVE-2023-0331,0,1,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000
|
||||||
CVE-2023-0332,0,0,64542e438bcf827f156cc70cf5d07c1026d6770324516bf2f45d1e6076758c95,2024-11-21T07:36:59.323000
|
CVE-2023-0332,0,0,64542e438bcf827f156cc70cf5d07c1026d6770324516bf2f45d1e6076758c95,2024-11-21T07:36:59.323000
|
||||||
CVE-2023-0333,0,0,d93bc6bc1e86c850a7ca00b9aa76a2e4c088cb012f60fc9847e05a56a68ded9d,2024-11-21T07:36:59.453000
|
CVE-2023-0333,0,0,d93bc6bc1e86c850a7ca00b9aa76a2e4c088cb012f60fc9847e05a56a68ded9d,2024-11-21T07:36:59.453000
|
||||||
CVE-2023-0334,0,1,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000
|
CVE-2023-0334,0,0,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000
|
||||||
CVE-2023-0335,0,0,81a486779e4f7822f594ba6a10f491ec26797c357292ad9c92e7938c3e6233c4,2025-02-19T21:15:11.613000
|
CVE-2023-0335,0,0,81a486779e4f7822f594ba6a10f491ec26797c357292ad9c92e7938c3e6233c4,2025-02-19T21:15:11.613000
|
||||||
CVE-2023-0336,0,0,a60a90bffcffedbaa055f52665a26980864469f014fcc57b5c3b697efa132078,2025-02-19T20:15:33.370000
|
CVE-2023-0336,0,0,a60a90bffcffedbaa055f52665a26980864469f014fcc57b5c3b697efa132078,2025-02-19T20:15:33.370000
|
||||||
CVE-2023-0337,0,0,112be93cad8209381e7b3eb1eece74b6aa7661c3bca890d8d8e3f3f821327549,2024-11-21T07:36:59.880000
|
CVE-2023-0337,0,0,112be93cad8209381e7b3eb1eece74b6aa7661c3bca890d8d8e3f3f821327549,2024-11-21T07:36:59.880000
|
||||||
@ -214435,7 +214437,7 @@ CVE-2023-0531,0,0,a2b5fd3930f524cb401e124ec5786010c9cad4c621114fd4abdc2acf74f299
|
|||||||
CVE-2023-0532,0,0,72ca8898990fb8610307e6516d129fcf16189811012a79289b01f939cac9bf59,2024-11-21T07:37:21.400000
|
CVE-2023-0532,0,0,72ca8898990fb8610307e6516d129fcf16189811012a79289b01f939cac9bf59,2024-11-21T07:37:21.400000
|
||||||
CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8f4,2024-11-21T07:37:21.523000
|
CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8f4,2024-11-21T07:37:21.523000
|
||||||
CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000
|
CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000
|
||||||
CVE-2023-0535,0,0,097c1a72387a82081f06503b5910ccdb4d6c97aee981438d38ed487552857661,2024-11-21T07:37:21.773000
|
CVE-2023-0535,0,1,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000
|
||||||
CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000
|
CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000
|
||||||
CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000
|
CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000
|
||||||
CVE-2023-0538,0,0,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000
|
CVE-2023-0538,0,0,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000
|
||||||
@ -214448,7 +214450,7 @@ CVE-2023-0544,0,0,574b0c3977db6cc6752e6a2c2235836557bb5b6346992841309bc3d7974546
|
|||||||
CVE-2023-0545,0,0,9a00641837b7d164ad8476424933e523d526dc5597557da2fce461330bb0a3db,2025-01-08T17:15:10.463000
|
CVE-2023-0545,0,0,9a00641837b7d164ad8476424933e523d526dc5597557da2fce461330bb0a3db,2025-01-08T17:15:10.463000
|
||||||
CVE-2023-0546,0,0,3ae24fee2ec1c7b6260e454eaee0d81013301c86676e420b9d1df0bb072562a7,2025-02-11T21:15:10.067000
|
CVE-2023-0546,0,0,3ae24fee2ec1c7b6260e454eaee0d81013301c86676e420b9d1df0bb072562a7,2025-02-11T21:15:10.067000
|
||||||
CVE-2023-0547,0,0,a0d2eb358d27126e81ef476edb803ca04858080782efb6ee5ebba720becbd1cf,2025-01-10T19:15:31.600000
|
CVE-2023-0547,0,0,a0d2eb358d27126e81ef476edb803ca04858080782efb6ee5ebba720becbd1cf,2025-01-10T19:15:31.600000
|
||||||
CVE-2023-0548,0,1,b9a98b7e80a5fd234336b65fbeeb6cd5d43dbc35e37a2dbe56ab6c787fe54530,2025-03-10T18:15:26.070000
|
CVE-2023-0548,0,0,b9a98b7e80a5fd234336b65fbeeb6cd5d43dbc35e37a2dbe56ab6c787fe54530,2025-03-10T18:15:26.070000
|
||||||
CVE-2023-0549,0,0,f6480b7e8d69b059109f807f8d590797408269f596b27b454312db7225cb4af2,2024-11-21T07:37:23.113000
|
CVE-2023-0549,0,0,f6480b7e8d69b059109f807f8d590797408269f596b27b454312db7225cb4af2,2024-11-21T07:37:23.113000
|
||||||
CVE-2023-0550,0,0,bec5b5445a12fbf0814f5101c2402888112304285a3256f9f16660f8b16d4d24,2024-11-21T07:37:23.237000
|
CVE-2023-0550,0,0,bec5b5445a12fbf0814f5101c2402888112304285a3256f9f16660f8b16d4d24,2024-11-21T07:37:23.237000
|
||||||
CVE-2023-0551,0,0,30c9be71559fae5c12b24bfc599fd34d69ea838008cf2e194ad4186361ffc482,2024-11-21T07:37:23.333000
|
CVE-2023-0551,0,0,30c9be71559fae5c12b24bfc599fd34d69ea838008cf2e194ad4186361ffc482,2024-11-21T07:37:23.333000
|
||||||
@ -219174,7 +219176,7 @@ CVE-2023-23891,0,0,9a467d5c8576278cd60800aa31195e66e21136dfb0f4b2951cf9c492fbe2a
|
|||||||
CVE-2023-23892,0,0,babd7b6eb254e5a1e48ab1ecee1f075091bb9524952f0370f061cce457d343e8,2024-11-21T07:47:02.940000
|
CVE-2023-23892,0,0,babd7b6eb254e5a1e48ab1ecee1f075091bb9524952f0370f061cce457d343e8,2024-11-21T07:47:02.940000
|
||||||
CVE-2023-23893,0,0,79a8b1e4c088a6b98234d52b61651bf5cebf3c590e29e2eb91b4549f46d3c09e,2024-12-09T13:15:21.793000
|
CVE-2023-23893,0,0,79a8b1e4c088a6b98234d52b61651bf5cebf3c590e29e2eb91b4549f46d3c09e,2024-12-09T13:15:21.793000
|
||||||
CVE-2023-23894,0,0,ac1fbc40c284c0f0382b0d62dc16300b41b03c54eb17701ef0abf4283ac91cae,2024-11-21T07:47:03.067000
|
CVE-2023-23894,0,0,ac1fbc40c284c0f0382b0d62dc16300b41b03c54eb17701ef0abf4283ac91cae,2024-11-21T07:47:03.067000
|
||||||
CVE-2023-23895,0,1,a41a2c4db86cbf592807ce9d37013568188d0f8cb0d021366c212538361ba2b6,2025-03-10T17:06:30.757000
|
CVE-2023-23895,0,0,a41a2c4db86cbf592807ce9d37013568188d0f8cb0d021366c212538361ba2b6,2025-03-10T17:06:30.757000
|
||||||
CVE-2023-23896,0,0,323349cf0baac2bb680f396fcf57bee11f3b3efdbbe33857343c32da31079f52,2024-11-21T07:47:03.193000
|
CVE-2023-23896,0,0,323349cf0baac2bb680f396fcf57bee11f3b3efdbbe33857343c32da31079f52,2024-11-21T07:47:03.193000
|
||||||
CVE-2023-23897,0,0,8a120f9b5892c25b1345b6a3937aae72e10f21285071459a906a94ee359146eb,2024-11-21T07:47:03.320000
|
CVE-2023-23897,0,0,8a120f9b5892c25b1345b6a3937aae72e10f21285071459a906a94ee359146eb,2024-11-21T07:47:03.320000
|
||||||
CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fcab74,2024-11-21T07:47:03.457000
|
CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fcab74,2024-11-21T07:47:03.457000
|
||||||
@ -219317,7 +219319,7 @@ CVE-2023-2404,0,0,e871d45a60e6005e1c4d45eb75a9edfef9fb129d460ff44788c0692638e391
|
|||||||
CVE-2023-24040,0,0,002ab84f91c2eae9544026e8fa8d4517b3f52600ca19d17e1f95ceb1f9a2e8c9,2024-11-21T07:47:18.467000
|
CVE-2023-24040,0,0,002ab84f91c2eae9544026e8fa8d4517b3f52600ca19d17e1f95ceb1f9a2e8c9,2024-11-21T07:47:18.467000
|
||||||
CVE-2023-24042,0,0,d6d3ecc0a691c83cc86f03b6376ddddf48103b3dd6e853b135a9635e4d2c7d94,2024-11-21T07:47:18.610000
|
CVE-2023-24042,0,0,d6d3ecc0a691c83cc86f03b6376ddddf48103b3dd6e853b135a9635e4d2c7d94,2024-11-21T07:47:18.610000
|
||||||
CVE-2023-24044,0,0,16a8553bd0666dab543a312b7317e79c35107a001bc50445b44596eef0ef3155,2024-11-21T07:47:18.750000
|
CVE-2023-24044,0,0,16a8553bd0666dab543a312b7317e79c35107a001bc50445b44596eef0ef3155,2024-11-21T07:47:18.750000
|
||||||
CVE-2023-24045,0,0,5c324b816d5a205767f0685dce0e15176f43d4d1a280a0b7d7f3b06ee8a1587c,2024-11-21T07:47:18.897000
|
CVE-2023-24045,0,1,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000
|
||||||
CVE-2023-24046,0,0,56466e1ad08e92cf55b8d9678d21b3ed2227b04fa61598011e5b2d90bd51ec2b,2024-11-21T07:47:19.037000
|
CVE-2023-24046,0,0,56466e1ad08e92cf55b8d9678d21b3ed2227b04fa61598011e5b2d90bd51ec2b,2024-11-21T07:47:19.037000
|
||||||
CVE-2023-24047,0,0,a6b3942ab48c4dff8c51b327a9cd882f419b051667e55c995e894045226d3b1c,2024-11-21T07:47:19.280000
|
CVE-2023-24047,0,0,a6b3942ab48c4dff8c51b327a9cd882f419b051667e55c995e894045226d3b1c,2024-11-21T07:47:19.280000
|
||||||
CVE-2023-24048,0,0,1daabdf121529baf332053607b6904a5f303bef930f5ace2d43503e61c89a753,2024-11-21T07:47:19.503000
|
CVE-2023-24048,0,0,1daabdf121529baf332053607b6904a5f303bef930f5ace2d43503e61c89a753,2024-11-21T07:47:19.503000
|
||||||
@ -219363,7 +219365,7 @@ CVE-2023-24108,0,0,aef70f73d56b6d18ff55fb4dfbd92c1419c67b181b553728caa0c072ada07
|
|||||||
CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000
|
CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000
|
||||||
CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000
|
CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000
|
||||||
CVE-2023-24117,0,0,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000
|
CVE-2023-24117,0,0,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000
|
||||||
CVE-2023-24118,0,1,b9815cd8fb0dcbcd37aca85bfc8a715d5eb93c97f2edc7018fb0fe882d3547e3,2025-03-10T17:15:33.840000
|
CVE-2023-24118,0,0,b9815cd8fb0dcbcd37aca85bfc8a715d5eb93c97f2edc7018fb0fe882d3547e3,2025-03-10T17:15:33.840000
|
||||||
CVE-2023-24119,0,0,80cb6502119a1de14e9171897ca7f8e5f1afed7ddaf8a27c955cb5d859eb123f,2025-03-07T21:15:15.050000
|
CVE-2023-24119,0,0,80cb6502119a1de14e9171897ca7f8e5f1afed7ddaf8a27c955cb5d859eb123f,2025-03-07T21:15:15.050000
|
||||||
CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000
|
CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000
|
||||||
CVE-2023-24120,0,0,714454f747e49f6103cdc79930ee3cdcfb846f1571c6409973adf5184b191a0c,2025-03-07T21:15:15.243000
|
CVE-2023-24120,0,0,714454f747e49f6103cdc79930ee3cdcfb846f1571c6409973adf5184b191a0c,2025-03-07T21:15:15.243000
|
||||||
@ -219507,7 +219509,7 @@ CVE-2023-24350,0,0,2be180a049d41eea8f344d8686f7513ad65df5af75c3508f4ed4cff9cc6f4
|
|||||||
CVE-2023-24351,0,0,a6d7cb0038d3c7bf24d5605d870847f8a4e1a473e39b63b554a003784f394623,2024-11-21T07:47:43.237000
|
CVE-2023-24351,0,0,a6d7cb0038d3c7bf24d5605d870847f8a4e1a473e39b63b554a003784f394623,2024-11-21T07:47:43.237000
|
||||||
CVE-2023-24352,0,0,4c32ce69bfa33728c96d3e5c535b8f201a6567bd957f2db69e791a8c002ed675,2024-11-21T07:47:43.383000
|
CVE-2023-24352,0,0,4c32ce69bfa33728c96d3e5c535b8f201a6567bd957f2db69e791a8c002ed675,2024-11-21T07:47:43.383000
|
||||||
CVE-2023-2436,0,0,2f2707775499ceab975728bb97e30831616245051d74f197f5448b7364446a2e,2024-11-21T07:58:36.907000
|
CVE-2023-2436,0,0,2f2707775499ceab975728bb97e30831616245051d74f197f5448b7364446a2e,2024-11-21T07:58:36.907000
|
||||||
CVE-2023-24364,0,1,61f926ce1df43404bece98f2dd55d5ca5a40dbcd0b2a60e5372dd4cd23603683,2025-03-10T18:15:26.323000
|
CVE-2023-24364,0,0,61f926ce1df43404bece98f2dd55d5ca5a40dbcd0b2a60e5372dd4cd23603683,2025-03-10T18:15:26.323000
|
||||||
CVE-2023-24366,0,0,5d7db002c1457019f1582d6e2eb9871a01ac3c1ff77928c5a114a7191bcb3a47,2025-02-19T18:15:22.477000
|
CVE-2023-24366,0,0,5d7db002c1457019f1582d6e2eb9871a01ac3c1ff77928c5a114a7191bcb3a47,2025-02-19T18:15:22.477000
|
||||||
CVE-2023-24367,0,0,bd2afe80ba273e0d4f82725134a30190fb13e39466ede74273078ca9c22f3c02,2023-11-07T04:08:26.813000
|
CVE-2023-24367,0,0,bd2afe80ba273e0d4f82725134a30190fb13e39466ede74273078ca9c22f3c02,2023-11-07T04:08:26.813000
|
||||||
CVE-2023-24368,0,0,5900bc1b5bb4d3a71bee753000740d76a9c188b4b457ab1d2153e4af094e1845,2023-11-07T04:08:26.850000
|
CVE-2023-24368,0,0,5900bc1b5bb4d3a71bee753000740d76a9c188b4b457ab1d2153e4af094e1845,2023-11-07T04:08:26.850000
|
||||||
@ -219786,12 +219788,12 @@ CVE-2023-24646,0,0,d1a442ce7864479512c8fe6ab09faa0757c0ff18bf1c24a2e1724cfe374e8
|
|||||||
CVE-2023-24647,0,0,97ec42b52dfa4f5d755188fee73924996a4b78591b876b6d5191063d70015aab,2024-11-21T07:48:16.253000
|
CVE-2023-24647,0,0,97ec42b52dfa4f5d755188fee73924996a4b78591b876b6d5191063d70015aab,2024-11-21T07:48:16.253000
|
||||||
CVE-2023-24648,0,0,f1afb64de51d0b28938f329805bf49667b5ad8753e024c498107964d2cf939f5,2024-11-21T07:48:16.393000
|
CVE-2023-24648,0,0,f1afb64de51d0b28938f329805bf49667b5ad8753e024c498107964d2cf939f5,2024-11-21T07:48:16.393000
|
||||||
CVE-2023-2465,0,0,2e484d3ef588499a8634f042b97e16c005480a38f269a79668612bd11ca7ca85,2024-11-21T07:58:40.380000
|
CVE-2023-2465,0,0,2e484d3ef588499a8634f042b97e16c005480a38f269a79668612bd11ca7ca85,2024-11-21T07:58:40.380000
|
||||||
CVE-2023-24651,0,1,488301ad46ce92451b7cd307f09d1a45eb6f2e0705322a23296c6314d9cff72a,2025-03-10T18:15:26.633000
|
CVE-2023-24651,0,0,488301ad46ce92451b7cd307f09d1a45eb6f2e0705322a23296c6314d9cff72a,2025-03-10T18:15:26.633000
|
||||||
CVE-2023-24652,0,1,7c8a6ad52a57389247139a3adfe1f42c90279364bc95856593026e54f305437b,2025-03-10T18:15:26.870000
|
CVE-2023-24652,0,0,7c8a6ad52a57389247139a3adfe1f42c90279364bc95856593026e54f305437b,2025-03-10T18:15:26.870000
|
||||||
CVE-2023-24653,0,1,956b5780900ec10ef24476deb9832642ac13bd1832e03bc3dfb8d14f9df9d112,2025-03-10T18:15:27.067000
|
CVE-2023-24653,0,0,956b5780900ec10ef24476deb9832642ac13bd1832e03bc3dfb8d14f9df9d112,2025-03-10T18:15:27.067000
|
||||||
CVE-2023-24654,0,1,22ee38175d63edaac498acdfa539ed750af24589b6b4d0f7bd0cddcd58238fff,2025-03-10T18:15:27.313000
|
CVE-2023-24654,0,0,22ee38175d63edaac498acdfa539ed750af24589b6b4d0f7bd0cddcd58238fff,2025-03-10T18:15:27.313000
|
||||||
CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000
|
CVE-2023-24655,0,0,2c683583f12b22bfec0d853f0ded8bda91e3947d26c46f2146e03ff553b71ae0,2024-11-21T07:48:17.093000
|
||||||
CVE-2023-24656,0,1,6125992e2f6efe3194f000bcb420a1fdaf47364a78f7c7c3083ba847105da4b5,2025-03-10T18:15:27.530000
|
CVE-2023-24656,0,0,6125992e2f6efe3194f000bcb420a1fdaf47364a78f7c7c3083ba847105da4b5,2025-03-10T18:15:27.530000
|
||||||
CVE-2023-24657,0,0,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
|
CVE-2023-24657,0,0,f8b10dff5ae7356948f588b06462f065fe0728ac17c0ffeb6a7a94b9ec0ba4bb,2025-03-05T19:15:29.283000
|
||||||
CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000
|
CVE-2023-2466,0,0,11706004b2e4425098ffba584a264c551af3b1fa100d938c14012cd19f192cc7,2024-11-21T07:58:40.510000
|
||||||
CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000
|
CVE-2023-2467,0,0,bcb3cc43170efb1f1f3187d2376deda032a3eae91db4c6ac796dc30649cef271,2024-11-21T07:58:40.630000
|
||||||
@ -220287,10 +220289,10 @@ CVE-2023-25222,0,0,8088846710b2df8e157581112043c8bc6d9756975531b6619999896dc395f
|
|||||||
CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601c4f,2025-03-05T16:15:36.693000
|
CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601c4f,2025-03-05T16:15:36.693000
|
||||||
CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000
|
CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000
|
||||||
CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000
|
CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000
|
||||||
CVE-2023-25231,0,1,02ddf549c9919d021a035a3f7398c3d0232dd0bba8bb5db63c5e6c460b9cb870,2025-03-10T18:15:27.743000
|
CVE-2023-25231,0,0,02ddf549c9919d021a035a3f7398c3d0232dd0bba8bb5db63c5e6c460b9cb870,2025-03-10T18:15:27.743000
|
||||||
CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
|
CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
|
||||||
CVE-2023-25234,0,1,b7aa9eccbbcf990a69a87b6a08dd3b7662b3b8d873d320038671cb3c84516c29,2025-03-10T18:15:27.940000
|
CVE-2023-25234,0,0,b7aa9eccbbcf990a69a87b6a08dd3b7662b3b8d873d320038671cb3c84516c29,2025-03-10T18:15:27.940000
|
||||||
CVE-2023-25235,0,1,2804c9928db78a144ae918a9f7e60f4c8fd3fffaace6db42d67450c5ae822ba8,2025-03-10T18:15:28.137000
|
CVE-2023-25235,0,0,2804c9928db78a144ae918a9f7e60f4c8fd3fffaace6db42d67450c5ae822ba8,2025-03-10T18:15:28.137000
|
||||||
CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000
|
CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000
|
||||||
CVE-2023-25240,0,0,8f54673119014de0cf874ed053cc6287359d4b3be00312c798c43582a56528e1,2024-11-21T07:49:21.337000
|
CVE-2023-25240,0,0,8f54673119014de0cf874ed053cc6287359d4b3be00312c798c43582a56528e1,2024-11-21T07:49:21.337000
|
||||||
CVE-2023-25241,0,0,67b4d369c111bf4f1d66e72210ff14d8c3ad87005bca819dcaa6cf536b263cec,2024-11-21T07:49:21.470000
|
CVE-2023-25241,0,0,67b4d369c111bf4f1d66e72210ff14d8c3ad87005bca819dcaa6cf536b263cec,2024-11-21T07:49:21.470000
|
||||||
@ -221498,7 +221500,7 @@ CVE-2023-2674,0,0,039137594fe7c7d34bb7f37fd7078029f10c4a0df18a4010fa89d3fbf147de
|
|||||||
CVE-2023-2675,0,0,07c06275419dcd681decfa003611adff7356076776c10b0fa95b5660ea113d52,2024-11-21T07:59:03.617000
|
CVE-2023-2675,0,0,07c06275419dcd681decfa003611adff7356076776c10b0fa95b5660ea113d52,2024-11-21T07:59:03.617000
|
||||||
CVE-2023-26750,0,0,5680098ce4e41c5b8710965fc30df10382e97cc525ea142f0ea99122882df621,2025-02-13T16:15:39.263000
|
CVE-2023-26750,0,0,5680098ce4e41c5b8710965fc30df10382e97cc525ea142f0ea99122882df621,2025-02-13T16:15:39.263000
|
||||||
CVE-2023-26756,0,0,bce96ca42026c1c9876289cdcae313a421d7d8a46aa8a6150cb10b4815701212,2024-11-21T07:51:53.850000
|
CVE-2023-26756,0,0,bce96ca42026c1c9876289cdcae313a421d7d8a46aa8a6150cb10b4815701212,2024-11-21T07:51:53.850000
|
||||||
CVE-2023-26758,0,1,d023c3250afbf1f96306e3f224dff8d8e6163d78f2af86695e161ccb406953ce,2025-03-10T18:15:28.413000
|
CVE-2023-26758,0,0,d023c3250afbf1f96306e3f224dff8d8e6163d78f2af86695e161ccb406953ce,2025-03-10T18:15:28.413000
|
||||||
CVE-2023-26759,0,0,fa278f1f8d2b0f2f4b3ecb4c07264684400a2def5a730dfa3c154c5f0ca86587,2024-11-21T07:51:54.140000
|
CVE-2023-26759,0,0,fa278f1f8d2b0f2f4b3ecb4c07264684400a2def5a730dfa3c154c5f0ca86587,2024-11-21T07:51:54.140000
|
||||||
CVE-2023-2676,0,0,51c3bf7c174796a0fefc1be82999f859d717cf4431b2be630e0fa1236f4caafe,2024-11-21T07:59:03.750000
|
CVE-2023-2676,0,0,51c3bf7c174796a0fefc1be82999f859d717cf4431b2be630e0fa1236f4caafe,2024-11-21T07:59:03.750000
|
||||||
CVE-2023-26760,0,0,89f9e45fb0a1dc5ec5e14dec98e146f8906d1bae8839c609d65a64b33f9d5888,2024-11-21T07:51:54.287000
|
CVE-2023-26760,0,0,89f9e45fb0a1dc5ec5e14dec98e146f8906d1bae8839c609d65a64b33f9d5888,2024-11-21T07:51:54.287000
|
||||||
@ -222011,7 +222013,7 @@ CVE-2023-27457,0,0,db33655e037a343ca2b318f816541e3292041ff8f0e3b127514bebbaaa676
|
|||||||
CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000
|
CVE-2023-27458,0,0,72f63a7dc4baad5b877257b3e2edfdcf3718e24661edf4a00069bab70ec5e210,2024-11-21T07:52:57.050000
|
||||||
CVE-2023-27459,0,0,52dd158ab4109639424079513a505fc276707ade7fe70bcd50217505d316710c,2024-11-21T07:52:57.177000
|
CVE-2023-27459,0,0,52dd158ab4109639424079513a505fc276707ade7fe70bcd50217505d316710c,2024-11-21T07:52:57.177000
|
||||||
CVE-2023-2746,0,0,98242dea1630ecb5d407829a0cfc43949cf4fae0e0c6a7aee7cbf79120ac6bca,2024-11-21T07:59:12.863000
|
CVE-2023-2746,0,0,98242dea1630ecb5d407829a0cfc43949cf4fae0e0c6a7aee7cbf79120ac6bca,2024-11-21T07:59:12.863000
|
||||||
CVE-2023-27460,0,1,c8765a706f7dcdcbeada957f8018c686ca5887071ef5a9f00a4c319e098afc49,2025-03-10T18:13:04.007000
|
CVE-2023-27460,0,0,c8765a706f7dcdcbeada957f8018c686ca5887071ef5a9f00a4c319e098afc49,2025-03-10T18:13:04.007000
|
||||||
CVE-2023-27461,0,0,175bed00a77c02dfaff0699075240f268538851e9028c34c2c4a73edf53266b8,2024-11-21T07:52:57.417000
|
CVE-2023-27461,0,0,175bed00a77c02dfaff0699075240f268538851e9028c34c2c4a73edf53266b8,2024-11-21T07:52:57.417000
|
||||||
CVE-2023-27462,0,0,2753acd56058c78c9b40a10cccdcaef0d20c4e913018cb45b2738a744d8a5d7f,2024-11-21T07:52:57.543000
|
CVE-2023-27462,0,0,2753acd56058c78c9b40a10cccdcaef0d20c4e913018cb45b2738a744d8a5d7f,2024-11-21T07:52:57.543000
|
||||||
CVE-2023-27463,0,0,762bf14565d23d4343e40e12bbcc0ce88cd3db82d0b0aacd3eaf47f25d900552,2024-11-21T07:52:57.663000
|
CVE-2023-27463,0,0,762bf14565d23d4343e40e12bbcc0ce88cd3db82d0b0aacd3eaf47f25d900552,2024-11-21T07:52:57.663000
|
||||||
@ -228033,7 +228035,7 @@ CVE-2023-35045,0,0,59020ba7086d756072a9d908f45df756fc13e6c52833fd8a2279c472be043
|
|||||||
CVE-2023-35046,0,0,be75d7bddb171773fdfc0b865c7ebb49459a073b8a61424f81664689f2e5b394,2024-12-13T15:15:15.723000
|
CVE-2023-35046,0,0,be75d7bddb171773fdfc0b865c7ebb49459a073b8a61424f81664689f2e5b394,2024-12-13T15:15:15.723000
|
||||||
CVE-2023-35047,0,0,eba9e5240fc0579a5e94cb2c6682ca1369edf28f1e86dad6841e23630fabe6f4,2024-11-21T08:07:52.847000
|
CVE-2023-35047,0,0,eba9e5240fc0579a5e94cb2c6682ca1369edf28f1e86dad6841e23630fabe6f4,2024-11-21T08:07:52.847000
|
||||||
CVE-2023-35048,0,0,c42c36702131c48dc501f2245ae6b03b0b394e9476a0c5a9061c817acd6f524f,2024-11-21T08:07:52.980000
|
CVE-2023-35048,0,0,c42c36702131c48dc501f2245ae6b03b0b394e9476a0c5a9061c817acd6f524f,2024-11-21T08:07:52.980000
|
||||||
CVE-2023-35049,0,1,0cf51c56cc6d9df352048d3a6b5f38e3f0ff9eab19a9506e807a84df97cd59fa,2025-03-10T18:13:04.007000
|
CVE-2023-35049,0,0,0cf51c56cc6d9df352048d3a6b5f38e3f0ff9eab19a9506e807a84df97cd59fa,2025-03-10T18:13:04.007000
|
||||||
CVE-2023-3505,0,0,028abed4ed563200a4d3925dc55e0b44321934486645d4eca13e9c221952639f,2024-11-21T08:17:24.700000
|
CVE-2023-3505,0,0,028abed4ed563200a4d3925dc55e0b44321934486645d4eca13e9c221952639f,2024-11-21T08:17:24.700000
|
||||||
CVE-2023-35050,0,0,7798d8be3a83e605c6d0ad9dcb99cd50b0dfdf1c690f4791cdfc810b3cb136f2,2024-11-21T08:07:53.260000
|
CVE-2023-35050,0,0,7798d8be3a83e605c6d0ad9dcb99cd50b0dfdf1c690f4791cdfc810b3cb136f2,2024-11-21T08:07:53.260000
|
||||||
CVE-2023-35051,0,0,f0c3f4150fd7e48e527eddb623de0aca17423e277eb3de8858de4a5618ee0234,2024-12-13T15:15:15.880000
|
CVE-2023-35051,0,0,f0c3f4150fd7e48e527eddb623de0aca17423e277eb3de8858de4a5618ee0234,2024-12-13T15:15:15.880000
|
||||||
@ -235648,7 +235650,7 @@ CVE-2023-45184,0,0,64ec97d0791ac94597b9fce89ee4101aaafa282149a7e281e74d03b0c2b6e
|
|||||||
CVE-2023-45185,0,0,958bb7f9ab726baa6551b1ed5b3b2aa3f36bcda842da623ad72ba1d1cc9250a6,2024-11-21T08:26:30.243000
|
CVE-2023-45185,0,0,958bb7f9ab726baa6551b1ed5b3b2aa3f36bcda842da623ad72ba1d1cc9250a6,2024-11-21T08:26:30.243000
|
||||||
CVE-2023-45186,0,0,d0c195d0650caa2bb85d0cc4d01d13b093cea21f2e009fea6a850f72db35dee8,2025-03-07T12:36:39.820000
|
CVE-2023-45186,0,0,d0c195d0650caa2bb85d0cc4d01d13b093cea21f2e009fea6a850f72db35dee8,2025-03-07T12:36:39.820000
|
||||||
CVE-2023-45187,0,0,7a25113913bdfaa093e16d0e459479e4148d92e6e3c8ee85ad6e101a75208897,2024-11-21T08:26:30.480000
|
CVE-2023-45187,0,0,7a25113913bdfaa093e16d0e459479e4148d92e6e3c8ee85ad6e101a75208897,2024-11-21T08:26:30.480000
|
||||||
CVE-2023-45188,0,1,215c4c2dd6bd8a45c2eb1d226e773a3288f294d71934bcd40fa6f4672c275f61,2025-03-10T18:13:04.007000
|
CVE-2023-45188,0,0,215c4c2dd6bd8a45c2eb1d226e773a3288f294d71934bcd40fa6f4672c275f61,2025-03-10T18:13:04.007000
|
||||||
CVE-2023-45189,0,0,f4b0af059f3a0562e168f234ad68df1aabc690d9e4f22c110cb4e65c5ea165e5,2024-11-21T08:26:30.750000
|
CVE-2023-45189,0,0,f4b0af059f3a0562e168f234ad68df1aabc690d9e4f22c110cb4e65c5ea165e5,2024-11-21T08:26:30.750000
|
||||||
CVE-2023-45190,0,0,eb5591ce4ba733f3a772f386dbb335931b047031be52f065eeb98817a286e13a,2024-11-21T08:26:30.923000
|
CVE-2023-45190,0,0,eb5591ce4ba733f3a772f386dbb335931b047031be52f065eeb98817a286e13a,2024-11-21T08:26:30.923000
|
||||||
CVE-2023-45191,0,0,7f68af9a0dc22b74999adb2519360c7e4264630522b0a7be5152df7ce6fe6670,2024-11-21T08:26:31.050000
|
CVE-2023-45191,0,0,7f68af9a0dc22b74999adb2519360c7e4264630522b0a7be5152df7ce6fe6670,2024-11-21T08:26:31.050000
|
||||||
@ -240081,7 +240083,7 @@ CVE-2023-51339,0,0,46130be144d70d7717f34638d17bcb922ba5bdffc38788d706d1125b8b9b3
|
|||||||
CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000
|
CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000
|
||||||
CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000
|
CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000
|
||||||
CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000
|
CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000
|
||||||
CVE-2023-51353,0,1,49eaf778d4cf8aabc8f5bcfd99e85006d639981f1f252aae0ce29aae4cfd695e,2025-03-10T17:06:30.757000
|
CVE-2023-51353,0,0,49eaf778d4cf8aabc8f5bcfd99e85006d639981f1f252aae0ce29aae4cfd695e,2025-03-10T17:06:30.757000
|
||||||
CVE-2023-51354,0,0,708af8c5468f01b121a6a1c668923294699783ac63a9cd7f532f375515a975b1,2024-11-21T08:37:57.030000
|
CVE-2023-51354,0,0,708af8c5468f01b121a6a1c668923294699783ac63a9cd7f532f375515a975b1,2024-11-21T08:37:57.030000
|
||||||
CVE-2023-51355,0,0,403a1b38462fab64d2958d48b042a496c74a03590091d2ef7736ab842bdb9794,2024-12-09T13:15:39.650000
|
CVE-2023-51355,0,0,403a1b38462fab64d2958d48b042a496c74a03590091d2ef7736ab842bdb9794,2024-12-09T13:15:39.650000
|
||||||
CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000
|
CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000
|
||||||
@ -240250,7 +240252,7 @@ CVE-2023-51508,0,0,a1c83b0bb39aaff5b985cebbbf0f854a0f62ed7ffb1079cd2361cd180b397
|
|||||||
CVE-2023-51509,0,0,5141cc1874d879c09bc6c5ae29f17b7cc3618a3dd55ae068dff761ececd3f235,2024-11-21T08:38:16.530000
|
CVE-2023-51509,0,0,5141cc1874d879c09bc6c5ae29f17b7cc3618a3dd55ae068dff761ececd3f235,2024-11-21T08:38:16.530000
|
||||||
CVE-2023-5151,0,0,08d96cd770bf1b04c30c98efb5eed61debed8b417449bf44e4a7ebc9a6835ec0,2024-11-21T08:41:10.143000
|
CVE-2023-5151,0,0,08d96cd770bf1b04c30c98efb5eed61debed8b417449bf44e4a7ebc9a6835ec0,2024-11-21T08:41:10.143000
|
||||||
CVE-2023-51510,0,0,712c928dab66c438ef372acf6bdb096bd47638c890e5047299143bada89617f9,2025-02-27T03:24:36.033000
|
CVE-2023-51510,0,0,712c928dab66c438ef372acf6bdb096bd47638c890e5047299143bada89617f9,2025-02-27T03:24:36.033000
|
||||||
CVE-2023-51511,0,1,cae241fcef44721bff5589ec2c54837fd24df588d001d53f19eb5935e10f3873,2025-03-10T18:13:04.007000
|
CVE-2023-51511,0,0,cae241fcef44721bff5589ec2c54837fd24df588d001d53f19eb5935e10f3873,2025-03-10T18:13:04.007000
|
||||||
CVE-2023-51512,0,0,3ffe46037d2759016fc60df007fcfb3e5660be4e480910443f43adca1c621857,2025-02-27T03:24:36.033000
|
CVE-2023-51512,0,0,3ffe46037d2759016fc60df007fcfb3e5660be4e480910443f43adca1c621857,2025-02-27T03:24:36.033000
|
||||||
CVE-2023-51514,0,0,fd045876a5b64b601897d61b4879de0ef70ace44f02a5bb84fff6e9509399735,2024-11-21T08:38:17.033000
|
CVE-2023-51514,0,0,fd045876a5b64b601897d61b4879de0ef70ace44f02a5bb84fff6e9509399735,2024-11-21T08:38:17.033000
|
||||||
CVE-2023-51515,0,0,cf6f4fc5368cadc9aabbda6e25adff7a88b955bad0dfc9c1844c5fb48208e5cc,2024-11-21T08:38:17.167000
|
CVE-2023-51515,0,0,cf6f4fc5368cadc9aabbda6e25adff7a88b955bad0dfc9c1844c5fb48208e5cc,2024-11-21T08:38:17.167000
|
||||||
@ -244337,7 +244339,7 @@ CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9
|
|||||||
CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000
|
CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000
|
||||||
CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000
|
CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000
|
CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000
|
||||||
CVE-2024-10094,0,1,2644c6a3dfcd4c8fa60f0e771649f49e675928f64c64582b879b26ca2df538d9,2025-03-10T17:06:30.757000
|
CVE-2024-10094,0,0,2644c6a3dfcd4c8fa60f0e771649f49e675928f64c64582b879b26ca2df538d9,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000
|
CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000
|
||||||
CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000
|
CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000
|
||||||
CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000
|
CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000
|
||||||
@ -244849,7 +244851,7 @@ CVE-2024-1065,0,0,b15b37df186076da575ae1588759c677f2677d06b5081dbb99648fc8d07192
|
|||||||
CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000
|
CVE-2024-10651,0,0,daa7d277426e3cae52065dc92f7f81ece792840b77223c8e793cafff956732fc,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000
|
CVE-2024-10652,0,0,ac6a1cb285fa9430a30ef765efb81818d01030d7912dcbc5a6b350b902530b17,2024-11-01T12:57:03.417000
|
||||||
CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000
|
CVE-2024-10653,0,0,f703737b2cc08f11753db75c9b1433d1a44f113e4bd6d601b3a10301d1952eb0,2024-11-04T07:15:03.743000
|
||||||
CVE-2024-10654,0,1,bf919a7c32885c2cba00144b666938dd05ef198c6bf6ef16d545050a6037843a,2025-03-10T17:06:30.757000
|
CVE-2024-10654,0,0,bf919a7c32885c2cba00144b666938dd05ef198c6bf6ef16d545050a6037843a,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-10655,0,0,c1605174ca0bb72f5c9612ecc61dcf97fbbb993d8c4109db39f86f93e1de224e,2024-11-04T19:47:40.207000
|
CVE-2024-10655,0,0,c1605174ca0bb72f5c9612ecc61dcf97fbbb993d8c4109db39f86f93e1de224e,2024-11-04T19:47:40.207000
|
||||||
CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96617,2024-11-04T19:47:22.733000
|
CVE-2024-10656,0,0,6a9c2ea00e33366ef08d41c370d91f9326101b5384c55b9760d8981100c96617,2024-11-04T19:47:22.733000
|
||||||
CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000
|
CVE-2024-10657,0,0,9ba68410d60d8b4027ec1ef39aa8cd6c91220d7679502c5a5b889ed775c305d9,2024-11-04T19:47:03.377000
|
||||||
@ -247776,8 +247778,8 @@ CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb672
|
|||||||
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
|
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
|
||||||
CVE-2024-13821,0,0,c4eb4e44a47cc783a97d83164c517f80c21576edac7bfce0a1b9d4ee6f34830b,2025-02-25T19:37:29.223000
|
CVE-2024-13821,0,0,c4eb4e44a47cc783a97d83164c517f80c21576edac7bfce0a1b9d4ee6f34830b,2025-02-25T19:37:29.223000
|
||||||
CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000
|
CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000
|
||||||
CVE-2024-13825,0,1,71493fd1d48d0d842d256208931e7dc7eb27b21d21ff8bccb7803a3f2c80deb6,2025-03-10T18:15:28.793000
|
CVE-2024-13825,0,0,71493fd1d48d0d842d256208931e7dc7eb27b21d21ff8bccb7803a3f2c80deb6,2025-03-10T18:15:28.793000
|
||||||
CVE-2024-13826,0,1,4bf4fca4bc827f8230936e1661739c4e4d10085199dc6f814c2ceba2fedee25a,2025-03-10T18:15:28.940000
|
CVE-2024-13826,0,0,4bf4fca4bc827f8230936e1661739c4e4d10085199dc6f814c2ceba2fedee25a,2025-03-10T18:15:28.940000
|
||||||
CVE-2024-13827,0,0,2f0ca45e1aed4689f4e667f770fa7c2c2b82b3b6b79c11996f3151fecdcc8143,2025-03-05T09:15:09.390000
|
CVE-2024-13827,0,0,2f0ca45e1aed4689f4e667f770fa7c2c2b82b3b6b79c11996f3151fecdcc8143,2025-03-05T09:15:09.390000
|
||||||
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
||||||
CVE-2024-1383,0,0,9a7ca27e3e9e1c136c5682d7084731ee4c3dff24e0ba89a42c0d6d10ece5df05,2025-02-13T20:02:55.647000
|
CVE-2024-1383,0,0,9a7ca27e3e9e1c136c5682d7084731ee4c3dff24e0ba89a42c0d6d10ece5df05,2025-02-13T20:02:55.647000
|
||||||
@ -247836,8 +247838,8 @@ CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537
|
|||||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||||
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
|
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
|
||||||
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
|
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
|
||||||
CVE-2024-13918,0,1,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000
|
CVE-2024-13918,0,0,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000
|
||||||
CVE-2024-13919,0,1,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000
|
CVE-2024-13919,0,0,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000
|
||||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||||
CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000
|
CVE-2024-13924,0,0,623f22e67c236278ca920e96a81e7b261b9ec578974ede6c7601d32ce0e02517,2025-03-08T13:15:12.160000
|
||||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||||
@ -253544,13 +253546,13 @@ CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e94
|
|||||||
CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
|
CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
|
||||||
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
|
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
|
||||||
CVE-2024-26634,0,0,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000
|
CVE-2024-26634,0,0,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000
|
||||||
CVE-2024-26635,0,1,6b2b9152f4cc09a5347dc496694c99c592fee9690399767d251bdbfcb1c92ac3,2025-03-10T16:58:35.783000
|
CVE-2024-26635,0,0,6b2b9152f4cc09a5347dc496694c99c592fee9690399767d251bdbfcb1c92ac3,2025-03-10T16:58:35.783000
|
||||||
CVE-2024-26636,0,1,8b0a8d3107e26b7b2aa744e44d84fc31d26b66db5424efbb8b5a05c2d67bbabd,2025-03-10T16:58:35.783000
|
CVE-2024-26636,0,0,8b0a8d3107e26b7b2aa744e44d84fc31d26b66db5424efbb8b5a05c2d67bbabd,2025-03-10T16:58:35.783000
|
||||||
CVE-2024-26637,0,1,707cf2a09ca1107f1ccf101194f7dae4ade846d0a897c728a4c646c6cef4d174,2025-03-10T16:58:35.783000
|
CVE-2024-26637,0,0,707cf2a09ca1107f1ccf101194f7dae4ade846d0a897c728a4c646c6cef4d174,2025-03-10T16:58:35.783000
|
||||||
CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d464e3,2024-11-21T09:02:44.520000
|
CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d464e3,2024-11-21T09:02:44.520000
|
||||||
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
|
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
|
||||||
CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000
|
CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000
|
||||||
CVE-2024-26640,0,1,f1073e2f2ca52c13c6223d633861dfd55b113e4838a196b4afd88c8f06ef18e8,2025-03-10T16:58:35.783000
|
CVE-2024-26640,0,0,f1073e2f2ca52c13c6223d633861dfd55b113e4838a196b4afd88c8f06ef18e8,2025-03-10T16:58:35.783000
|
||||||
CVE-2024-26641,0,0,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000
|
CVE-2024-26641,0,0,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000
|
||||||
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
|
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
|
||||||
CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000
|
CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000
|
||||||
@ -254555,15 +254557,15 @@ CVE-2024-2776,0,0,5a8760b1a1b415fec8c0d53d84557734030fe5df558e90f4cc2aaaf71f63ee
|
|||||||
CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e25c8,2025-01-21T18:32:16.707000
|
CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e25c8,2025-01-21T18:32:16.707000
|
||||||
CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000
|
CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000
|
||||||
CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000
|
CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000
|
||||||
CVE-2024-27767,0,1,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000
|
CVE-2024-27767,0,0,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27768,0,0,6b3e88d7427d022cff68fc576d37b15c85fa018650acab8c69862312ea4ad0a0,2024-11-21T09:05:01.313000
|
CVE-2024-27768,0,1,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27769,0,0,cef999d9b0cf95b65c6309eaea8213c569635dca7adf6cf6b576ca1d2bc3fc99,2024-11-21T09:05:01.453000
|
CVE-2024-27769,0,1,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-2777,0,0,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000
|
CVE-2024-2777,0,0,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000
|
||||||
CVE-2024-27770,0,0,74674cdd65132754e1fb103e3a0767605fff455305fea28320a89adaaa674386,2024-11-21T09:05:01.600000
|
CVE-2024-27770,0,1,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27771,0,0,a31ba237e0ad8593d52e9214442b6f9e1272667c752ae33966daaa778eaa6721,2024-11-21T09:05:01.737000
|
CVE-2024-27771,0,1,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27772,0,0,382c305cd846d5a30ad35bd61d3aa56f63db66c1de69259926b60ff8a7a8caed,2024-11-21T09:05:01.870000
|
CVE-2024-27772,0,1,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27773,0,0,9937f907ae86df124158e0d3d02b2f6a356bd36428cea000a9bdb98a6113f917,2024-11-21T09:05:02
|
CVE-2024-27773,0,1,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9ebe,2024-11-21T09:05:02.147000
|
CVE-2024-27774,0,1,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000
|
||||||
CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000
|
CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000
|
||||||
CVE-2024-27776,0,0,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000
|
CVE-2024-27776,0,0,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000
|
||||||
CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000
|
CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000
|
||||||
@ -255276,7 +255278,7 @@ CVE-2024-28784,0,0,19528bcc0c3bc8260d66919d676ed073a6a44fb0d7d665af5b30c42f7b9e3
|
|||||||
CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000
|
CVE-2024-28786,0,0,47e9f8e275b359cb27433d9e50a4fb0ad51dcb0cae4f07e3607b26c89fb15667,2025-01-28T00:15:06.680000
|
||||||
CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000
|
CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000
|
||||||
CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000
|
CVE-2024-2879,0,0,d1ad7d5e09bb3b838d41d5581e7c401a98e47637aad45e585af8c39a8dfd245e,2024-11-21T09:10:44.150000
|
||||||
CVE-2024-28793,0,1,7c9a4fc4820a615f249b39765ab0bd5e62077df2117be351e55e11879942e29f,2025-03-10T18:13:04.007000
|
CVE-2024-28793,0,0,7c9a4fc4820a615f249b39765ab0bd5e62077df2117be351e55e11879942e29f,2025-03-10T18:13:04.007000
|
||||||
CVE-2024-28794,0,0,753119303926f099a6871b2aad29e596a251b3b7511785f9ac432c16c51f6fee,2024-11-21T09:06:56.313000
|
CVE-2024-28794,0,0,753119303926f099a6871b2aad29e596a251b3b7511785f9ac432c16c51f6fee,2024-11-21T09:06:56.313000
|
||||||
CVE-2024-28795,0,0,13660f5f0e3307ed7567ab8952f3f7ea7f686deb9fb2cf94040d198f3b34c369,2024-11-21T09:06:56.463000
|
CVE-2024-28795,0,0,13660f5f0e3307ed7567ab8952f3f7ea7f686deb9fb2cf94040d198f3b34c369,2024-11-21T09:06:56.463000
|
||||||
CVE-2024-28796,0,0,d393d3668c7061f02a786de2b9138992d5973bef5edcaf6e1113c7073d631e73,2024-11-21T09:06:56.600000
|
CVE-2024-28796,0,0,d393d3668c7061f02a786de2b9138992d5973bef5edcaf6e1113c7073d631e73,2024-11-21T09:06:56.600000
|
||||||
@ -262731,7 +262733,7 @@ CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8
|
|||||||
CVE-2024-38316,0,0,54c639a1ba71c7b262c015a9f3345a4e9e925e636f71556705e8b896c97b6bb1,2025-03-06T20:57:36.280000
|
CVE-2024-38316,0,0,54c639a1ba71c7b262c015a9f3345a4e9e925e636f71556705e8b896c97b6bb1,2025-03-06T20:57:36.280000
|
||||||
CVE-2024-38317,0,0,1435a0b355b674a0e79e886c8a7c7701bf745cf5a6ce1e5e1d5da67400da5de4,2025-03-07T19:37:23.273000
|
CVE-2024-38317,0,0,1435a0b355b674a0e79e886c8a7c7701bf745cf5a6ce1e5e1d5da67400da5de4,2025-03-07T19:37:23.273000
|
||||||
CVE-2024-38318,0,0,84cb647ec8ad3685764ecb8b89a522bdff0d622e8eea170a5d72f5d21041aa89,2025-03-07T19:37:23.273000
|
CVE-2024-38318,0,0,84cb647ec8ad3685764ecb8b89a522bdff0d622e8eea170a5d72f5d21041aa89,2025-03-07T19:37:23.273000
|
||||||
CVE-2024-38319,0,1,cb4fbb49d8d950cc4963734c29fe24c4a48add2991e72ca6a82209d0ed13c392,2025-03-10T18:13:04.007000
|
CVE-2024-38319,0,0,cb4fbb49d8d950cc4963734c29fe24c4a48add2991e72ca6a82209d0ed13c392,2025-03-10T18:13:04.007000
|
||||||
CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000
|
CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000
|
||||||
CVE-2024-38320,0,0,4bb869c8ea82ab12a47183ea9bdc7cf49478a8454232d78ccf2ee6bb1582e818,2025-01-27T16:15:30.973000
|
CVE-2024-38320,0,0,4bb869c8ea82ab12a47183ea9bdc7cf49478a8454232d78ccf2ee6bb1582e818,2025-01-27T16:15:30.973000
|
||||||
CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000
|
CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000
|
||||||
@ -266008,7 +266010,7 @@ CVE-2024-4270,0,0,22c4c9c8340b0ae818c3604e06cef3a06794a2fdd8eea4d3c876fd29114fb7
|
|||||||
CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1dc,2024-11-21T09:42:31.173000
|
CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1dc,2024-11-21T09:42:31.173000
|
||||||
CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000
|
CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000
|
||||||
CVE-2024-4273,0,0,347cc3730c3defd1ec37ea8bf1fe1c4fac9170b2ca0876d0ff5de387107219aa,2024-11-21T09:42:31.527000
|
CVE-2024-4273,0,0,347cc3730c3defd1ec37ea8bf1fe1c4fac9170b2ca0876d0ff5de387107219aa,2024-11-21T09:42:31.527000
|
||||||
CVE-2024-42733,0,1,9360a59cf686fb21d414bcff3b95ceaac84334cd9396a6a0fa770a87432b3bde,2025-03-10T17:15:34.673000
|
CVE-2024-42733,0,0,9360a59cf686fb21d414bcff3b95ceaac84334cd9396a6a0fa770a87432b3bde,2025-03-10T17:15:34.673000
|
||||||
CVE-2024-42736,0,0,d8c81b07d196ba07e528b38eee2f3737146d01802a45f464a2fa1cf036e3a593,2024-08-13T17:11:53.553000
|
CVE-2024-42736,0,0,d8c81b07d196ba07e528b38eee2f3737146d01802a45f464a2fa1cf036e3a593,2024-08-13T17:11:53.553000
|
||||||
CVE-2024-42737,0,0,006d79e3bf2eda54b979ed88cd81814d58a98170e7ee0605965755ba8d3f8e02,2024-08-13T18:35:07.950000
|
CVE-2024-42737,0,0,006d79e3bf2eda54b979ed88cd81814d58a98170e7ee0605965755ba8d3f8e02,2024-08-13T18:35:07.950000
|
||||||
CVE-2024-42738,0,0,5603a4c92bb9fdfceffe4d70e44004fa4c908e1daba49cef169637c9eca20050,2024-08-14T16:35:16.850000
|
CVE-2024-42738,0,0,5603a4c92bb9fdfceffe4d70e44004fa4c908e1daba49cef169637c9eca20050,2024-08-14T16:35:16.850000
|
||||||
@ -266402,7 +266404,7 @@ CVE-2024-43288,0,0,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1
|
|||||||
CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000
|
CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000
|
||||||
CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000
|
CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000
|
||||||
CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000
|
CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000
|
||||||
CVE-2024-43291,0,1,7ab71e3654e0e3a6115f3c5c1787b4453c59ae94624a7916345196db673a03b3,2025-03-10T17:06:30.757000
|
CVE-2024-43291,0,0,7ab71e3654e0e3a6115f3c5c1787b4453c59ae94624a7916345196db673a03b3,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-43292,0,0,208c4e73174d2dc26e0fbf34675f80707682261eb7a822ba10ee65b232b3bbbc,2024-08-19T12:59:59.177000
|
CVE-2024-43292,0,0,208c4e73174d2dc26e0fbf34675f80707682261eb7a822ba10ee65b232b3bbbc,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-43293,0,0,b1892d2fa392ffe2bd09211d2c26fcff7c9529e98d127336d6156a0f08946def,2024-11-13T01:19:49.207000
|
CVE-2024-43293,0,0,b1892d2fa392ffe2bd09211d2c26fcff7c9529e98d127336d6156a0f08946def,2024-11-13T01:19:49.207000
|
||||||
CVE-2024-43294,0,0,dbbb329e4dfb5feb56f3872fc122b72b3275c63adcbfbf2ee4e0eaebdd0aa048,2024-08-19T12:59:59.177000
|
CVE-2024-43294,0,0,dbbb329e4dfb5feb56f3872fc122b72b3275c63adcbfbf2ee4e0eaebdd0aa048,2024-08-19T12:59:59.177000
|
||||||
@ -267279,6 +267281,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d
|
|||||||
CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000
|
CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000
|
||||||
CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000
|
CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000
|
||||||
CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000
|
CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000
|
||||||
|
CVE-2024-44179,1,1,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000
|
||||||
CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000
|
CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000
|
||||||
CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000
|
CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000
|
||||||
CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000
|
CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000
|
||||||
@ -267293,6 +267296,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
|
|||||||
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
|
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
|
||||||
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
|
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
|
||||||
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
||||||
|
CVE-2024-44192,1,1,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000
|
||||||
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
|
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
|
||||||
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
|
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
|
||||||
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
|
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
|
||||||
@ -267322,6 +267326,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370
|
|||||||
CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000
|
CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000
|
||||||
CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000
|
CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000
|
||||||
CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000
|
CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000
|
||||||
|
CVE-2024-44227,1,1,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000
|
||||||
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
|
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
|
||||||
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
|
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
|
||||||
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
|
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
|
||||||
@ -270674,7 +270679,7 @@ CVE-2024-49278,0,0,0dd8cc10bd56876b7ee7ed6bcec68079ec2c49ad19687231e6f5648d7de2e
|
|||||||
CVE-2024-49279,0,0,8f41922d51c3c4a8b109eee18fdf9c34f89d06145641e421bc0ea55b455bab9c,2024-10-18T12:52:33.507000
|
CVE-2024-49279,0,0,8f41922d51c3c4a8b109eee18fdf9c34f89d06145641e421bc0ea55b455bab9c,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-4928,0,0,ed7e945a54481af08d73830e084a748102ec0ee82721536fcd25b5d604ec6422,2024-12-09T22:45:35.050000
|
CVE-2024-4928,0,0,ed7e945a54481af08d73830e084a748102ec0ee82721536fcd25b5d604ec6422,2024-12-09T22:45:35.050000
|
||||||
CVE-2024-49280,0,0,bb81bac00b921d3399c1799e890dc4e07bec7ac0c3ee7892b44216d9924ea20a,2024-10-18T12:52:33.507000
|
CVE-2024-49280,0,0,bb81bac00b921d3399c1799e890dc4e07bec7ac0c3ee7892b44216d9924ea20a,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-49281,0,1,538fe519ad8839a1dc1f053a93a0398b2b48cfb21951877be82c668728db8778,2025-03-10T17:06:30.757000
|
CVE-2024-49281,0,0,538fe519ad8839a1dc1f053a93a0398b2b48cfb21951877be82c668728db8778,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-49282,0,0,358126e846a2d67f83feaaee630d8f728927c331352abaa3840691ed529b0855,2024-10-18T12:52:33.507000
|
CVE-2024-49282,0,0,358126e846a2d67f83feaaee630d8f728927c331352abaa3840691ed529b0855,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-49283,0,0,b76fcaf4941a43eca8ac218695c9ff920cc1b4d57755b09dc6ae9e43b860912e,2024-10-18T12:52:33.507000
|
CVE-2024-49283,0,0,b76fcaf4941a43eca8ac218695c9ff920cc1b4d57755b09dc6ae9e43b860912e,2024-10-18T12:52:33.507000
|
||||||
CVE-2024-49284,0,0,fdc9d47e56d33c2c1b39cc8c3bcf68eee2a92cb69ca6c7b63a1823bf85ccd8c5,2024-10-18T12:52:33.507000
|
CVE-2024-49284,0,0,fdc9d47e56d33c2c1b39cc8c3bcf68eee2a92cb69ca6c7b63a1823bf85ccd8c5,2024-10-18T12:52:33.507000
|
||||||
@ -272568,8 +272573,8 @@ CVE-2024-51743,0,0,b2564a1b5274562ee0373ade5b7c8ae3231838962180126dc026362019585
|
|||||||
CVE-2024-51744,0,0,07c3cdf47d43fa1c7a4c89dc7a6775d60f31b15068c0fe1b5baf96ced0398c03,2024-11-05T16:04:26.053000
|
CVE-2024-51744,0,0,07c3cdf47d43fa1c7a4c89dc7a6775d60f31b15068c0fe1b5baf96ced0398c03,2024-11-05T16:04:26.053000
|
||||||
CVE-2024-51745,0,0,3b9cf7d54138e14d61b0f37339976c3050c0eb594f276e58a7e3d1fe556423b6,2024-11-21T09:45:55.150000
|
CVE-2024-51745,0,0,3b9cf7d54138e14d61b0f37339976c3050c0eb594f276e58a7e3d1fe556423b6,2024-11-21T09:45:55.150000
|
||||||
CVE-2024-51746,0,0,8a404a45c3af199f76ef3a0dc8aa968158c8edc55035f2fbf0a7488c8ff45eb6,2024-11-06T18:17:17.287000
|
CVE-2024-51746,0,0,8a404a45c3af199f76ef3a0dc8aa968158c8edc55035f2fbf0a7488c8ff45eb6,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-51747,0,1,0e5f0cee6c277440d52f66fc6ffbfd1f512f73e6867a2f56e70f70e7e32f9325,2025-03-10T17:06:30.757000
|
CVE-2024-51747,0,0,0e5f0cee6c277440d52f66fc6ffbfd1f512f73e6867a2f56e70f70e7e32f9325,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-51748,0,1,7d2c1827bdc72af2c75722dcac4ffc315e19319ebfe049c77d7e50d4ab8b5929,2025-03-10T17:06:30.757000
|
CVE-2024-51748,0,0,7d2c1827bdc72af2c75722dcac4ffc315e19319ebfe049c77d7e50d4ab8b5929,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-51749,0,0,d5066a2c21ea4046dbe8ef1625654a81672322255d3853591b65bcb8d004873f,2024-11-13T17:01:58.603000
|
CVE-2024-51749,0,0,d5066a2c21ea4046dbe8ef1625654a81672322255d3853591b65bcb8d004873f,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-5175,0,0,7df70c1c6d6302db3450621ef632fb7e91d6d1a97b15303122ead7b1fd2f3392,2025-01-14T20:15:30.680000
|
CVE-2024-5175,0,0,7df70c1c6d6302db3450621ef632fb7e91d6d1a97b15303122ead7b1fd2f3392,2025-01-14T20:15:30.680000
|
||||||
CVE-2024-51750,0,0,3700b00a5a95b3a7af3d6529d6be64cf967c06e1e7f9070747c88a19e92dda2f,2024-11-13T17:01:58.603000
|
CVE-2024-51750,0,0,3700b00a5a95b3a7af3d6529d6be64cf967c06e1e7f9070747c88a19e92dda2f,2024-11-13T17:01:58.603000
|
||||||
@ -273310,7 +273315,7 @@ CVE-2024-52809,0,0,e6e8fdfb2a9590dbf3ac4ff1c36e2b310a9789ae561f064e3a71e8766edca
|
|||||||
CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000
|
CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000
|
||||||
CVE-2024-52810,0,0,692a38edbbcd6e7e5b7bb9c4ef84a1dae9c117efe7d0a18d05012d6cf584cbe8,2024-11-29T19:15:09.163000
|
CVE-2024-52810,0,0,692a38edbbcd6e7e5b7bb9c4ef84a1dae9c117efe7d0a18d05012d6cf584cbe8,2024-11-29T19:15:09.163000
|
||||||
CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000
|
CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000
|
||||||
CVE-2024-52812,1,1,b2792afc7535334ac8ff921221caad0b792fabaf21136720c1b8b4ebff68024d,2025-03-10T18:15:29.207000
|
CVE-2024-52812,0,0,b2792afc7535334ac8ff921221caad0b792fabaf21136720c1b8b4ebff68024d,2025-03-10T18:15:29.207000
|
||||||
CVE-2024-52813,0,0,8169b64a8f667238b5fed148236c36caf5ee42d982d7846d64529f8f50a42147,2025-01-07T16:15:35.610000
|
CVE-2024-52813,0,0,8169b64a8f667238b5fed148236c36caf5ee42d982d7846d64529f8f50a42147,2025-01-07T16:15:35.610000
|
||||||
CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000
|
CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000
|
||||||
CVE-2024-52815,0,0,fc5515ccded95dd9a322c2307bbaca64ae1d00a1cc2abf56dc836d595924f7d3,2024-12-03T17:15:12.267000
|
CVE-2024-52815,0,0,fc5515ccded95dd9a322c2307bbaca64ae1d00a1cc2abf56dc836d595924f7d3,2024-12-03T17:15:12.267000
|
||||||
@ -273754,7 +273759,7 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36
|
|||||||
CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000
|
CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000
|
||||||
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
||||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||||
CVE-2024-53307,1,1,27656ee8af63d12a9a3481a60b685fef66d7f079c2e7db6919c70e069d97f636,2025-03-10T18:15:29.373000
|
CVE-2024-53307,0,0,27656ee8af63d12a9a3481a60b685fef66d7f079c2e7db6919c70e069d97f636,2025-03-10T18:15:29.373000
|
||||||
CVE-2024-53309,0,0,d296bdbc55651e5de6f32c7ca75c04e89adf67750111a836be4d48ce4534faca,2025-02-13T23:15:10.400000
|
CVE-2024-53309,0,0,d296bdbc55651e5de6f32c7ca75c04e89adf67750111a836be4d48ce4534faca,2025-02-13T23:15:10.400000
|
||||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||||
CVE-2024-53310,0,0,f0b739adf0c8009e62a81f924e7e1874dc0c63630728d316ba18d360b795a331,2025-02-13T23:15:10.493000
|
CVE-2024-53310,0,0,f0b739adf0c8009e62a81f924e7e1874dc0c63630728d316ba18d360b795a331,2025-02-13T23:15:10.493000
|
||||||
@ -274186,7 +274191,7 @@ CVE-2024-53996,0,0,d36e247a06b1f41c7c1e65228887c2c12a82ebc001f7a83b885b351bf294c
|
|||||||
CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000
|
CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000
|
||||||
CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000
|
CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000
|
||||||
CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000
|
CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000
|
||||||
CVE-2024-54001,0,1,e59358fe4cfcad6530728dd9a2eca7986288458ad65edc20bef9c7a519a29ea4,2025-03-10T17:06:30.757000
|
CVE-2024-54001,0,0,e59358fe4cfcad6530728dd9a2eca7986288458ad65edc20bef9c7a519a29ea4,2025-03-10T17:06:30.757000
|
||||||
CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb98949b7,2024-12-04T16:15:26.537000
|
CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb98949b7,2024-12-04T16:15:26.537000
|
||||||
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
|
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
|
||||||
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
||||||
@ -274591,12 +274596,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be
|
|||||||
CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000
|
CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000
|
||||||
CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000
|
CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000
|
||||||
CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000
|
CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000
|
||||||
|
CVE-2024-54463,1,1,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000
|
||||||
CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000
|
CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000
|
||||||
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
|
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
|
||||||
|
CVE-2024-54467,1,1,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000
|
||||||
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
|
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
|
||||||
|
CVE-2024-54469,1,1,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000
|
||||||
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
|
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
|
||||||
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
|
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
|
||||||
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
|
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
|
||||||
|
CVE-2024-54473,1,1,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000
|
||||||
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
||||||
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
|
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
|
||||||
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
|
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
|
||||||
@ -274662,12 +274671,15 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31
|
|||||||
CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000
|
CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000
|
||||||
CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000
|
CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000
|
||||||
CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000
|
CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000
|
||||||
|
CVE-2024-54546,1,1,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000
|
||||||
CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000
|
CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000
|
||||||
CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000
|
CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000
|
||||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||||
CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000
|
CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000
|
||||||
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
|
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
|
||||||
|
CVE-2024-54558,1,1,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000
|
||||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||||
|
CVE-2024-54560,1,1,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000
|
||||||
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
||||||
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
|
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
|
||||||
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
|
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
|
||||||
@ -274855,7 +274867,7 @@ CVE-2024-55193,0,0,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a
|
|||||||
CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000
|
CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000
|
||||||
CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030b31,2025-01-28T15:15:12.647000
|
CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030b31,2025-01-28T15:15:12.647000
|
||||||
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
|
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
|
||||||
CVE-2024-55199,1,1,2f95470d364d2046ab78b3e97c71763ee4a2b9f2bb80431b8212f91bef2ed28e,2025-03-10T18:15:29.757000
|
CVE-2024-55199,0,0,2f95470d364d2046ab78b3e97c71763ee4a2b9f2bb80431b8212f91bef2ed28e,2025-03-10T18:15:29.757000
|
||||||
CVE-2024-5520,0,0,e6d97b1dda441d8a0c302258b741a51060a2df1d0eb8bad8a068e05ca70f1628,2025-03-04T17:00:22.900000
|
CVE-2024-5520,0,0,e6d97b1dda441d8a0c302258b741a51060a2df1d0eb8bad8a068e05ca70f1628,2025-03-04T17:00:22.900000
|
||||||
CVE-2024-5521,0,0,ebd1c0326746de4cb989a5e4cd7a8949653ccfaea201d5d184ffb9658b250015,2025-03-04T17:00:22.900000
|
CVE-2024-5521,0,0,ebd1c0326746de4cb989a5e4cd7a8949653ccfaea201d5d184ffb9658b250015,2025-03-04T17:00:22.900000
|
||||||
CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000
|
CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000
|
||||||
@ -274978,7 +274990,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81
|
|||||||
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
||||||
CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000
|
CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000
|
||||||
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
||||||
CVE-2024-55581,0,0,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000
|
CVE-2024-55581,0,1,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000
|
||||||
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
|
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
|
||||||
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
|
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
|
||||||
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
||||||
@ -275261,6 +275273,11 @@ CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f61
|
|||||||
CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000
|
CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000
|
||||||
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
|
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
|
||||||
CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000
|
CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000
|
||||||
|
CVE-2024-56184,1,1,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000
|
||||||
|
CVE-2024-56185,1,1,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000
|
||||||
|
CVE-2024-56186,1,1,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000
|
||||||
|
CVE-2024-56187,1,1,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000
|
||||||
|
CVE-2024-56188,1,1,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000
|
||||||
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
|
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
|
||||||
CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000
|
CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000
|
||||||
CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000
|
CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000
|
||||||
@ -275877,19 +275894,19 @@ CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329
|
|||||||
CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000
|
CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000
|
||||||
CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000
|
CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000
|
||||||
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
|
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
|
||||||
CVE-2024-57011,0,1,be6080f9c81dff32c56ab787801c6d4968f63e34f2280e5fd3971d611a937b51,2025-03-10T17:20:52.287000
|
CVE-2024-57011,0,0,be6080f9c81dff32c56ab787801c6d4968f63e34f2280e5fd3971d611a937b51,2025-03-10T17:20:52.287000
|
||||||
CVE-2024-57012,0,1,1a32e2d5b34eb171e04d3b0eb3728efdb697bac49b9bf0e2a53d6bc5ac3716e1,2025-03-10T17:20:52.287000
|
CVE-2024-57012,0,0,1a32e2d5b34eb171e04d3b0eb3728efdb697bac49b9bf0e2a53d6bc5ac3716e1,2025-03-10T17:20:52.287000
|
||||||
CVE-2024-57013,0,1,cd89ed0f0d415a586d92bdfe7e6d4fd3ee62b39d405fa6a2d30dedb38e287b11,2025-03-10T17:20:52.287000
|
CVE-2024-57013,0,0,cd89ed0f0d415a586d92bdfe7e6d4fd3ee62b39d405fa6a2d30dedb38e287b11,2025-03-10T17:20:52.287000
|
||||||
CVE-2024-57014,0,1,ea58867b28f1d86cfc1000150fad043b3598d0e9c1e1db4d0e6d15c173963d7a,2025-03-10T17:20:52.287000
|
CVE-2024-57014,0,0,ea58867b28f1d86cfc1000150fad043b3598d0e9c1e1db4d0e6d15c173963d7a,2025-03-10T17:20:52.287000
|
||||||
CVE-2024-57015,0,1,e1397e56ccc189415186354b046b7d8b68f5e98beb69f900bc3d53588e2d4a6c,2025-03-10T17:20:52.287000
|
CVE-2024-57015,0,0,e1397e56ccc189415186354b046b7d8b68f5e98beb69f900bc3d53588e2d4a6c,2025-03-10T17:20:52.287000
|
||||||
CVE-2024-57016,0,1,a32f1e88d44aa33b1ead8c4f600342f9a69418e24ce9c342fddf173607751672,2025-03-10T17:23:12.970000
|
CVE-2024-57016,0,0,a32f1e88d44aa33b1ead8c4f600342f9a69418e24ce9c342fddf173607751672,2025-03-10T17:23:12.970000
|
||||||
CVE-2024-57017,0,1,ecd833218b2634d9d572a6682fffca599485d7f9d0d4eebda72dd60e55145d1f,2025-03-10T17:23:12.970000
|
CVE-2024-57017,0,0,ecd833218b2634d9d572a6682fffca599485d7f9d0d4eebda72dd60e55145d1f,2025-03-10T17:23:12.970000
|
||||||
CVE-2024-57018,0,1,6f6f403f71d7e91851556d9c77f2834fba7474f70698e8f99da406c31ffac8bb,2025-03-10T17:23:12.970000
|
CVE-2024-57018,0,0,6f6f403f71d7e91851556d9c77f2834fba7474f70698e8f99da406c31ffac8bb,2025-03-10T17:23:12.970000
|
||||||
CVE-2024-57019,0,1,4c3deaad389277c6358f444bb13614b0e27a90b771efec9b5ba44a0a6256f767,2025-03-10T17:23:12.970000
|
CVE-2024-57019,0,0,4c3deaad389277c6358f444bb13614b0e27a90b771efec9b5ba44a0a6256f767,2025-03-10T17:23:12.970000
|
||||||
CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000
|
CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000
|
||||||
CVE-2024-57020,0,1,c3af2a2179ea929e90dd24fe9ed7c0baaf9a85d76b0f8766520fb2c03cfaa3d1,2025-03-10T17:25:21.297000
|
CVE-2024-57020,0,0,c3af2a2179ea929e90dd24fe9ed7c0baaf9a85d76b0f8766520fb2c03cfaa3d1,2025-03-10T17:25:21.297000
|
||||||
CVE-2024-57021,0,1,0840af449b328f25f95fdea7315d2a54de5400f60e41293e81b29fa0ded9c640,2025-03-10T17:25:21.297000
|
CVE-2024-57021,0,0,0840af449b328f25f95fdea7315d2a54de5400f60e41293e81b29fa0ded9c640,2025-03-10T17:25:21.297000
|
||||||
CVE-2024-57022,0,1,70ddf58a700253639efe228c811aade6d505dd5bde78569534da2c4fecbe50f9,2025-03-10T17:25:21.297000
|
CVE-2024-57022,0,0,70ddf58a700253639efe228c811aade6d505dd5bde78569534da2c4fecbe50f9,2025-03-10T17:25:21.297000
|
||||||
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
||||||
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
||||||
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
||||||
@ -280521,7 +280538,7 @@ CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237
|
|||||||
CVE-2025-0591,0,0,31743e528b9642b20d256fb46c14cc7ce872bd582fcdb63a43f5e161426dc8af,2025-02-17T00:15:08.987000
|
CVE-2025-0591,0,0,31743e528b9642b20d256fb46c14cc7ce872bd582fcdb63a43f5e161426dc8af,2025-02-17T00:15:08.987000
|
||||||
CVE-2025-0592,0,0,92924626baecbab996d0e97311af8c1852928a73cb5e120c4713cb77cb4e663d,2025-02-14T21:15:16.543000
|
CVE-2025-0592,0,0,92924626baecbab996d0e97311af8c1852928a73cb5e120c4713cb77cb4e663d,2025-02-14T21:15:16.543000
|
||||||
CVE-2025-0593,0,0,f384bb5183fd52ec3bc21aa2809ce1a4d509fdefca6b18add8a3ba9e9b530a58,2025-02-14T21:15:16.680000
|
CVE-2025-0593,0,0,f384bb5183fd52ec3bc21aa2809ce1a4d509fdefca6b18add8a3ba9e9b530a58,2025-02-14T21:15:16.680000
|
||||||
CVE-2025-0604,0,1,65d99042cdfc24b7fd971e847d0824bdd4a49dabc5163e4efb88553fa5fde11a,2025-03-10T18:15:30.100000
|
CVE-2025-0604,0,1,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000
|
||||||
CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000
|
CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000
|
||||||
CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000
|
CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000
|
||||||
CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000
|
CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000
|
||||||
@ -280767,7 +280784,7 @@ CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c9
|
|||||||
CVE-2025-1012,0,0,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000
|
CVE-2025-1012,0,0,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000
|
||||||
CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000
|
CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000
|
||||||
CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000
|
CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000
|
||||||
CVE-2025-1015,0,0,ca0b646f155f052475294793178d8e15a2141df178d9f30aa4cb6946ec037c08,2025-02-06T22:15:40.247000
|
CVE-2025-1015,0,1,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000
|
||||||
CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000
|
CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000
|
||||||
CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced198182568,2025-02-06T21:15:22.760000
|
CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced198182568,2025-02-06T21:15:22.760000
|
||||||
CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000
|
CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000
|
||||||
@ -280940,7 +280957,7 @@ CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9d
|
|||||||
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
||||||
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
||||||
CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000
|
CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000
|
||||||
CVE-2025-1296,1,1,113b62f343199d9c1b1cf094fd56879d7a4f774e1c89050406c1880e315c9580,2025-03-10T18:15:30.237000
|
CVE-2025-1296,0,0,113b62f343199d9c1b1cf094fd56879d7a4f774e1c89050406c1880e315c9580,2025-03-10T18:15:30.237000
|
||||||
CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000
|
CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000
|
||||||
CVE-2025-1300,0,0,77db9cd7a18e3de4a8b6c836390a2247e6295125845190568cfff46e60843c32,2025-02-28T13:15:27.043000
|
CVE-2025-1300,0,0,77db9cd7a18e3de4a8b6c836390a2247e6295125845190568cfff46e60843c32,2025-02-28T13:15:27.043000
|
||||||
CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000
|
CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000
|
||||||
@ -280999,7 +281016,7 @@ CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b9368
|
|||||||
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
|
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
|
||||||
CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000
|
CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000
|
||||||
CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000
|
CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000
|
||||||
CVE-2025-1391,0,1,9d7e46c0d6ac84717a87c810210b76bebfba0c57a7689c74580f69b8061facc3,2025-03-10T18:15:30.410000
|
CVE-2025-1391,0,1,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000
|
||||||
CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000
|
CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000
|
||||||
CVE-2025-1393,0,0,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000
|
CVE-2025-1393,0,0,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000
|
||||||
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
|
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
|
||||||
@ -281496,7 +281513,7 @@ CVE-2025-20933,0,0,78c769f64ec13bb740e2a7da07ade5ae850d040aa51ab886eedfde7cdb9d5
|
|||||||
CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c08362,2025-03-07T23:15:15.883000
|
CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c08362,2025-03-07T23:15:15.883000
|
||||||
CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000
|
CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000
|
||||||
CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000
|
CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000
|
||||||
CVE-2025-2097,0,1,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000
|
CVE-2025-2097,0,0,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000
|
||||||
CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000
|
CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000
|
||||||
CVE-2025-21084,0,0,7b324472a45e5386cabb4c5492ab3928131f338a2d61662b2da75c2b9ab26744,2025-03-04T17:41:14.237000
|
CVE-2025-21084,0,0,7b324472a45e5386cabb4c5492ab3928131f338a2d61662b2da75c2b9ab26744,2025-03-04T17:41:14.237000
|
||||||
CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000
|
CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000
|
||||||
@ -282381,6 +282398,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02
|
|||||||
CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000
|
CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000
|
||||||
CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000
|
CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000
|
||||||
CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000
|
CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000
|
||||||
|
CVE-2025-22603,1,1,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000
|
||||||
CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000
|
CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000
|
||||||
CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000
|
CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000
|
||||||
CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000
|
CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000
|
||||||
@ -283693,7 +283711,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2
|
|||||||
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
|
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
|
||||||
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
||||||
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
||||||
CVE-2025-24813,1,1,956c3d40763c8e4e5815e9e48d76287383629d8fc8ff5d279b49971172c2a26d,2025-03-10T17:15:35.067000
|
CVE-2025-24813,0,1,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000
|
||||||
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
|
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
|
||||||
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
|
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
|
||||||
CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000
|
CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000
|
||||||
@ -283934,6 +283952,7 @@ CVE-2025-25302,0,0,c00a60e460c085bc6071f27703e95f8cb2f218886d77664be4a3a5d8bb045
|
|||||||
CVE-2025-25303,0,0,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000
|
CVE-2025-25303,0,0,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000
|
||||||
CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000
|
CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000
|
||||||
CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000
|
CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000
|
||||||
|
CVE-2025-25306,1,1,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000
|
||||||
CVE-2025-25323,0,0,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000
|
CVE-2025-25323,0,0,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000
|
||||||
CVE-2025-25324,0,0,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000
|
CVE-2025-25324,0,0,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000
|
||||||
CVE-2025-25325,0,0,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000
|
CVE-2025-25325,0,0,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000
|
||||||
@ -284007,11 +284026,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
|
|||||||
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
||||||
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
||||||
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
|
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
|
||||||
CVE-2025-25614,0,0,c675990c7d380dd61a91c4658854dbebaa65b350bca03a6e567ad85dbe4d1974,2025-03-10T15:15:37.330000
|
CVE-2025-25614,0,1,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000
|
||||||
CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
|
CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
|
||||||
CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
|
CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
|
||||||
CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
|
CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
|
||||||
CVE-2025-25620,0,0,c97dc91c74c9312565adbd3deb243defc9e4012573757fad1b98f7080f6f489f,2025-03-10T15:15:37.490000
|
CVE-2025-25620,0,1,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000
|
||||||
CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000
|
CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000
|
||||||
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
|
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
|
||||||
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
|
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
|
||||||
@ -284280,6 +284299,8 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0
|
|||||||
CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000
|
CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000
|
||||||
CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000
|
CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000
|
||||||
CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000
|
CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000
|
||||||
|
CVE-2025-26695,1,1,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000
|
||||||
|
CVE-2025-26696,1,1,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000
|
||||||
CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000
|
CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000
|
||||||
CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000
|
CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000
|
||||||
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
|
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
|
||||||
@ -284423,6 +284444,7 @@ CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f7020
|
|||||||
CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000
|
CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000
|
||||||
CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
|
CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
|
||||||
CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000
|
CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000
|
||||||
|
CVE-2025-27136,1,1,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000
|
||||||
CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000
|
CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000
|
||||||
CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
|
CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
|
||||||
CVE-2025-27140,0,0,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000
|
CVE-2025-27140,0,0,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000
|
||||||
@ -284562,11 +284584,13 @@ CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3
|
|||||||
CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
|
CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
|
||||||
CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
|
CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
|
||||||
CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
|
CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
|
||||||
|
CVE-2025-27615,1,1,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000
|
||||||
|
CVE-2025-27616,1,1,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000
|
||||||
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||||
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||||
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||||
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
|
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
|
||||||
CVE-2025-27636,0,0,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000
|
CVE-2025-27636,0,1,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000
|
||||||
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
|
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
|
||||||
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
|
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
|
||||||
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
|
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
|
||||||
@ -284626,3 +284650,4 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
|
|||||||
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
|
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
|
||||||
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
|
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
|
||||||
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
|
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
|
||||||
|
CVE-2025-27913,1,1,6f0bd3601f96716de702de6a067ea8085488a5f63b84b8fb03e2b0e08a5595da,2025-03-10T20:15:14.500000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user