mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-28T15:00:20.043026+00:00
This commit is contained in:
parent
d66373eb03
commit
f51bf49e3e
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-4656",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2016-08-25T21:59:01.087",
|
||||
"lastModified": "2025-01-29T18:15:27.380",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -166,7 +166,8 @@
|
||||
"url": "https://support.apple.com/HT207107",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -215,7 +216,8 @@
|
||||
"url": "https://support.apple.com/HT207107",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-4657",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2016-08-25T21:59:02.150",
|
||||
"lastModified": "2025-01-29T18:15:27.607",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -166,7 +166,8 @@
|
||||
"url": "https://support.apple.com/HT207107",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -222,7 +223,8 @@
|
||||
"url": "https://support.apple.com/HT207107",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-4344",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-04-03T18:29:09.173",
|
||||
"lastModified": "2025-01-29T18:15:30.723",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -151,56 +151,64 @@
|
||||
"url": "https://support.apple.com/kb/HT209106",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209107",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209108",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209139",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209106",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209107",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209108",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT209139",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-6223",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-03-05T16:29:02.060",
|
||||
"lastModified": "2025-01-29T18:15:32.017",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,8 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -36,15 +36,13 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
@ -131,28 +129,32 @@
|
||||
"url": "https://support.apple.com/HT209520",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209521",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209520",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209521",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-7287",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-12-18T18:15:22.130",
|
||||
"lastModified": "2025-01-29T18:15:32.647",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,14 +133,16 @@
|
||||
"url": "https://support.apple.com/HT209520",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209520",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-8506",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-12-18T18:15:22.880",
|
||||
"lastModified": "2025-01-29T18:15:32.920",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -188,84 +188,96 @@
|
||||
"url": "https://support.apple.com/HT209599",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209601",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209602",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209603",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209604",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209605",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209599",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209601",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209602",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209603",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209604",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209605",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-8526",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-12-18T18:15:24.223",
|
||||
"lastModified": "2025-01-29T18:15:33.430",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,14 +133,16 @@
|
||||
"url": "https://support.apple.com/HT209600",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT209600",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-8605",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2019-12-18T18:15:28.833",
|
||||
"lastModified": "2025-01-29T18:15:34.143",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -151,62 +151,64 @@
|
||||
"url": "https://support.apple.com/HT210118",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210119",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210120",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210122",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210118",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210119",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210120",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT210122",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-27950",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-12-08T21:15:13.967",
|
||||
"lastModified": "2025-01-29T18:15:34.950",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-3837",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-02-27T21:15:16.630",
|
||||
"lastModified": "2025-01-29T18:15:35.193",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-9818",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-06-09T17:15:13.317",
|
||||
"lastModified": "2025-01-29T18:15:36.303",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-9819",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-06-09T17:15:13.377",
|
||||
"lastModified": "2025-01-29T18:15:36.543",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-9859",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-06-05T15:15:11.097",
|
||||
"lastModified": "2025-01-29T18:15:36.767",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -157,14 +157,16 @@
|
||||
"url": "https://support.apple.com/HT211214",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT211214",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-9907",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-10-16T17:15:16.590",
|
||||
"lastModified": "2025-01-29T18:15:36.987",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -145,28 +145,32 @@
|
||||
"url": "https://support.apple.com/HT211288",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT211290",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT211288",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/HT211290",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-9934",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2020-10-16T17:15:17.637",
|
||||
"lastModified": "2025-01-29T18:15:37.463",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1782",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T18:15:21.373",
|
||||
"lastModified": "2025-02-03T14:15:30.590",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1789",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T18:15:21.747",
|
||||
"lastModified": "2025-01-29T18:15:37.707",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1870",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.567",
|
||||
"lastModified": "2025-01-29T18:15:38.170",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -109,9 +109,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "527CAF62-2FF0-4BC9-A537-EE52825C7504"
|
||||
"matchCriteriaId": "17AAEA98-4C05-496E-81A7-AC031FCDDDA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -194,14 +194,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -215,28 +215,30 @@
|
||||
"url": "https://support.apple.com/en-us/HT212146",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212147",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -250,14 +252,16 @@
|
||||
"url": "https://support.apple.com/en-us/HT212146",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212147",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1871",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.663",
|
||||
"lastModified": "2025-01-29T18:15:38.527",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -109,9 +109,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "527CAF62-2FF0-4BC9-A537-EE52825C7504"
|
||||
"matchCriteriaId": "17AAEA98-4C05-496E-81A7-AC031FCDDDA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -188,21 +188,23 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212146",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212147",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -217,21 +219,23 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212146",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212147",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1879",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-04-02T19:15:20.770",
|
||||
"lastModified": "2025-01-29T18:15:38.763",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -152,42 +152,48 @@
|
||||
"url": "https://support.apple.com/en-us/HT212256",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212257",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212258",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212256",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212257",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212258",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30657",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.127",
|
||||
"lastModified": "2025-01-29T18:15:40.147",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -181,28 +181,32 @@
|
||||
"url": "https://support.apple.com/en-us/HT212325",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212326",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212325",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212326",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30661",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.320",
|
||||
"lastModified": "2025-01-29T18:15:40.407",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30665",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.507",
|
||||
"lastModified": "2025-01-29T18:15:40.653",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30713",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:15.893",
|
||||
"lastModified": "2025-01-29T18:15:41.113",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -201,7 +201,8 @@
|
||||
"url": "https://support.apple.com/kb/HT212805",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -224,7 +225,8 @@
|
||||
"url": "https://support.apple.com/kb/HT212805",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30807",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-10-19T14:15:08.313",
|
||||
"lastModified": "2025-01-29T18:15:41.790",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -119,9 +119,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.7.1",
|
||||
"matchCriteriaId": "ED6899A5-1350-48D2-8B19-72C8EEF8760E"
|
||||
"matchCriteriaId": "3256DA57-B5F3-4F0A-A2E3-9B6841F500B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3549",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2021-05-26T21:15:08.347",
|
||||
"lastModified": "2024-11-21T06:21:49.000",
|
||||
"lastModified": "2025-02-28T13:15:24.940",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -135,6 +135,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0005/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3735",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-08-26T16:15:09.467",
|
||||
"lastModified": "2024-11-21T06:22:17.110",
|
||||
"lastModified": "2025-02-28T13:15:25.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -146,6 +146,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0009/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3929",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-08-25T20:15:09.417",
|
||||
"lastModified": "2024-11-21T06:22:47.740",
|
||||
"lastModified": "2025-02-28T13:15:25.913",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -191,6 +191,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHNN7QJCEQH7AQG5AQP2GEFAQE6K635I/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0010/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-22587",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-03-18T18:15:12.480",
|
||||
"lastModified": "2025-01-29T17:15:16.100",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -152,42 +152,48 @@
|
||||
"url": "https://support.apple.com/en-us/HT213053",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213054",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213055",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213053",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-22620",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-03-18T18:15:13.787",
|
||||
"lastModified": "2025-01-29T17:15:16.457",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-22674",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-05-26T18:15:09.107",
|
||||
"lastModified": "2025-01-29T17:15:16.737",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-32893",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-08-24T20:15:09.147",
|
||||
"lastModified": "2025-01-29T17:15:20.573",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-32894",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-08-24T20:15:09.193",
|
||||
"lastModified": "2025-01-29T17:15:20.847",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-32917",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-09-20T21:15:11.200",
|
||||
"lastModified": "2025-01-29T16:15:30.057",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-42856",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2022-12-15T19:15:25.123",
|
||||
"lastModified": "2025-01-28T22:15:11.590",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23529",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.710",
|
||||
"lastModified": "2025-01-28T22:15:14.157",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -137,56 +137,64 @@
|
||||
"url": "https://support.apple.com/en-us/HT213633",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213635",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213638",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213673",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213633",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213635",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213638",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213673",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28206",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-04-10T19:15:07.273",
|
||||
"lastModified": "2025-01-28T17:15:12.633",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,70 +144,80 @@
|
||||
"url": "https://support.apple.com/en-us/HT213720",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213721",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213723",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213724",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213725",
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213720",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213721",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213723",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213724",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213725",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32373",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-06-23T18:15:12.007",
|
||||
"lastModified": "2025-02-03T14:15:34.500",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34188",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T20:15:09.053",
|
||||
"lastModified": "2024-12-02T15:15:08.200",
|
||||
"lastModified": "2025-02-28T13:15:26.103",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -125,6 +125,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0001/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23222",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-23T01:15:11.500",
|
||||
"lastModified": "2025-02-03T14:15:38.223",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:53:55.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:08:51.197",
|
||||
"lastModified": "2025-02-10T23:15:13.160",
|
||||
"lastModified": "2025-02-28T13:15:26.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,6 +71,10 @@
|
||||
{
|
||||
"url": "https://github.com/esnet/iperf/releases/tag/3.17",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0007/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-36259",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2025-02-25T19:15:14.343",
|
||||
"lastModified": "2025-02-25T19:15:14.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated attackers to extract sensitive information via an oracle-based (yes/no response) crafted attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un control de acceso inadecuado en el m\u00f3dulo de correo de Odoo Community 17.0 y Odoo Enterprise 17.0 permite a atacantes autenticados remotos extraer informaci\u00f3n confidencial a trav\u00e9s de un ataque manipulado basado en or\u00e1culo (respuesta s\u00ed/no)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,12 +69,49 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:community:*:*:*",
|
||||
"matchCriteriaId": "1FF25CC4-AE0E-4F96-8708-83512BD0E249"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:odoo:odoo:17.0:*:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "1BD12AD5-9461-4AEC-A06D-0300CE27A0C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/odoo/odoo/issues/199330",
|
||||
"source": "security@odoo.com"
|
||||
"source": "security@odoo.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-23T17:15:08.400",
|
||||
"lastModified": "2024-12-24T03:15:06.727",
|
||||
"lastModified": "2025-02-28T13:15:26.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0004/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0395",
|
||||
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
|
||||
"published": "2025-01-22T13:15:20.933",
|
||||
"lastModified": "2025-02-04T20:15:49.587",
|
||||
"lastModified": "2025-02-28T13:15:26.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/01/23/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0006/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-13xx/CVE-2025-1300.json
Normal file
56
CVE-2025/CVE-2025-13xx/CVE-2025-1300.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1300",
|
||||
"sourceIdentifier": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
|
||||
"published": "2025-02-28T13:15:27.043",
|
||||
"lastModified": "2025-02-28T13:15:27.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm",
|
||||
"source": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-13xx/CVE-2025-1319.json
Normal file
64
CVE-2025/CVE-2025-13xx/CVE-2025-1319.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-1319",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T13:15:27.267",
|
||||
"lastModified": "2025-02-28T13:15:27.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Site Mailer \u2013 SMTP Replacement, Email API Deliverability & Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3247059/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/site-mailer/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fe3574-f338-474c-af78-f843501d422c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1746.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1746.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1746",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-02-28T14:15:34.943",
|
||||
"lastModified": "2025-02-28T14:15:34.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1747.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1747.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1747",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-02-28T14:15:35.480",
|
||||
"lastModified": "2025-02-28T14:15:35.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/login."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1748.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1748.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1748",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-02-28T14:15:35.617",
|
||||
"lastModified": "2025-02-28T14:15:35.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/register."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1749.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1749.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1749",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-02-28T14:15:35.760",
|
||||
"lastModified": "2025-02-28T14:15:35.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and\u00a0modifying the parameter name in /account/voucher."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-17xx/CVE-2025-1776.json
Normal file
56
CVE-2025/CVE-2025-17xx/CVE-2025-1776.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1776",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-02-28T14:15:35.943",
|
||||
"lastModified": "2025-02-28T14:15:35.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the \u2018query\u2019 parameter in /app-google-custom-search/searchResults. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-soteshop",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-222xx/CVE-2025-22270.json
Normal file
86
CVE-2025/CVE-2025-222xx/CVE-2025-22270.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-22270",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-02-28T13:15:27.447",
|
||||
"lastModified": "2025-02-28T13:15:27.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with access to the Administration panel, specifically the \"Role Management\"\ntab, can\ninject code by adding a new role in the \"name\" field. It should be noted, however, that the risk of exploiting vulnerability is reduced due to the\nrequired additional error that allows bypassing the Content-Security-Policy policy, which\nmitigates JS code execution while still allowing HTML injection.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-222xx/CVE-2025-22271.json
Normal file
86
CVE-2025/CVE-2025-222xx/CVE-2025-22271.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-22271",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-02-28T13:15:27.630",
|
||||
"lastModified": "2025-02-28T13:15:27.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application or its infrastructure allows for IP address spoofing by providing its own value in the \"X-Forwarded-For\" header. Thus, the action logging mechanism in the application loses\u00a0accountability\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-222xx/CVE-2025-22272.json
Normal file
86
CVE-2025/CVE-2025-222xx/CVE-2025-22272.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-22272",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-02-28T13:15:27.770",
|
||||
"lastModified": "2025-02-28T13:15:27.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the \"/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg\" endpoint, it is possible to inject code in the \"modalDlgMsgInternal\" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-222xx/CVE-2025-22273.json
Normal file
86
CVE-2025/CVE-2025-222xx/CVE-2025-22273.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-22273",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-02-28T13:15:27.927",
|
||||
"lastModified": "2025-02-28T13:15:27.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Application does not limit the number or frequency of user interactions, such as the number of incoming requests. At the \"/EPMUI/VfManager.asmx/ChangePassword\" endpoint it is possible to perform a brute force attack on the current password in use.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-222xx/CVE-2025-22274.json
Normal file
86
CVE-2025/CVE-2025-222xx/CVE-2025-22274.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-22274",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-02-28T13:15:28.067",
|
||||
"lastModified": "2025-02-28T13:15:28.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "It is possible to inject HTML code into the page content using the \"content\" field in the \"Application definition\" page.\n\n\nThis issue affects\u00a0CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown.\u00a0After multiple attempts to contact the vendor we did not receive any answer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2025/02/CVE-2025-22270/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.cyberark.com/epm/24.7.1/en/content/resources/_topnav/cc_home.htm",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-23046",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T18:15:27.383",
|
||||
"lastModified": "2025-02-25T18:15:27.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a \"Mail servers\" authentication provider is configured to use an Oauth connection provided by the OauthIMAP plugin, anyone can connect to GLPI using a user name on which an Oauth authorization has already been established. Version 10.0.18 contains a patch. As a workaround, one may disable any \"Mail servers\" authentication provider configured to use an Oauth connection provided by the OauthIMAP plugin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "GLPI es un paquete de software gratuito de gesti\u00f3n de activos y TI. A partir de la versi\u00f3n 9.5.0 y antes de la versi\u00f3n 10.0.18, si un proveedor de autenticaci\u00f3n de \"servidores de correo\" est\u00e1 configurado para utilizar una conexi\u00f3n Oauth proporcionada por el complemento OauthIMAP, cualquiera puede conectarse a GLPI utilizando un nombre de usuario en el que ya se haya establecido una autorizaci\u00f3n Oauth. La versi\u00f3n 10.0.18 contiene un parche. Como workaround, se puede deshabilitar cualquier proveedor de autenticaci\u00f3n de \"servidores de correo\" configurado para utilizar una conexi\u00f3n Oauth proporcionada por el complemento OauthIMAP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -67,16 +93,51 @@
|
||||
"value": "CWE-303"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.5.0",
|
||||
"versionEndExcluding": "10.0.18",
|
||||
"matchCriteriaId": "ECD4F6B5-010D-44DB-8913-DCE4AC21D3A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vfxc-qg3v-j2r5",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-23083",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-01-22T02:15:33.930",
|
||||
"lastModified": "2025-02-06T15:15:17.597",
|
||||
"lastModified": "2025-02-28T13:15:28.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0008/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24085",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:14.990",
|
||||
"lastModified": "2025-02-18T20:15:28.897",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-28T14:44:48.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-25192",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T18:15:27.583",
|
||||
"lastModified": "2025-02-25T18:15:27.583",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "GLPI es un paquete de software gratuito de gesti\u00f3n de activos y TI. Antes de la versi\u00f3n 10.0.18, un usuario con pocos privilegios pod\u00eda habilitar el modo de depuraci\u00f3n y acceder a informaci\u00f3n confidencial. La versi\u00f3n 10.0.18 contiene un parche. Como workaround, se puede eliminar el archivo `install/update.php`."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -45,16 +49,50 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.18",
|
||||
"matchCriteriaId": "233C795E-1AEA-4457-8A7A-22C9C152DCF2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.18",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-86cx-hcfc-8mm8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26465",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-18T19:15:29.230",
|
||||
"lastModified": "2025-02-19T15:15:18.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:15:28.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security-tracker.debian.org/tracker/CVE-2025-26465",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20250228-0003/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://ubuntu.com/security/CVE-2025-26465",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27110",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T20:15:37.517",
|
||||
"lastModified": "2025-02-25T20:15:37.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded HTML entities if they contains leading zeroes. Version 3.0.14 contains a fix. No known workarounds are available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Libmodsecurity es un componente del proyecto ModSecurity v3. El c\u00f3digo base de la librer\u00eda sirve como interfaz para los conectores ModSecurity que reciben tr\u00e1fico web y aplican el procesamiento tradicional de ModSecurity. Un error que existe solo en la versi\u00f3n 3.0.13 de Libmodsecurity3 significa que, en 3.0.13, Libmodsecurity3 no puede decodificar entidades HTML codificadas si contienen ceros a la izquierda. La versi\u00f3n 3.0.14 contiene una soluci\u00f3n. No se conocen workarounds disponibles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -67,16 +93,50 @@
|
||||
"value": "CWE-172"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:trustwave:modsecurity:3.0.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B30344C2-C12E-466B-BD92-A6B0A17EDC8E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/owasp-modsecurity/ModSecurity/issues/3340",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-42w7-rmv5-4x2j",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27139",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T20:15:37.693",
|
||||
"lastModified": "2025-02-25T20:15:37.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Combodo iTop is a web based IT service management tool. Versions prior to 2.7.12, 3.1.2, and 3.2.0 are vulnerable to cross-site scripting when the preferences page is opened. Versions 2.7.12, 3.1.2, and 3.2.0 fix the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Combodo iTop es una herramienta de gesti\u00f3n de servicios de TI basada en la web. Las versiones anteriores a 2.7.12, 3.1.2 y 3.2.0 son vulnerables a ataques de cross site scripting cuando se abre la p\u00e1gina de preferencias. Las versiones 2.7.12, 3.1.2 y 3.2.0 solucionan el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -47,10 +71,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.7.12",
|
||||
"matchCriteriaId": "FC277226-1ABB-4593-B14C-4910541DA298"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.1.2",
|
||||
"matchCriteriaId": "91456038-80B6-479B-BBDF-9376B9D2F100"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:alpha1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C62AC350-F938-43A2-B066-3CEF23B03C0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2E2A04B-A0E6-4906-BD91-91DAC92CC067"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24D309D2-E86C-4222-B258-C09BEEF42CD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6613DB9B-E3F9-44CC-B46A-77739060B641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C86A4B5-375A-4761-A853-AB0EED54A540"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-c6mg-9537-c8cf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27142",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T20:15:37.847",
|
||||
"lastModified": "2025-02-25T20:15:37.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T13:35:22.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LocalSend is a free, open-source app that allows users to securely share files and messages with nearby devices over their local network without needing an internet connection. Prior to version 1.17.0, due to the missing sanitization of the path in the `POST /api/localsend/v2/prepare-upload` and the `POST /api/localsend/v2/upload` endpoint, a malicious file transfer request can write files to the arbitrary location on the system, resulting in the remote command execution. A malicious file transfer request sent by nearby devices can write files into an arbitrary directory. This usually allows command execution via the startup folder on Windows or Bash-related files on Linux. If the user enables the `Quick Save` feature, it will silently write files without explicit user interaction. Version 1.17.0 fixes this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LocalSend es una aplicaci\u00f3n gratuita de c\u00f3digo abierto que permite a los usuarios compartir archivos y mensajes de forma segura con dispositivos cercanos a trav\u00e9s de su red local sin necesidad de una conexi\u00f3n a Internet. Antes de la versi\u00f3n 1.17.0, debido a la falta de depuraci\u00f3n de la ruta en el endpoint `POST /api/localsend/v2/prepare-upload` y `POST /api/localsend/v2/upload`, una solicitud de transferencia de archivos maliciosa puede escribir archivos en una ubicaci\u00f3n arbitraria en el sistema, lo que da como resultado la ejecuci\u00f3n remota del comando. Una solicitud de transferencia de archivos maliciosa enviada por dispositivos cercanos puede escribir archivos en un directorio arbitrario. Esto generalmente permite la ejecuci\u00f3n de comandos a trav\u00e9s de la carpeta de inicio en Windows o archivos relacionados con Bash en Linux. Si el usuario habilita la funci\u00f3n `Guardado r\u00e1pido`, escribir\u00e1 archivos de forma silenciosa sin interacci\u00f3n expl\u00edcita del usuario. La versi\u00f3n 1.17.0 corrige este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "UNREPORTED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -69,14 +95,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:localsend:localsend:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.17.0",
|
||||
"matchCriteriaId": "99B665EA-3DCE-4331-ACFE-C4A38FCF8D1B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/localsend/localsend/commit/e8635204ec782ded45bc7d698deb60f3c4105687",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/localsend/localsend/security/advisories/GHSA-f7jp-p6j4-3522",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
65
README.md
65
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-28T11:00:19.209665+00:00
|
||||
2025-02-28T15:00:20.043026+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-28T10:15:09.963000+00:00
|
||||
2025-02-28T14:53:55.297000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,37 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
283502
|
||||
283514
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-10860](CVE-2024/CVE-2024-108xx/CVE-2024-10860.json) (`2025-02-28T10:15:09.963`)
|
||||
- [CVE-2024-13469](CVE-2024/CVE-2024-134xx/CVE-2024-13469.json) (`2025-02-28T09:15:09.823`)
|
||||
- [CVE-2024-13638](CVE-2024/CVE-2024-136xx/CVE-2024-13638.json) (`2025-02-28T09:15:10.043`)
|
||||
- [CVE-2024-13716](CVE-2024/CVE-2024-137xx/CVE-2024-13716.json) (`2025-02-28T09:15:10.223`)
|
||||
- [CVE-2024-13831](CVE-2024/CVE-2024-138xx/CVE-2024-13831.json) (`2025-02-28T09:15:10.400`)
|
||||
- [CVE-2024-13832](CVE-2024/CVE-2024-138xx/CVE-2024-13832.json) (`2025-02-28T09:15:10.570`)
|
||||
- [CVE-2024-13851](CVE-2024/CVE-2024-138xx/CVE-2024-13851.json) (`2025-02-28T09:15:10.733`)
|
||||
- [CVE-2024-8420](CVE-2024/CVE-2024-84xx/CVE-2024-8420.json) (`2025-02-28T09:15:10.910`)
|
||||
- [CVE-2024-8425](CVE-2024/CVE-2024-84xx/CVE-2024-8425.json) (`2025-02-28T09:15:11.083`)
|
||||
- [CVE-2024-9019](CVE-2024/CVE-2024-90xx/CVE-2024-9019.json) (`2025-02-28T09:15:11.270`)
|
||||
- [CVE-2024-9193](CVE-2024/CVE-2024-91xx/CVE-2024-9193.json) (`2025-02-28T09:15:11.437`)
|
||||
- [CVE-2024-9195](CVE-2024/CVE-2024-91xx/CVE-2024-9195.json) (`2025-02-28T09:15:11.633`)
|
||||
- [CVE-2025-1413](CVE-2025/CVE-2025-14xx/CVE-2025-1413.json) (`2025-02-28T09:15:11.850`)
|
||||
- [CVE-2025-1560](CVE-2025/CVE-2025-15xx/CVE-2025-1560.json) (`2025-02-28T09:15:12.040`)
|
||||
- [CVE-2025-1570](CVE-2025/CVE-2025-15xx/CVE-2025-1570.json) (`2025-02-28T09:15:12.203`)
|
||||
- [CVE-2025-1662](CVE-2025/CVE-2025-16xx/CVE-2025-1662.json) (`2025-02-28T09:15:12.373`)
|
||||
- [CVE-2025-22491](CVE-2025/CVE-2025-224xx/CVE-2025-22491.json) (`2025-02-28T09:15:12.540`)
|
||||
- [CVE-2025-22492](CVE-2025/CVE-2025-224xx/CVE-2025-22492.json) (`2025-02-28T09:15:12.680`)
|
||||
- [CVE-2025-1300](CVE-2025/CVE-2025-13xx/CVE-2025-1300.json) (`2025-02-28T13:15:27.043`)
|
||||
- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-02-28T13:15:27.267`)
|
||||
- [CVE-2025-1746](CVE-2025/CVE-2025-17xx/CVE-2025-1746.json) (`2025-02-28T14:15:34.943`)
|
||||
- [CVE-2025-1747](CVE-2025/CVE-2025-17xx/CVE-2025-1747.json) (`2025-02-28T14:15:35.480`)
|
||||
- [CVE-2025-1748](CVE-2025/CVE-2025-17xx/CVE-2025-1748.json) (`2025-02-28T14:15:35.617`)
|
||||
- [CVE-2025-1749](CVE-2025/CVE-2025-17xx/CVE-2025-1749.json) (`2025-02-28T14:15:35.760`)
|
||||
- [CVE-2025-1776](CVE-2025/CVE-2025-17xx/CVE-2025-1776.json) (`2025-02-28T14:15:35.943`)
|
||||
- [CVE-2025-22270](CVE-2025/CVE-2025-222xx/CVE-2025-22270.json) (`2025-02-28T13:15:27.447`)
|
||||
- [CVE-2025-22271](CVE-2025/CVE-2025-222xx/CVE-2025-22271.json) (`2025-02-28T13:15:27.630`)
|
||||
- [CVE-2025-22272](CVE-2025/CVE-2025-222xx/CVE-2025-22272.json) (`2025-02-28T13:15:27.770`)
|
||||
- [CVE-2025-22273](CVE-2025/CVE-2025-222xx/CVE-2025-22273.json) (`2025-02-28T13:15:27.927`)
|
||||
- [CVE-2025-22274](CVE-2025/CVE-2025-222xx/CVE-2025-22274.json) (`2025-02-28T13:15:28.067`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `52`
|
||||
|
||||
- [CVE-2021-3929](CVE-2021/CVE-2021-39xx/CVE-2021-3929.json) (`2025-02-28T13:15:25.913`)
|
||||
- [CVE-2022-22587](CVE-2022/CVE-2022-225xx/CVE-2022-22587.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2022-22674](CVE-2022/CVE-2022-226xx/CVE-2022-22674.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32893](CVE-2022/CVE-2022-328xx/CVE-2022-32893.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32894](CVE-2022/CVE-2022-328xx/CVE-2022-32894.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32917](CVE-2022/CVE-2022-329xx/CVE-2022-32917.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-42856](CVE-2022/CVE-2022-428xx/CVE-2022-42856.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-32373](CVE-2023/CVE-2023-323xx/CVE-2023-32373.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2025-02-28T13:15:26.103`)
|
||||
- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2024-26306](CVE-2024/CVE-2024-263xx/CVE-2024-26306.json) (`2025-02-28T13:15:26.423`)
|
||||
- [CVE-2024-36259](CVE-2024/CVE-2024-362xx/CVE-2024-36259.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2024-40896](CVE-2024/CVE-2024-408xx/CVE-2024-40896.json) (`2025-02-28T13:15:26.640`)
|
||||
- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-02-28T13:15:26.860`)
|
||||
- [CVE-2025-23046](CVE-2025/CVE-2025-230xx/CVE-2025-23046.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-28T13:15:28.213`)
|
||||
- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-28T13:15:28.343`)
|
||||
- [CVE-2025-27110](CVE-2025/CVE-2025-271xx/CVE-2025-27110.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-27139](CVE-2025/CVE-2025-271xx/CVE-2025-27139.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-27142](CVE-2025/CVE-2025-271xx/CVE-2025-27142.json) (`2025-02-28T13:35:22.340`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
152
_state.csv
152
_state.csv
@ -87889,8 +87889,8 @@ CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e9989
|
||||
CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000
|
||||
CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000
|
||||
CVE-2016-4655,0,0,f3b2e2852359ec879f695defe2b724c840abee2b548d4c99ea49aea75b4f9d75,2025-02-04T21:03:31.853000
|
||||
CVE-2016-4656,0,0,6b8e93efa2f3b341f868374fef4c7665f6085e6b4e46caa142197dd48725eb61,2025-01-29T18:15:27.380000
|
||||
CVE-2016-4657,0,0,1f5e6d7026c58963dfa2ee71582fca099d1f6565144273674f6abc62b8d57654,2025-01-29T18:15:27.607000
|
||||
CVE-2016-4656,0,1,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000
|
||||
CVE-2016-4657,0,1,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000
|
||||
CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000
|
||||
CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000
|
||||
CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000
|
||||
@ -122903,7 +122903,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074
|
||||
CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000
|
||||
CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000
|
||||
CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000
|
||||
CVE-2018-4344,0,0,0ebf7fdb284e8fcca9487503c18023eb6b04770a9916e35aff39f451f4f4a4fe,2025-01-29T18:15:30.723000
|
||||
CVE-2018-4344,0,1,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000
|
||||
CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000
|
||||
CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000
|
||||
CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000
|
||||
@ -141290,7 +141290,7 @@ CVE-2019-6219,0,0,51fb8aba06c50f5beb34035c1b242a41d19be52942c31c18d7c2bc7a8531d9
|
||||
CVE-2019-6220,0,0,cbf2407952b07ecf4492f093b5fc103d1b2a227a81b385b9faca3d2d185c14eb,2024-11-21T04:46:15.033000
|
||||
CVE-2019-6221,0,0,f50ee778054e49605f683211032acfa21388b43f0c6177a6b438d11f78a69b76,2024-11-21T04:46:15.137000
|
||||
CVE-2019-6222,0,0,b2e119bf8c2ad53cb80edcff569884b3877b26f333c41130791c9bc95e585fe3,2024-11-21T04:46:15.247000
|
||||
CVE-2019-6223,0,0,9d883246b1ec0be5d49c24ab92d25139a32b2a819593f01103f58f708707863d,2025-01-29T18:15:32.017000
|
||||
CVE-2019-6223,0,1,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000
|
||||
CVE-2019-6224,0,0,ecfbf121a69bfc82d1550f3281adf5d3bf177bace8e5f517f9f0d32509cf5d40,2024-11-21T04:46:15.460000
|
||||
CVE-2019-6225,0,0,ce41491fd66792659c0d145bd85753c0d55c4ec7b1ab133ce86b89f9ab9f2ca5,2024-11-21T04:46:15.573000
|
||||
CVE-2019-6226,0,0,2aa666681d279cd3af63767890ce00e7894e99d62118a90ff3d1b5e4f08ebd09,2024-11-21T04:46:15.687000
|
||||
@ -142061,7 +142061,7 @@ CVE-2019-7283,0,0,feffafb71756ca36d7ebb5e5732cf21c65af1eef8b0b4a000a01722bcbf9d7
|
||||
CVE-2019-7284,0,0,4f4944ffaef6b9ae94cd5db36f56541cb3730404bdacdc17a02e650c89f80cde,2024-11-21T04:47:55.540000
|
||||
CVE-2019-7285,0,0,313d5b7c9ac5d469845e6bfae8fac9cde4a21e9607c8aa24344fef7be804554b,2024-11-21T04:47:55.650000
|
||||
CVE-2019-7286,0,0,02a5092dc2c9edee56617f9cb1cc06cefc2fe17bcd4f6e2cc3426d833d26be53,2025-01-29T18:15:32.340000
|
||||
CVE-2019-7287,0,0,bc38e2972d1248e1a2cccc2b2086ae65a7b793070aa65ce830377e1a1af6e5d9,2025-01-29T18:15:32.647000
|
||||
CVE-2019-7287,0,1,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000
|
||||
CVE-2019-7288,0,0,37259472abe9a71efd7ecb7947dce39a94a93ee4f5a3fc21f4b31239799bffb6,2024-11-21T04:47:56.020000
|
||||
CVE-2019-7289,0,0,490b84305deba02cd9c12685d90ff374698a1976137c62fa8dacb278f2a4b4ee,2024-11-21T04:47:56.150000
|
||||
CVE-2019-7290,0,0,364d38b1b25fabde5737927c410b77a3a82901e5520f715924a529b21f8dd778,2024-11-21T04:47:56.273000
|
||||
@ -142971,7 +142971,7 @@ CVE-2019-8502,0,0,c434befa76a4d4ec9f96079a6522d800615fb7b5a48ac54913486401cebb09
|
||||
CVE-2019-8503,0,0,0fa026e8d1f022ec049b1ca9e49137afb60072dff1e8e2dd72b28d15c80c7f81,2024-11-21T04:49:57.480000
|
||||
CVE-2019-8504,0,0,dbc06dfdb448c3a4a5038f7f7fffd2ddbd9e83bd6911705199749c704ab21b6d,2024-11-21T04:49:57.607000
|
||||
CVE-2019-8505,0,0,e1a01ac4804c5cc3e2fc73634b47f99331a6a4ce7a7c3c2bbfed7c9969ad3586,2024-11-21T04:49:57.723000
|
||||
CVE-2019-8506,0,0,2d186e5c5b41823a2f5e28dec7b50cb5796214e779a514c012f86a7bb9b7c36b,2025-01-29T18:15:32.920000
|
||||
CVE-2019-8506,0,1,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8507,0,0,b01ebef1a03939c2e3ada65de3c55f419e29cf0247c08ea4d212b6b10f7b019d,2024-11-21T04:49:57.980000
|
||||
CVE-2019-8508,0,0,cef14e0810b1e31a960bc6e50e6e7aba1a448ffacb5ba344f9c35735a88a9bf6,2024-11-21T04:49:58.090000
|
||||
CVE-2019-8509,0,0,ec37506e1999ed61157738d5e3cb9f41d210f01cd362d5aea688c39cd5258611,2024-11-21T04:49:58.203000
|
||||
@ -142991,7 +142991,7 @@ CVE-2019-8522,0,0,0eae3335c616182d312f36c43cae51aa49706785a5e522721af70477311a7b
|
||||
CVE-2019-8523,0,0,58aaa978a7e9de77277ba3f7bc706507334d4693bd0c5521150bdec55490072c,2024-11-21T04:49:59.800000
|
||||
CVE-2019-8524,0,0,32c4b83ccc7f0a278121313d1e2f9075e195d072f0b93eabeb1707ea8b920726,2024-11-21T04:49:59.923000
|
||||
CVE-2019-8525,0,0,6ecd93b661cfa469f49d67d3496d956460a9b9f18cdb8779c33e292274db4eb8,2024-11-21T04:50:00.047000
|
||||
CVE-2019-8526,0,0,509693adc838651d0d042870c94bf184cab080bab93309355db0348fa208ec57,2025-01-29T18:15:33.430000
|
||||
CVE-2019-8526,0,1,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8527,0,0,7f47548387851680e5a961a6246e9e3c27175977bb648565dd45c6a5b3234b0e,2024-11-21T04:50:00.290000
|
||||
CVE-2019-8528,0,0,1639b73f58d13f7ed0ff712ed4ffad30e15b2bab49d4978d2759cd12fc2ee8e7,2024-11-21T04:50:00.423000
|
||||
CVE-2019-8529,0,0,cf361ae2751882bf4341036b0cfea24f00b715e4dc1d6ea3088e8dd4127f4153,2024-11-21T04:50:00.540000
|
||||
@ -143068,7 +143068,7 @@ CVE-2019-8601,0,0,5e1b649cd76c28875d6e8e75de505e8524898c98238cb4a152590695820ca2
|
||||
CVE-2019-8602,0,0,dfd4f0ad81cd404bc76b02e5763cbcb73de09c2d34cedf9136b1b93dd3c3c1d3,2024-11-21T04:50:09.217000
|
||||
CVE-2019-8603,0,0,397ffd36d4e84c621cf449a9fe68c20353e9e5a5e6eeb155fe03bdbf21382c50,2024-11-21T04:50:09.353000
|
||||
CVE-2019-8604,0,0,a865afc630f7beaf44df56caaf7efbc7bcf793b8a0a6e8a16c85b32c7369a571,2024-11-21T04:50:09.463000
|
||||
CVE-2019-8605,0,0,975802f92e9240931c408c5a9bf6cbb512952feda27cc0dd63ee06019f24fd53,2025-01-29T18:15:34.143000
|
||||
CVE-2019-8605,0,1,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8606,0,0,9d793373058d23a812a6cec3d9e2bdd104d6ee9c23a4401600c30545293a6e9d,2024-11-21T04:50:09.690000
|
||||
CVE-2019-8607,0,0,7ac0d064c6b42563e8682aff1dcfab6f7183e1d42a575096d72bb934c174f4b5,2024-11-21T04:50:09.797000
|
||||
CVE-2019-8608,0,0,db9ceb00c77dadef8090d297e1f1d19a2d5eb960a616fdf84109118f8a2fb620,2024-11-21T04:50:09.923000
|
||||
@ -156758,7 +156758,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365
|
||||
CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000
|
||||
CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000
|
||||
CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000
|
||||
CVE-2020-27950,0,0,556c7abc643a7c2ecd5395a7b6350ac53020516c58d1bca8846382164ba26531,2025-01-29T18:15:34.950000
|
||||
CVE-2020-27950,0,1,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000
|
||||
CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000
|
||||
CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000
|
||||
CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000
|
||||
@ -159728,7 +159728,7 @@ CVE-2020-3833,0,0,e764dc5cfbb8f637552b2441e9ddb593562a3918809b4c677bb07276f1f37b
|
||||
CVE-2020-3834,0,0,3e772505e33e0e780d0ee45c96850de3b9441fb84529cb87198cfe1cd9457c55,2024-11-21T05:31:48.527000
|
||||
CVE-2020-3835,0,0,cdcfa07a09a472bd33c6fad2c5ebc47f55b7047cf8a668f3558757ee2f0554ef,2024-11-21T05:31:48.627000
|
||||
CVE-2020-3836,0,0,26198ab0a7a09181b9daabad3d9d21eadd74796c73b69cca8eeebfe42cc70abc,2024-11-21T05:31:48.737000
|
||||
CVE-2020-3837,0,0,fca801b68f3c5db6c7dbaa03bcf0c1f5b386db698cb29a672fddb4a339c03092,2025-01-29T18:15:35.193000
|
||||
CVE-2020-3837,0,1,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000
|
||||
CVE-2020-3838,0,0,8d1784baae371177f9d969f0cf7d2c32eccd6737302888ee0e7d97c3ed35fe4e,2024-11-21T05:31:48.980000
|
||||
CVE-2020-3839,0,0,cce4070eb0b58eef19224cd877e2e6dd6b8f5e237e9f84b7c9bae85d5ed0c879,2024-11-21T05:31:49.107000
|
||||
CVE-2020-3840,0,0,514e04d2cf82acf4eded7fae4a5294fb412c6b1287f03b9bf0112344f66a3086,2024-11-21T05:31:49.210000
|
||||
@ -164696,8 +164696,8 @@ CVE-2020-9814,0,0,39d23ae595854756548268c04031dd78beb4f4daf7ec7db61e365f2b36b9a1
|
||||
CVE-2020-9815,0,0,a003a768ee0eea54e269add860f10e3abee748e6ca2781978085f4f2ae41bb71,2024-11-21T05:41:20.167000
|
||||
CVE-2020-9816,0,0,ead57dd330ea3372df51f17718a1057a151f35f4442acd93f18839173d58f970,2024-11-21T05:41:20.270000
|
||||
CVE-2020-9817,0,0,6451091f69be5568064f6c8a083aedc1278642490c4a281b5e17f6d40ca1424c,2024-11-21T05:41:20.380000
|
||||
CVE-2020-9818,0,0,0a6b4fd4c9817281cd239ede844044abc4a89e50bf7f626e25184814fc660e1f,2025-01-29T18:15:36.303000
|
||||
CVE-2020-9819,0,0,7f9be409e946b80d7f4a3bf93ed6180ab9f91957b4354ed16ab6baa7137f96ba,2025-01-29T18:15:36.543000
|
||||
CVE-2020-9818,0,1,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9819,0,1,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9820,0,0,4fdad7d17b8d9bbdef875e36d0061295507fa69ba2f8dbd3a4a1d39c55b0a586,2024-11-21T05:41:20.713000
|
||||
CVE-2020-9821,0,0,07529420971d10ff2bbfd70ddd9990d24f55005291e73adea0637f70f81b6285,2024-11-21T05:41:20.820000
|
||||
CVE-2020-9822,0,0,dd0bacca6d947be1747310d2122b048f784f56925b7be141e555edeaa848edf0,2024-11-21T05:41:20.927000
|
||||
@ -164735,7 +164735,7 @@ CVE-2020-9855,0,0,f62de7238477aea93f3abf3ab8ea2dfc400975c6489e15199db3b3de03a472
|
||||
CVE-2020-9856,0,0,e48989f32d60137c0edc8a02e834ea84cd4505ab62440e90630bb6ca0255475d,2024-11-21T05:41:25.117000
|
||||
CVE-2020-9857,0,0,4564f37640cf033d502580176544c1ca67b90e10b289096385a5ce052561a423,2024-11-21T05:41:25.217000
|
||||
CVE-2020-9858,0,0,365f269021dc2690a80c7be2353be85740b98a3c242d31c022e2f1ae9fd07a21,2024-11-21T05:41:25.317000
|
||||
CVE-2020-9859,0,0,7e28dad45e9033af1f8077992e0bbb55c2e7be78d4dca218832de395074bffcb,2025-01-29T18:15:36.767000
|
||||
CVE-2020-9859,0,1,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9860,0,0,6d689ddd768a7729996307cbe7c2aa5b1d09bcc559832a4fec10fff8c58a23c6,2024-11-21T05:41:25.513000
|
||||
CVE-2020-9861,0,0,5c800faea68343bf58424d7e251e1c13d6dc6d14a61816a5cf1f99cb4d5b1992,2024-11-21T05:41:25.610000
|
||||
CVE-2020-9862,0,0,b6f03288f468f0d4024a3988e42405a25e797fb0852093161144538c7e8105b3,2024-11-21T05:41:25.710000
|
||||
@ -164780,7 +164780,7 @@ CVE-2020-9903,0,0,fd8ba9246c03cf84ed34090daa738b1e21ec1682f0f8cda6dedaa4761c5864
|
||||
CVE-2020-9904,0,0,5fdc6e10d2f1f01c714b258e99f79acbd6194e185af91fb066f25cb2d75768c4,2024-11-21T05:41:30.013000
|
||||
CVE-2020-9905,0,0,b68cf578fe49078f790bcf44e5ff24959136d2e396535b0c2537b5b0ffecaa75,2024-11-21T05:41:30.123000
|
||||
CVE-2020-9906,0,0,166cedb6a95dee0a53a40439951152b4c6ffba0b89929eb32a8c66f410558976,2024-11-21T05:41:30.230000
|
||||
CVE-2020-9907,0,0,f6170df5d41ab61e761e6ef9b9f9e4638f017e5a0e53e54c567afe5566a4a6c0,2025-01-29T18:15:36.987000
|
||||
CVE-2020-9907,0,1,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9908,0,0,06606ab1c2077a54e1320041f575a636b9cd10146870b40c63b7a42243148093,2024-11-21T05:41:30.437000
|
||||
CVE-2020-9909,0,0,db45329d72cab554faea03693de3ea5691e4845af8f9053ecf8a8d9d2e894736,2024-11-21T05:41:30.537000
|
||||
CVE-2020-9910,0,0,eacc185ba0c7ff3cc1d990c8fea0abc7edb47327ee8ca9ee20d8023e0c9a1f62,2024-11-21T05:41:30.647000
|
||||
@ -164807,7 +164807,7 @@ CVE-2020-9930,0,0,6e27c898f04c57974ee33a6efc19d92b2d388cd1a02ee2fa6c053c46a67dc9
|
||||
CVE-2020-9931,0,0,f8db6056ab6e7b000a860597155fbc28fbf14076d94aef57849ea84edb033dec,2024-11-21T05:41:32.923000
|
||||
CVE-2020-9932,0,0,d4ac093d8a0c5c44ead5f82d1790e5da018a7c279ee0812a2e45de174844d665,2024-11-21T05:41:33.040000
|
||||
CVE-2020-9933,0,0,b1ac39dc4c32bae5f3c1adcbaa421d06f55965e5d7f7c3871b963dbc0c4a1561,2024-11-21T05:41:33.153000
|
||||
CVE-2020-9934,0,0,efbba8dc113158e9ca16065a30f87570f84b9caac86f51e41268eadba30b0c1b,2025-01-29T18:15:37.463000
|
||||
CVE-2020-9934,0,1,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9935,0,0,8c8962420a06ea8b9704251fdd323828ea6570405c8d4526638213ce066ddf64,2024-11-21T05:41:33.400000
|
||||
CVE-2020-9936,0,0,3f0520c5f2eface2c145c0dc6c279d5078dc8e79c797e1a3ffd2befbb5d1d782,2024-11-21T05:41:33.513000
|
||||
CVE-2020-9937,0,0,d572deb06e95e84154ea8a51424aa07761fb2c381fd1bef9008c747db6755e1f,2024-11-21T05:41:33.633000
|
||||
@ -166431,14 +166431,14 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943
|
||||
CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000
|
||||
CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000
|
||||
CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000
|
||||
CVE-2021-1782,0,0,9640394dec9240447d322c0fcc8c8fa12032706c604a8d898340500829c44c28,2025-02-03T14:15:30.590000
|
||||
CVE-2021-1782,0,1,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000
|
||||
CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000
|
||||
CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000
|
||||
CVE-2021-1786,0,0,844528cd02ae52e41c72912ba3abea868e3a31a8ead52c9afc5203d16bdb7bdd,2024-11-21T05:45:06.603000
|
||||
CVE-2021-1787,0,0,2fed3cae125c2895dac1e44fd837f817f5b5e70f63daf568baaa5ea04f53dd36,2024-11-21T05:45:06.733000
|
||||
CVE-2021-1788,0,0,7cd9b9e8fd97ec6f34bcc85b8d8ae756cef050deec7f91d8bdd5e69f3ff22f38,2024-11-21T05:45:06.860000
|
||||
CVE-2021-1789,0,0,c004dfc7eeff6175896981e01a28c69633721046232580ca43348bf2f1072efb,2025-01-29T18:15:37.707000
|
||||
CVE-2021-1789,0,1,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1790,0,0,453727956bec9f85809fc98d61ce3827a48322b65c0a1308fdd19254e25b7d46,2024-11-21T05:45:07.223000
|
||||
CVE-2021-1791,0,0,0858d7a66d6852664ff89bbf6b3f6519588dcf813a61680a95653c00c4525806,2024-11-21T05:45:07.340000
|
||||
CVE-2021-1792,0,0,5ffc2bf1833bc5c8fb2e4843cb4db95b9711424cf4aab2d2cc4aaf61cb70cd0c,2024-11-21T05:45:07.477000
|
||||
@ -166509,8 +166509,8 @@ CVE-2021-1864,0,0,e61bb78daa00b5dca2e6f100a892bda75d87a592b9962975d78c060881b491
|
||||
CVE-2021-1865,0,0,d4d8e0986b62bedaab54dbcf207c7ced93d3d91287ee0883bce3ef5ceb5d3d36,2024-11-21T05:45:15.390000
|
||||
CVE-2021-1867,0,0,88725f08a5e44d02242ea72ac07f37bb9e06618f3cd63825dbd1ad8b63b8cb04,2024-11-21T05:45:15.513000
|
||||
CVE-2021-1868,0,0,432a8d063e46b26199a2f940e4c6839746a15a330270af8952a5e97a5f7524ac,2024-11-21T05:45:15.640000
|
||||
CVE-2021-1870,0,0,d434766c45b29fda9e41cc583afd3868829a56fd8ab0c14185ce14d845c02e13,2025-01-29T18:15:38.170000
|
||||
CVE-2021-1871,0,0,84eee7c16e8cacc0aabd1c3c654a774c68a8e0d47e9bd1699ed5d36b79d1ad2c,2025-01-29T18:15:38.527000
|
||||
CVE-2021-1870,0,1,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1871,0,1,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1872,0,0,4aad0f7c4f760558662da2aa02617c0ae0669394f36c9abb206cff7b5c7e6f77,2024-11-21T05:45:16.040000
|
||||
CVE-2021-1873,0,0,f647da70e48b4a0e757dc32d4da6a78ccdcb576a528532094359d47a435eae89,2024-11-21T05:45:16.153000
|
||||
CVE-2021-1874,0,0,11acb083af68bc66cbb55a31d610911ff9e1492756cdefbcf79bd2d863878bb4,2024-11-21T05:45:16.287000
|
||||
@ -166518,7 +166518,7 @@ CVE-2021-1875,0,0,a763019d62a197757c122cba7e6ec2caf0210e0fc06c38570a6774aace7636
|
||||
CVE-2021-1876,0,0,50e3e6073a13251685729089e5f9b48623129fa60396e005f85f8948fe4b1930,2024-11-21T05:45:16.527000
|
||||
CVE-2021-1877,0,0,78167aec1738ed934a9db101730f2475d220aa596ff08cccd6d82eadaaf3136f,2024-11-21T05:45:16.647000
|
||||
CVE-2021-1878,0,0,bbc94e824fa34a03db5d35e1bbb0245d5ebeb5ba4878c0691539ed3e105efdd0,2024-11-21T05:45:16.777000
|
||||
CVE-2021-1879,0,0,616b8acee0c4a4089cfb86767368ae744bfd144228a7d22a9f357dc714753af7,2025-01-29T18:15:38.763000
|
||||
CVE-2021-1879,0,1,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1880,0,0,f21767cc17b0b400ea36769c68e9dc0fc94bd57122b1b556aeb6342108dfd313,2024-11-21T05:45:17.023000
|
||||
CVE-2021-1881,0,0,71d96589a667db4e83dea8a9b9340b5dda8ce4877b845ef6e86d23e76d807867,2024-11-21T05:45:17.143000
|
||||
CVE-2021-1882,0,0,0de80653eb0cc938d031bd299bc26b6178d33ea21b4b167b4804efdfdc78bad9,2024-11-21T05:45:17.280000
|
||||
@ -175042,15 +175042,15 @@ CVE-2021-30653,0,0,af6209998169bf0b59156640376c5ebe8e7a91975ee599eee6d8c80cb5bdb
|
||||
CVE-2021-30654,0,0,d454b5e9d0444f22c1324170868a7170e32ba4142b3b3d1feb9e8f43129b786d,2024-11-21T06:04:22.110000
|
||||
CVE-2021-30655,0,0,c5bd87f283bc66de8cf6a1dccdc1113eb65e46ccaaed5eff9fd5299b957c5164,2024-11-21T06:04:22.250000
|
||||
CVE-2021-30656,0,0,4f25be990cd3e56338347956b5cd16bd2d8602e91cf11f5de83660e31c7f84bc,2024-11-21T06:04:22.390000
|
||||
CVE-2021-30657,0,0,fb44ce6127b84e2972754757c9cafae4407a783322080764095a401bbf138df6,2025-01-29T18:15:40.147000
|
||||
CVE-2021-30657,0,1,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30658,0,0,a7e6ce534983d6265ea77dbc37d43cd7f21d26f66f7c40d693487b5c676730f2,2024-11-21T06:04:22.637000
|
||||
CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257775,2024-11-21T06:04:22.750000
|
||||
CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000
|
||||
CVE-2021-30661,0,0,0441a5ee2f1c64ac124688d9a4989971589017aaa8f192870617e176c24a7fb5,2025-01-29T18:15:40.407000
|
||||
CVE-2021-30661,0,1,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000
|
||||
CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000
|
||||
CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000
|
||||
CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000
|
||||
CVE-2021-30665,0,1,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000
|
||||
CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000
|
||||
CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000
|
||||
@ -175096,7 +175096,7 @@ CVE-2021-30708,0,0,0d4ef740951de9fa3c7d46cd5d922d5031082b03c36b68901042a25459d7b
|
||||
CVE-2021-30709,0,0,ac4f597f103d40c646c9a37992122e647523ecf1a80c9ea7d0cad044139adf79,2024-11-21T06:04:29.733000
|
||||
CVE-2021-30710,0,0,6f9138aff87c816b5801441de245256cd714004b0c7fe4d082b9380d78dbecf5,2024-11-21T06:04:29.883000
|
||||
CVE-2021-30712,0,0,fd76d4bdea30f6917b1b4272719a88821011e5d27fc4ee0c3f5302060e454266,2024-11-21T06:04:30.037000
|
||||
CVE-2021-30713,0,0,8e63e2cc66911ac2ec90c97ba675bccac6c03fa0b5016f8a0c0391722caafbde,2025-01-29T18:15:41.113000
|
||||
CVE-2021-30713,0,1,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30714,0,0,1ac3cdebf872ac967c92c82c1f293c834ed9a9b2a9af3cbda73ed47dcff3c59f,2024-11-21T06:04:30.317000
|
||||
CVE-2021-30715,0,0,8526fff9426684bf5994f2385d0e54f12e8042c43b974b959d854ca5cfd03af8,2024-11-21T06:04:30.440000
|
||||
CVE-2021-30716,0,0,1351521f863a9be568843ed0717057da020860858dd82d7d962e25e477f48e69,2024-11-21T06:04:30.573000
|
||||
@ -175183,7 +175183,7 @@ CVE-2021-30802,0,0,d3af46ce2f497920c6024a63ea8ea8888c260d90da7eb1da62c0463dfa869
|
||||
CVE-2021-30803,0,0,da6c846ff7628e171742041c5c4f2a9ae56f35437b19a5957ae69acd101f42a1,2024-11-21T06:04:45.030000
|
||||
CVE-2021-30804,0,0,a8448168f3c60c9210c3b99df09e33ba1abc83f92b034856b3391f42be985878,2024-11-21T06:04:45.140000
|
||||
CVE-2021-30805,0,0,a45ac4492d17d042337985687b2b1544cdce5f65bc715a78eaef4fca60b02db2,2024-11-21T06:04:45.257000
|
||||
CVE-2021-30807,0,0,0e7093db2c5e86c9f0cb74e511d98fae397ddfa9a2fe25b13d4152ca3573f4b0,2025-01-29T18:15:41.790000
|
||||
CVE-2021-30807,0,1,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30808,0,0,7332f9b25719fd725098c6e1a14e50d288895c73b1d9691fc7752d3662d18d33,2024-11-21T06:04:45.500000
|
||||
CVE-2021-30809,0,0,9faa62183c613ce8119ed921c618805568e2bfada6377a76f91a8e0d329247cf,2024-11-21T06:04:45.630000
|
||||
CVE-2021-30810,0,0,0e59876a610502b4445f0847e17025234c0f485bc63ceb2d065709a0d4be2e41,2024-11-21T06:04:45.760000
|
||||
@ -178812,7 +178812,7 @@ CVE-2021-35482,0,0,5b472310c7c4047d6c33038218d864d04f51f66e4d51e1cb7991026a14c61
|
||||
CVE-2021-35487,0,0,331ce5b429413f54a5bdb9718850b6786d3b058d3cbb6312518d5ffedf213af6,2024-11-21T06:12:21.600000
|
||||
CVE-2021-35488,0,0,e65262e0a1c1d0504b83abe345c410bff84cdfb7fa7e3e92be53ed427da99d9b,2024-11-21T06:12:21.740000
|
||||
CVE-2021-35489,0,0,53bce953b714dca045a33c64982814f760f224a2cdd4b57395f881b88326173d,2024-11-21T06:12:21.887000
|
||||
CVE-2021-3549,0,0,511a2b4d93db9cefb38aa79d5d4224d8dc433d1a5d39d3ed3f732f52c19f733c,2024-11-21T06:21:49
|
||||
CVE-2021-3549,0,1,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000
|
||||
CVE-2021-35490,0,0,8518f891efcd6e2c5ff624523dd1d73b81408947a5d2a6dceb5053db70504775,2024-11-21T06:12:22.030000
|
||||
CVE-2021-35491,0,0,f4dc4e73cd732408245742225cf63817e06513f351fcb7db023db8d554876caa,2024-11-21T06:12:22.200000
|
||||
CVE-2021-35492,0,0,c1d7bd87fad0c3e28378adc00aafab61674ebaa8678be1c7775d09b09a4bb35b,2024-11-21T06:12:22.410000
|
||||
@ -180102,7 +180102,7 @@ CVE-2021-37346,0,0,946b92ddc4fbe8315c7d41ff29ec3fe6897aba5d320afff2a62bc560a60f7
|
||||
CVE-2021-37347,0,0,3b9e777c10e939bdebc4042602b6811e52742ff1bb9cf92b7d4c7384ff6b0b30,2024-11-21T06:14:59.177000
|
||||
CVE-2021-37348,0,0,ca272066b16ec187cad70b4e87c46a9e6652a909d15aa5859776a09d1693fbd9,2024-11-21T06:14:59.330000
|
||||
CVE-2021-37349,0,0,08392ea9c36b212d62ac5ffcca309c8a34443a89420b70fa89a06ba97b793121,2024-11-21T06:14:59.490000
|
||||
CVE-2021-3735,0,0,d11deed3412556bac03f1c6e16e8c2a8c0c5c98d275ddee09f48ef93942a5491,2024-11-21T06:22:17.110000
|
||||
CVE-2021-3735,0,1,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000
|
||||
CVE-2021-37350,0,0,cf25b34ef1bbfd95231919aef949f1c5ef44e04e05be9690834576ef277c1b91,2024-11-21T06:14:59.677000
|
||||
CVE-2021-37351,0,0,d11c79c834d15cc2144d8711dffb0ddf0689cebc7c8d0fa23ad5d1503584c13d,2024-11-21T06:14:59.823000
|
||||
CVE-2021-37352,0,0,1d39000a015942794d66401eebb5b89f81736f941a96aecacf01420137c33cd4,2024-11-21T06:14:59.973000
|
||||
@ -181647,7 +181647,7 @@ CVE-2021-39283,0,0,eda15ad1b3bcdcea2bbabe3c3a719378090dd1f6b09ac9e32c24dec27d162
|
||||
CVE-2021-39285,0,0,a30e82f0b54273bf7230675bfc50d449c5b054125f271ae318a58b9f82ff968d,2024-11-21T06:19:07.193000
|
||||
CVE-2021-39286,0,0,ef6a7f535e70ea4c70e16914bb393fc1fe7ddce52d7869aa8e27ed3514a1c0a5,2024-11-21T06:19:07.390000
|
||||
CVE-2021-39289,0,0,065932f15029abf31cec0e9a8c93f437f6a2e6f1d70a6cf84aed55a74ab5c3a9,2024-11-21T06:19:07.593000
|
||||
CVE-2021-3929,0,0,386aee1fa2c13bafa06a50919c8811ee196fa3eb57a7f758af68733a2d80bd6e,2024-11-21T06:22:47.740000
|
||||
CVE-2021-3929,0,1,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000
|
||||
CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000
|
||||
CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000
|
||||
CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000
|
||||
@ -192299,7 +192299,7 @@ CVE-2022-22583,0,0,cef0a1b3c51e05882dd405aa523ef9e9bbbacbdae2cf3cbfa227960daba5e
|
||||
CVE-2022-22584,0,0,5248aa63983720014377ab3a932e7e26d00aa01f6109bfe9bbfe564e719ab265,2024-11-21T06:47:04.220000
|
||||
CVE-2022-22585,0,0,49d858c7854d86c30431073a89e3a77a374d0583f41fe955f4122b98bff7b1d8,2024-11-21T06:47:04.370000
|
||||
CVE-2022-22586,0,0,7a8c327b1fdb0dc879577cb6623c3b5a67edc10748196e7bf3d4d9a371e2a4bb,2024-11-21T06:47:04.493000
|
||||
CVE-2022-22587,0,0,298287df6b9107232183b1c1f2a082eefda3e57d8532fbbfd506d0c135fc13c0,2025-01-29T17:15:16.100000
|
||||
CVE-2022-22587,0,1,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22588,0,0,6c57d89d82e014a04c1d1a269239114176bf790579db18cc8a4e0bb9b98618f5,2024-11-21T06:47:04.710000
|
||||
CVE-2022-22589,0,0,ad265160333aeff24b5a24815da36d925fd4417ebc2ddd4162500edd6aad12ec,2024-11-21T06:47:04.823000
|
||||
CVE-2022-2259,0,0,150b52071c57e9da09e4562b9e329d9ebb764927f18ed734d3725de25cc194b6,2024-11-21T07:00:38.140000
|
||||
@ -192334,7 +192334,7 @@ CVE-2022-22616,0,0,fd6c62268b016f15b1bb153516514624f101ccecfdc0b548b6bd7175935d8
|
||||
CVE-2022-22617,0,0,b9a76fb778badaf7135b648c1b9e7a3b21aea99bf752c663599f8da2405573b1,2024-11-21T06:47:07.893000
|
||||
CVE-2022-22618,0,0,53a6466f73e6695117bc56fb459dfa0bde3aacbb8110ea335a0c42333cb99e27,2024-11-21T06:47:08.017000
|
||||
CVE-2022-2262,0,0,48f9f12588c4cb17d7b597dce3fc433cbe7d88db72523f825ed2022a32d1a7a8,2024-11-21T07:00:38.480000
|
||||
CVE-2022-22620,0,0,708e42b970b338cd9b18c6d6a1a5a07c513d1cc6db4ebe7b51605c00613bfa29,2025-01-29T17:15:16.457000
|
||||
CVE-2022-22620,0,1,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000
|
||||
CVE-2022-22621,0,0,f64d274fe62db017d3a340f8a8d18fc17ad01dea66a7a94ad96229b65fa87834,2024-11-21T06:47:08.227000
|
||||
CVE-2022-22622,0,0,096e2e61980549c51cd46b9fbef7cf08515942db2ff08880a7a4a737ef13b81f,2024-11-21T06:47:08.337000
|
||||
CVE-2022-22623,0,0,7ed1ca6096215ea8485a50fc8cae6d57524f6a37b6c47c50add71b768de4e4c8,2023-11-07T03:43:56.890000
|
||||
@ -192393,7 +192393,7 @@ CVE-2022-22670,0,0,c0441f67d04e29f04a1c244c888e912d7e003563c05a6c1660033505dca78
|
||||
CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9d06,2024-11-21T06:47:14.617000
|
||||
CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000
|
||||
CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000
|
||||
CVE-2022-22674,0,0,2adab5b1b423052bbeca74c613db0c7648ffe6c484635ebce9da5a50cd09c001,2025-01-29T17:15:16.737000
|
||||
CVE-2022-22674,0,1,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000
|
||||
CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000
|
||||
CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000
|
||||
@ -201007,8 +201007,8 @@ CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df
|
||||
CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000
|
||||
CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000
|
||||
CVE-2022-32892,0,0,445bb66d3cb66bfa52cb3b8f236b40adfc7de6fe48f16d3abd8207d65c213073,2024-11-21T07:07:10.590000
|
||||
CVE-2022-32893,0,0,92c0cf1c3ecb5156712e99b7517d058470066dc390e098c05623990df1020c73,2025-01-29T17:15:20.573000
|
||||
CVE-2022-32894,0,0,843c93094be1a733bb6f6edf1cd918f216c5aaceacd3ab7c0e5e5ed1225536a3,2025-01-29T17:15:20.847000
|
||||
CVE-2022-32893,0,1,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32894,0,1,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32895,0,0,43d08342ad442aaa6b2f9df4c24c35921ef46cb9a7757a6ff79496a2351a09c3,2024-11-21T07:07:11.033000
|
||||
CVE-2022-32896,0,0,c0ac2853331d6a1c5683c215abdb98389fc122489eb770c05070e76281984e79,2024-11-21T07:07:11.157000
|
||||
CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc99c6,2024-11-21T07:07:11.290000
|
||||
@ -201033,7 +201033,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc
|
||||
CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000
|
||||
CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000
|
||||
CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000
|
||||
CVE-2022-32917,0,0,f72d000a2f6bf81e09d47c8d717bcb9d0a0b93608ef26baeee74a08a22f5bc2d,2025-01-29T16:15:30.057000
|
||||
CVE-2022-32917,0,1,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000
|
||||
CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000
|
||||
CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000
|
||||
@ -208701,7 +208701,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316
|
||||
CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000
|
||||
CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000
|
||||
CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000
|
||||
CVE-2022-42856,0,0,dbe07b0474f502806cc25f2ff55ad774d36a421a12e119a94b8816b87e70e3a7,2025-01-28T22:15:11.590000
|
||||
CVE-2022-42856,0,1,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000
|
||||
CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000
|
||||
CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000
|
||||
CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000
|
||||
@ -218800,7 +218800,7 @@ CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa4471
|
||||
CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000
|
||||
CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000
|
||||
CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000
|
||||
CVE-2023-23529,0,0,06ea1c64d6e35ee6ba270e0752e3d0a3ff377c3acba0734c0c89a688e22ee1e5,2025-01-28T22:15:14.157000
|
||||
CVE-2023-23529,0,1,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000
|
||||
CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000
|
||||
CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000
|
||||
CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000
|
||||
@ -222654,7 +222654,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf
|
||||
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
|
||||
CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000
|
||||
CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000
|
||||
CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000
|
||||
CVE-2023-28206,0,1,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000
|
||||
CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000
|
||||
CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000
|
||||
CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000
|
||||
@ -225918,7 +225918,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f
|
||||
CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000
|
||||
CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000
|
||||
CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000
|
||||
CVE-2023-32373,0,0,384a9ff85ccf8a10d48c0d117a13f5b941b239e5c1f11c3f168fdd548dc2bbed,2025-02-03T14:15:34.500000
|
||||
CVE-2023-32373,0,1,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000
|
||||
CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000
|
||||
CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000
|
||||
CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000
|
||||
@ -227453,7 +227453,7 @@ CVE-2023-34184,0,0,2442eadc7f7ae90259cef50a8536ce9bd375108fe6cfeb3ded94765555a83
|
||||
CVE-2023-34185,0,0,4c5f4bf40def13d12fc3b4e803a32228e00caefcd5ded5fd0047f122b45f0170,2024-11-21T08:06:43.960000
|
||||
CVE-2023-34186,0,0,4a58da1254a6f379a26c0f12ec76897c53ffd6ab2c992e984b8875d4d20e7c36,2024-11-21T08:06:44.087000
|
||||
CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b2f0,2024-11-21T08:06:44.200000
|
||||
CVE-2023-34188,0,0,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
|
||||
CVE-2023-34188,0,1,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000
|
||||
CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000
|
||||
CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000
|
||||
CVE-2023-34192,0,0,8e068b263c612b1cfb21e8e741bf1c7c4a21d6b7a2cbdefe2e15a248cfc85c32,2025-02-27T02:00:01.920000
|
||||
@ -245022,7 +245022,7 @@ CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6
|
||||
CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000
|
||||
CVE-2024-10858,0,0,42b123ba3b0529f7fcd2fe96eb2bcf8b1478b777f663ea90f1bede156318a16a,2024-12-26T20:15:20.080000
|
||||
CVE-2024-1086,0,0,ed3b4cc9e937086bf7bd2a6eab945784d7bd20c1d6f9c68b6b3e2f0cc3cb68b3,2025-02-13T18:16:21.507000
|
||||
CVE-2024-10860,1,1,7c3c00f3072a2c47fdca547d3cc1a0275081d893f39926917a8c68219e57d0f9,2025-02-28T10:15:09.963000
|
||||
CVE-2024-10860,0,0,7c3c00f3072a2c47fdca547d3cc1a0275081d893f39926917a8c68219e57d0f9,2025-02-28T10:15:09.963000
|
||||
CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f88110b,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000
|
||||
CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000
|
||||
@ -247395,7 +247395,7 @@ CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb52205382957231114
|
||||
CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000
|
||||
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
|
||||
CVE-2024-13468,0,0,3b114e7865942bd4a908c446f11cc9e4d2c0bb866058c63bfd1c63d95d58f732,2025-02-19T08:15:16.027000
|
||||
CVE-2024-13469,1,1,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000
|
||||
CVE-2024-13469,0,0,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
|
||||
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
|
||||
@ -247546,7 +247546,7 @@ CVE-2024-13632,0,0,ab87904e3237e1ff207bd083064fa234eb8396de2c71155409ff7865e4a4b
|
||||
CVE-2024-13633,0,0,5ee7398c6e0e74dbda092bd1434016432f8cbad05a1f93851c7c1e6797876da1,2025-02-26T15:15:22.940000
|
||||
CVE-2024-13634,0,0,0925e4eb0a5b6a25a950b2bbdaa9ac2e640f74d1a050a484380e5d735ef0dc4f,2025-02-26T15:15:23.103000
|
||||
CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000
|
||||
CVE-2024-13638,1,1,4fbd33032dbdde9da6016e5df748c24187ab44e7250c73361acba382280f65a3,2025-02-28T09:15:10.043000
|
||||
CVE-2024-13638,0,0,4fbd33032dbdde9da6016e5df748c24187ab44e7250c73361acba382280f65a3,2025-02-28T09:15:10.043000
|
||||
CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000
|
||||
@ -247613,7 +247613,7 @@ CVE-2024-13712,0,0,dc7644dc4e1dbc747bbf2221b44bd3e1c5714d00548aa1a048cc6c77b3cd4
|
||||
CVE-2024-13713,0,0,90954b7583c56b27a881e3e89dac99a8fe4d669edd575847540b2c9eda75eaf1,2025-02-25T03:28:44.207000
|
||||
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
|
||||
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
|
||||
CVE-2024-13716,1,1,a730dc60dc22c20ef2e1e6a37f90d5aa74273af9534de5004e3970125a69b204,2025-02-28T09:15:10.223000
|
||||
CVE-2024-13716,0,0,a730dc60dc22c20ef2e1e6a37f90d5aa74273af9534de5004e3970125a69b204,2025-02-28T09:15:10.223000
|
||||
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
|
||||
CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000
|
||||
CVE-2024-13719,0,0,82e1c4af9f0b8d4908b4e334be7136368e8b0d540e14dda9dec9f059b1234cbf,2025-02-19T08:15:20.737000
|
||||
@ -247676,8 +247676,8 @@ CVE-2024-13822,0,0,b03830906a27cd03fc0531c5c6e7b60f126f1978ea681f2921431ba76aa58
|
||||
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
||||
CVE-2024-1383,0,0,aa117bb4caae4c90c9ef562f3b17aec83c186c85e2ed83fcc25ce7b11090cff4,2024-11-21T08:50:27.733000
|
||||
CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000
|
||||
CVE-2024-13831,1,1,dc606325056ecb3af1d0abdf4906087df581d7aaf8a47f4b06428d6e01b13004,2025-02-28T09:15:10.400000
|
||||
CVE-2024-13832,1,1,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88ab1,2025-02-28T09:15:10.570000
|
||||
CVE-2024-13831,0,0,dc606325056ecb3af1d0abdf4906087df581d7aaf8a47f4b06428d6e01b13004,2025-02-28T09:15:10.400000
|
||||
CVE-2024-13832,0,0,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88ab1,2025-02-28T09:15:10.570000
|
||||
CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000
|
||||
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
|
||||
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
|
||||
@ -247689,7 +247689,7 @@ CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78cead
|
||||
CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
|
||||
CVE-2024-13851,1,1,b398a5e42cb9d7be9c1f996abecf4cac62eb034d55b15397f51759f424614a8a,2025-02-28T09:15:10.733000
|
||||
CVE-2024-13851,0,0,b398a5e42cb9d7be9c1f996abecf4cac62eb034d55b15397f51759f424614a8a,2025-02-28T09:15:10.733000
|
||||
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
|
||||
CVE-2024-13854,0,0,b293d3f2f05083e98beb719565723791c5cf1a85fbf867f7cfec3a20f9286342,2025-02-19T08:15:21.440000
|
||||
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
|
||||
@ -250879,7 +250879,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2
|
||||
CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000
|
||||
CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000
|
||||
CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000
|
||||
CVE-2024-23222,0,0,8a89efbca457c119f6fa737db7f2bcbd7d7ae874e824e9cafa7671f30cd61ab8,2025-02-03T14:15:38.223000
|
||||
CVE-2024-23222,0,1,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000
|
||||
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
|
||||
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
|
||||
CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
|
||||
@ -253251,7 +253251,7 @@ CVE-2024-26302,0,0,fc5638e5f76b6239bb433ea39fb38c5e3b9f0a6c8cdf6356f010d0b303320
|
||||
CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840eb2,2024-11-21T09:02:19.880000
|
||||
CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000
|
||||
CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000
|
||||
CVE-2024-26306,0,0,83e4e1e640fae144af2c450cc96840908601de0cd7676d33812806828ec30a15,2025-02-10T23:15:13.160000
|
||||
CVE-2024-26306,0,1,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000
|
||||
CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000
|
||||
CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000
|
||||
CVE-2024-26309,0,0,29b65aa638465aa8c64d469c75ef0651a7e59224972ac32d6818f20d170c6343,2024-11-21T09:02:20.667000
|
||||
@ -260922,7 +260922,7 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3
|
||||
CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000
|
||||
CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000
|
||||
CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000
|
||||
CVE-2024-36259,0,0,a96688d95337052480524ceabbfba44b69d201b96805bc4d3d6e48fa3e5798fd,2025-02-25T19:15:14.343000
|
||||
CVE-2024-36259,0,1,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000
|
||||
CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000
|
||||
CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000
|
||||
CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000
|
||||
@ -264427,7 +264427,7 @@ CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56
|
||||
CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000
|
||||
CVE-2024-40896,0,0,65e44200c8e1d56574af55a20b760c89331601d37478c8e3eb6ebbcae8e4a210,2024-12-24T03:15:06.727000
|
||||
CVE-2024-40896,0,1,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000
|
||||
CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000
|
||||
CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000
|
||||
CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000
|
||||
@ -278522,11 +278522,11 @@ CVE-2024-8415,0,0,e8d703c5be439a7b12f448c59ea16ff0dc181840132c9ef3746fdeb083d8c4
|
||||
CVE-2024-8416,0,0,064686b03f2591358d01e2435bf6d0c05dabb68525db32e9554b611a0eda381c,2024-09-06T16:38:44.053000
|
||||
CVE-2024-8417,0,0,ae5c46124418f1e175898401d4cd10e4ac5ab2a5760b3ada369013efaf5f9e0e,2024-11-21T09:53:11.207000
|
||||
CVE-2024-8418,0,0,13014cb10bf2076fdd98d7e7307a7de55e2e6a5c70285579360946d216816d18,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8420,1,1,ea5022a359dce7e54c310a8e4a463f6170d2c6e2d53163c491680ffcf3cf05d2,2025-02-28T09:15:10.910000
|
||||
CVE-2024-8420,0,0,ea5022a359dce7e54c310a8e4a463f6170d2c6e2d53163c491680ffcf3cf05d2,2025-02-28T09:15:10.910000
|
||||
CVE-2024-8421,0,0,6800675b8d580f62fefe249f14070dd1be7b0d76f26f1a650e36706f5d41a8e4,2024-10-30T22:15:03.503000
|
||||
CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387cf0,2024-10-16T18:00:10.507000
|
||||
CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000
|
||||
CVE-2024-8425,1,1,fc73b4c2c260fe21b5bc2fab7f3679ac5cb884a24671e36c961f5bb842707523,2025-02-28T09:15:11.083000
|
||||
CVE-2024-8425,0,0,fc73b4c2c260fe21b5bc2fab7f3679ac5cb884a24671e36c961f5bb842707523,2025-02-28T09:15:11.083000
|
||||
CVE-2024-8427,0,0,b84207915031e0f3fd8ae31fc1649578b63ca815fcdfb9b3c22054b4863be5e4,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,16614a0b61f86dd0b83d47d6c77d8385fb4c68c4d0f570f88f7c5094d2f7b53a,2024-09-26T21:58:45.393000
|
||||
CVE-2024-8429,0,0,7d7adc19f31eabcda933830e1386025bcbab9119931c58d61657c8ea833e8e43,2024-12-17T12:15:20.853000
|
||||
@ -279034,7 +279034,7 @@ CVE-2024-9011,0,0,5f917ba5d6e9e414a668fa259efdc89c2355605a5666ae5f81812d44488e6a
|
||||
CVE-2024-9014,0,0,220003038e0ed1cc49a0befe3090135c41cd16a5f829c2d65bd6cc8f984c0497,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9015,0,0,70610f66e2554a4ae6806b1835adece9ecbb77c46846bbc910eff47baf4dabd3,2025-02-11T02:15:36.640000
|
||||
CVE-2024-9018,0,0,9d5f9a71065cb5737c3eb97e3b8fce2545d7a7505edc442df3224ec9cdcd8b15,2024-10-07T19:20:48.293000
|
||||
CVE-2024-9019,1,1,b0e5ef09bc954fd45f762ba11289b323f0e5567e0b4c42b4e45e1e94cd6e6eeb,2025-02-28T09:15:11.270000
|
||||
CVE-2024-9019,0,0,b0e5ef09bc954fd45f762ba11289b323f0e5567e0b4c42b4e45e1e94cd6e6eeb,2025-02-28T09:15:11.270000
|
||||
CVE-2024-9020,0,0,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000
|
||||
CVE-2024-9021,0,0,38ce15408413883ac2962e131e46ff98aae3d8ba8d1d410ba95b4f315f4dd5ce,2024-10-10T12:57:21.987000
|
||||
CVE-2024-9022,0,0,b97de3f37f13459888a48b84864cef3e3e6492a34af924d2e6bb02f8326a41fe,2024-10-15T14:34:12.063000
|
||||
@ -279176,9 +279176,9 @@ CVE-2024-9188,0,0,5dd6784f0ddf222dfed6f3f6f8ef1425cb794ae63276e1d1603c62bc0b0fa2
|
||||
CVE-2024-9189,0,0,4e8c036fffae828e6f3882cbb1531defe39b113820187b885e346d496fe1295e,2024-10-03T17:26:19.397000
|
||||
CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a44,2024-11-05T17:06:41.363000
|
||||
CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9193,1,1,7aa1dbde18a2cefd1d5c7994b259059c12b9ea975239024491588fedc661ea63,2025-02-28T09:15:11.437000
|
||||
CVE-2024-9193,0,0,7aa1dbde18a2cefd1d5c7994b259059c12b9ea975239024491588fedc661ea63,2025-02-28T09:15:11.437000
|
||||
CVE-2024-9194,0,0,04a4ea65d38da4fcbaabc5e2d1e4083861c0f3dd2bc313d0389a7e90a03127c9,2024-11-21T17:15:27.480000
|
||||
CVE-2024-9195,1,1,78b1fc40d9caf9991dd97fbb23b8dd02b45f5722200cffc9c47e60fc4d41061a,2025-02-28T09:15:11.633000
|
||||
CVE-2024-9195,0,0,78b1fc40d9caf9991dd97fbb23b8dd02b45f5722200cffc9c47e60fc4d41061a,2025-02-28T09:15:11.633000
|
||||
CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000
|
||||
CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000
|
||||
CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000
|
||||
@ -280037,7 +280037,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559
|
||||
CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000
|
||||
CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000
|
||||
CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000
|
||||
CVE-2025-0395,0,0,6df13e005058690cb18139f812014ac3a4ece01730acca499bca8c01bb400d2e,2025-02-04T20:15:49.587000
|
||||
CVE-2025-0395,0,1,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
|
||||
CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000
|
||||
CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000
|
||||
CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000
|
||||
@ -280585,7 +280585,9 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813
|
||||
CVE-2025-1293,0,0,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000
|
||||
CVE-2025-1295,0,0,675204ae0772f088026fc7f2412f8ab28c43fc8efc072775299de73d53b5b7cf,2025-02-27T06:15:21.990000
|
||||
CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
|
||||
CVE-2025-1300,1,1,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
|
||||
CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000
|
||||
CVE-2025-1319,1,1,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
|
||||
CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000
|
||||
CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000
|
||||
CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000
|
||||
@ -280635,7 +280637,7 @@ CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408
|
||||
CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000
|
||||
CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000
|
||||
CVE-2025-1412,0,0,af6752d241a9229d1b7ffcf487afc415a29cfa03072b0a3797beadd6e57308ed,2025-02-24T08:15:09.890000
|
||||
CVE-2025-1413,1,1,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000
|
||||
CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000
|
||||
CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000
|
||||
CVE-2025-1426,0,0,4a8cd471295100a135e3f1ec50bc3f2c2b0c11be304dbe11e606b36ac015f623,2025-02-19T20:15:36.467000
|
||||
CVE-2025-1441,0,0,1a8d7925760ab15d6de1f722cbb1abd9befdb71560d55b0f11dd7282b2ec419a,2025-02-19T05:15:12.050000
|
||||
@ -280672,8 +280674,8 @@ CVE-2025-1553,0,0,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6
|
||||
CVE-2025-1555,0,0,b87953fc659c2e74abd428dd8b83c4d989fea69643d0c4eecfbab0e6ac242e9a,2025-02-24T15:15:12.810000
|
||||
CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
|
||||
CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
|
||||
CVE-2025-1560,1,1,94ea0392f231db4bf68a65aff70aa4324f399504541076f334dc955e4571374b,2025-02-28T09:15:12.040000
|
||||
CVE-2025-1570,1,1,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e923b,2025-02-28T09:15:12.203000
|
||||
CVE-2025-1560,0,0,94ea0392f231db4bf68a65aff70aa4324f399504541076f334dc955e4571374b,2025-02-28T09:15:12.040000
|
||||
CVE-2025-1570,0,0,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e923b,2025-02-28T09:15:12.203000
|
||||
CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000
|
||||
CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000
|
||||
CVE-2025-1575,0,0,4f36554ed6482f45b74d35521d78ee1f8257f79829174fda75a5bd3bf6296f94,2025-02-23T04:15:24.980000
|
||||
@ -280725,7 +280727,7 @@ CVE-2025-1644,0,0,c089c614bad147aba27db7e276630bda628e1050898eb7eafd3da256285acd
|
||||
CVE-2025-1645,0,0,f84c25d5345ae177afb924fbcfe7e77498beaa89bb1760e6fea90a27526a406a,2025-02-25T02:15:16.123000
|
||||
CVE-2025-1646,0,0,5710e0e746a724f69e8cc150a43d0c87decff43af6a1a7566fd6006b723baac7,2025-02-25T14:15:31.320000
|
||||
CVE-2025-1648,0,0,01be54e92ee6583d4b180477f3f82c99c2017256ad3257671bbc83775fcbe841,2025-02-28T01:30:32.830000
|
||||
CVE-2025-1662,1,1,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000
|
||||
CVE-2025-1662,0,0,65cfd856306d889617e3038fc6a8c795bc27be9c444f1a9c5df3c4ffdd828a0f,2025-02-28T09:15:12.373000
|
||||
CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000
|
||||
CVE-2025-1674,0,0,c9ab5cf0d854b00d30135f8d3aae01653c22e99139baff93dd6ad32b17a41d13,2025-02-28T01:30:32.830000
|
||||
CVE-2025-1675,0,0,919ba4e5330550da1b3bdc08ee6fe479b5b6b92bc2456a105e1c616b57e9b557,2025-02-25T08:15:30.020000
|
||||
@ -280750,10 +280752,15 @@ CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53
|
||||
CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000
|
||||
CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000
|
||||
CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000
|
||||
CVE-2025-1746,1,1,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000
|
||||
CVE-2025-1747,1,1,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000
|
||||
CVE-2025-1748,1,1,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000
|
||||
CVE-2025-1749,1,1,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000
|
||||
CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000
|
||||
CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000
|
||||
CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000
|
||||
CVE-2025-1776,1,1,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -281469,6 +281476,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85
|
||||
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
|
||||
CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000
|
||||
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
|
||||
CVE-2025-22270,1,1,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000
|
||||
CVE-2025-22271,1,1,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000
|
||||
CVE-2025-22272,1,1,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000
|
||||
CVE-2025-22273,1,1,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000
|
||||
CVE-2025-22274,1,1,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
|
||||
CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000
|
||||
@ -281567,8 +281579,8 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
CVE-2025-22491,1,1,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000
|
||||
CVE-2025-22492,1,1,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000
|
||||
CVE-2025-22491,0,0,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000
|
||||
CVE-2025-22492,0,0,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000
|
||||
CVE-2025-22495,0,0,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000
|
||||
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
|
||||
CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000
|
||||
@ -281917,7 +281929,7 @@ CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b
|
||||
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
|
||||
CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
|
||||
CVE-2025-23045,0,0,5cf9ac707be65a7cb86de834c6707744da7ff35db3dfb07c7b6442c00c475c3a,2025-01-28T16:15:40.690000
|
||||
CVE-2025-23046,0,0,ba6d497e313a00f206b016fcea77917c0b1afac20805fd9fd511025b43839b8b,2025-02-25T18:15:27.383000
|
||||
CVE-2025-23046,0,1,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000
|
||||
CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000
|
||||
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
|
||||
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
|
||||
@ -281938,7 +281950,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881
|
||||
CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000
|
||||
CVE-2025-23081,0,0,88335d5d07bd744f2fedc19f5e2fa983c6c0a68ed633dfc146bea9e424067900,2025-02-18T22:15:18.257000
|
||||
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
|
||||
CVE-2025-23083,0,0,6a501c0dcff9af34582fe35c519636d37da8f27378c2381b47781c6cb71c5067,2025-02-06T15:15:17.597000
|
||||
CVE-2025-23083,0,1,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
||||
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
||||
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
|
||||
CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000
|
||||
@ -282464,7 +282476,7 @@ CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c81
|
||||
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
|
||||
CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000
|
||||
CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000
|
||||
CVE-2025-24085,0,0,524bbded420d14c19cb8143bafa67ce3598ef2df011bf73432c1868f0e191530,2025-02-18T20:15:28.897000
|
||||
CVE-2025-24085,0,1,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000
|
||||
CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000
|
||||
CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000
|
||||
CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000
|
||||
@ -283000,7 +283012,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef
|
||||
CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000
|
||||
CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000
|
||||
CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25192,0,0,108563f8ac44fc694a3b8629c17c93a7b18522396eddd76c881db6cda276776c,2025-02-25T18:15:27.583000
|
||||
CVE-2025-25192,0,1,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
|
||||
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
|
||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000
|
||||
@ -283239,7 +283251,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
|
||||
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
|
||||
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
|
||||
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
|
||||
CVE-2025-26465,0,0,90ca92ee391124597eed5a54a98891d38a806dd2b4300c52197477b3ccb16272,2025-02-19T15:15:18.090000
|
||||
CVE-2025-26465,0,1,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
|
||||
CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
|
||||
@ -283431,16 +283443,16 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b
|
||||
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
|
||||
CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27110,0,0,7df50a11c50cb45bc21a78ad4204e1dc19268096b7d3b27e0bd7325516e8f0a2,2025-02-25T20:15:37.517000
|
||||
CVE-2025-27110,0,1,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
|
||||
CVE-2025-27135,0,0,2b4ca3a6c4bb963ede6b8510aa33d7ae3bb4bf8b75f298a6d5163ae954eac93d,2025-02-25T19:15:15.677000
|
||||
CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
|
||||
CVE-2025-27139,0,0,002a9941f02b71e35d5a1853192197580e578a7b63cc37e6d544d2ef7c2de5e8,2025-02-25T20:15:37.693000
|
||||
CVE-2025-27139,0,1,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
|
||||
CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
|
||||
CVE-2025-27142,0,0,7c2b797a1aba57d2fb5e9b5842bb5566080c43d16d050c5870984d5322c00a79,2025-02-25T20:15:37.847000
|
||||
CVE-2025-27142,0,1,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
|
||||
CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
|
||||
CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user