mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-18T15:01:16.063065+00:00
This commit is contained in:
parent
78928c15d2
commit
f8f767ade5
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-1631",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2020-05-04T10:15:10.890",
|
||||
"lastModified": "2024-11-21T05:11:02.493",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T14:59:06.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1906",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2021-05-07T09:15:08.280",
|
||||
"lastModified": "2024-11-21T05:45:23.897",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:58:38.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-32648",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-08-26T19:15:07.230",
|
||||
"lastModified": "2024-11-21T06:07:27.300",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:48:55.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,19 +117,17 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.471",
|
||||
"versionEndExcluding": "1.0.472",
|
||||
"matchCriteriaId": "32CA477B-7437-4DB8-891D-05E1297E36FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.1.1",
|
||||
"versionEndExcluding": "1.1.5",
|
||||
"matchCriteriaId": "2E79163B-046D-4BA9-82C9-70AB3A000D69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:octobercms:october:1.0.471:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C626BDE-022E-4AEE-A189-6AB7EBEDD80F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,16 +139,14 @@
|
||||
"url": "https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -158,23 +154,21 @@
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -182,7 +176,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39144",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-08-23T18:15:12.087",
|
||||
"lastModified": "2024-11-21T06:18:41.480",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:47:16.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-39226",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-10-05T18:15:07.947",
|
||||
"lastModified": "2024-11-21T06:18:57.193",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:53:42.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,7 +105,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -176,6 +176,7 @@
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -234,6 +235,7 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-41277",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-11-17T20:15:10.587",
|
||||
"lastModified": "2024-11-21T06:25:56.970",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:44:41.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-24816",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-04-13T21:15:07.683",
|
||||
"lastModified": "2024-11-21T06:51:09.730",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:50:35.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 6.0
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -91,6 +91,16 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-2856",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2022-09-26T16:15:11.207",
|
||||
"lastModified": "2024-11-21T07:01:48.987",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:43:46.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46169",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-12-05T21:15:10.527",
|
||||
"lastModified": "2024-11-21T07:30:14.963",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-18T14:51:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50167",
|
||||
"sourceIdentifier": "security@pega.com",
|
||||
"published": "2024-03-06T18:15:46.133",
|
||||
"lastModified": "2024-11-21T08:36:35.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:43:27.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,56 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.7",
|
||||
"versionEndExcluding": "8.8.5",
|
||||
"matchCriteriaId": "A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pega:pega_platform:23.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pega.com/support-doc/pega-security-advisory-i23-vulnerability-remediation-note",
|
||||
"source": "security@pega.com"
|
||||
"source": "security@pega.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.pega.com/support-doc/pega-security-advisory-i23-vulnerability-remediation-note",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12797",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2025-02-11T16:15:38.827",
|
||||
"lastModified": "2025-02-15T01:15:10.250",
|
||||
"lastModified": "2025-02-18T14:15:27.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1696",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-03-11T17:15:46.007",
|
||||
"lastModified": "2024-11-21T08:51:06.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:43:18.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:santesoft:fft_imaging:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.2",
|
||||
"matchCriteriaId": "A718BF3B-0247-49E7-B3D5-DDE14C75869A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22011",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:47.413",
|
||||
"lastModified": "2024-11-21T08:55:23.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:42:57.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En ss_ProcessRejectComponent de ss_MmConManagement.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24275",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T23:15:07.520",
|
||||
"lastModified": "2024-11-21T08:59:05.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:44:28.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,89 @@
|
||||
"value": "Vulnerabilidad de cross-site scripting en el cliente de escritorio Teamwire Windows v.2.0.1 a v.2.4.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulada para la funci\u00f3n de b\u00fasqueda global."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:teamwire:teamwire:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.1",
|
||||
"versionEndExcluding": "2.4.0",
|
||||
"matchCriteriaId": "D8A9C09E-EA10-47EA-90D5-B87443B8DB2A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T23:15:07.583",
|
||||
"lastModified": "2024-11-21T08:59:05.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:44:14.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,77 @@
|
||||
"value": "Vulnerabilidad de cross-site scripting (XSS) en el cliente de escritorio Teamwire Windows v.2.0.1 a v.2.4.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulada para los componentes de nombre de chat, vista previa de mensaje, nombre de usuario y nombre de grupo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:teamwire:teamwire:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.1",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27218",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.380",
|
||||
"lastModified": "2024-11-21T09:04:07.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:42:34.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En update_freq_data de TBD, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27227",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.783",
|
||||
"lastModified": "2024-11-21T09:04:09.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:42:12.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "El kernel de Android permite la ejecuci\u00f3n remota de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27229",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.873",
|
||||
"lastModified": "2024-11-21T09:04:09.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:42:04.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En ss_SendCallBarringPwdRequiredIndMsg de ss_CallBarring.c, hay una posible desviaci\u00f3n de puntero nulo debido a que falta una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27237",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:49.143",
|
||||
"lastModified": "2024-11-21T09:04:10.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T13:41:56.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,73 @@
|
||||
"value": "En clean_ns_memory de nsmemwipe.c, existe un posible c\u00e1lculo de tama\u00f1o incorrecto debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-37601",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.113",
|
||||
"lastModified": "2025-02-14T21:15:15.440",
|
||||
"lastModified": "2025-02-18T14:15:27.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible heap buffer overflow exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6. Existe un posible desbordamiento del b\u00fafer de pila en la funci\u00f3n de importaci\u00f3n/exportaci\u00f3n de datos de usuario de las unidades principales NTG 6. Para realizar este ataque, se necesita acceso local a la interfaz USB del autom\u00f3vil. Con los datos preparados, un atacante puede provocar que el servicio User-Data falle. La instancia de servicio fallida se reiniciar\u00e1 autom\u00e1ticamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-37603",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.313",
|
||||
"lastModified": "2025-02-14T21:15:15.637",
|
||||
"lastModified": "2025-02-18T14:15:28.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible type confusion exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6. Existe una posible confusi\u00f3n de tipos en la funci\u00f3n de importaci\u00f3n/exportaci\u00f3n de datos de usuario de las unidades principales NTG 6. Para realizar este ataque, se necesita acceso local a la interfaz USB del autom\u00f3vil. Con los datos preparados, un atacante puede provocar que el servicio User-Data falle. La instancia de servicio fallida se reiniciar\u00e1 autom\u00e1ticamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57241",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-11T22:15:29.233",
|
||||
"lastModified": "2025-02-14T21:15:15.833",
|
||||
"lastModified": "2025-02-18T14:15:28.237",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,10 +22,10 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
@ -34,7 +34,7 @@
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57905",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:24.710",
|
||||
"lastModified": "2025-01-19T12:15:24.710",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:40:32.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,105 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ti-ads1119: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero tiene un agujero entre la muestra (unsigned int) y la marca de tiempo. Este agujero nunca se inicializa. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "AD20F8BA-D1BC-4584-8C68-17E958381157"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f1687cca911a2f294313c762e0646cd9e7be8cc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75f339d3ecd38cb1ce05357d647189d4a7f7ed08",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57906",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:24.800",
|
||||
"lastModified": "2025-02-02T11:15:12.710",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:40:18.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,182 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ti-ads8688: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.198",
|
||||
"versionEndExcluding": "4.20",
|
||||
"matchCriteriaId": "F228E3AB-50DA-4EA0-A4ED-7B1CC0F448AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.132",
|
||||
"versionEndExcluding": "5.5",
|
||||
"matchCriteriaId": "22471CC2-D881-43BA-B396-8537A87318DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.50",
|
||||
"versionEndExcluding": "5.11",
|
||||
"matchCriteriaId": "0EA15E0D-757C-4542-81E8-C9BFD7B5059D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12.17",
|
||||
"versionEndExcluding": "5.13",
|
||||
"matchCriteriaId": "CDB1D52E-21AB-4ECE-9119-6594F8FF3B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.13.2",
|
||||
"versionEndExcluding": "6.1.125",
|
||||
"matchCriteriaId": "5505137F-873F-4081-8495-7B9BD9DFFB09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.72",
|
||||
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1c80a0985a9a14f33dbf63cd703ca010f094f878",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a7377ccfd940cd6e9201756aff1e7852c266e69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3bf8d1e87939b8a19c9b738564fddf5b73322f2f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/455df95eb8f24a37abc549d6738fc8ee07eb623b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/485570ed82b7a6bb109fa1d0a79998e21f7f4c73",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aae96738006840533cf147ffd5f41830987f21c5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ebe2672bc42a0dfe31bb539f8ce79d024aa7e46d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57907",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:24.897",
|
||||
"lastModified": "2025-02-02T11:15:12.887",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:40:05.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,140 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: rockchip_saradc: corrige p\u00e9rdida de informaci\u00f3n en b\u00fafer activado La estructura local 'data' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo usa iio_for_each_active_channel() para asignar nuevos valores. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.9",
|
||||
"versionEndExcluding": "6.6.72",
|
||||
"matchCriteriaId": "FA3C66F8-143F-4897-962F-C1A8BDDD46CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/38724591364e1e3b278b4053f102b49ea06ee17c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5a95fbbecec7a34bbad5dcc3156700b8711d53c4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64b79afdca7b27a768c7d3716b7f4deb1d6b955c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7a07fb80ea886e9134284a27d0155cca7649e293",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8193941bc4fe7247ff13233f328aea709f574554",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/85a9c98a5e0f22d911b00077d751e34fff1401aa",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57908",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:24.990",
|
||||
"lastModified": "2025-02-02T11:15:13.003",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:39:42.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,154 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: imu: kmx61: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndExcluding": "6.1.125",
|
||||
"matchCriteriaId": "6D6948D1-57E9-4708-A678-1AE52ACEC1AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.72",
|
||||
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0871eb8d700b33dd7fa86c80630d62ddaef58c2c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/565814cbbaa674d2901428796801de49a611e59d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6985ba4467e4b15b809043fa7740d1fb23a1897b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6ae053113f6a226a2303caa4936a4c37f3bfff7b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a07f698084412a3ef5e950fcac1d6b0f53289efd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a386d9d2dc6635f2ec210b8199cfb3acf4d31305",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cde312e257b59ecaa0fad3af9ec7e2370bb24639",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57909",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:25.083",
|
||||
"lastModified": "2025-01-19T12:15:25.083",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:39:06.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,105 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: bh1745: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "CAA666EC-CF76-46C6-AE86-951E128D4C0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cca2a666e099aa018e5ab385f0a6e01a3053629",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57912",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:25.380",
|
||||
"lastModified": "2025-02-02T11:15:13.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:38:39.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,154 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: pressure: zpa2326: fix information leak in triggered buffer La estructura local 'sample' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero tiene un agujero entre la temperatura y la marca de tiempo (presi\u00f3n u32, temperatura u16, GAP, marca de tiempo u64). Este agujero nunca se inicializa. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.9",
|
||||
"versionEndExcluding": "6.1.125",
|
||||
"matchCriteriaId": "8ECFA604-48FC-4809-ADAC-3CFE89BA821F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.72",
|
||||
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6007d10c5262f6f71479627c1216899ea7f09073",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/64a989aa7475b8e76e69b9ec86819ea293e53bab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9629ff1a86823269b12fb1ba9ca4efa945906287",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/979a0db76ceda8fe1f2f85a116bfe97620ebbadf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b7849f62e61242e0e02c776e1109eb81e59c567c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d25f1fc273670271412a52a1efbdaf5dcf274ed8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fefb88a4da961a0b9c2473cbdcfce1a942fcfa9a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57916",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:25.763",
|
||||
"lastModified": "2025-01-19T12:15:25.763",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:38:31.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,133 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: microchip: pci1xxxx: Resuelve el p\u00e1nico del kernel durante la gesti\u00f3n de IRQ GPIO Resuelve el p\u00e1nico del kernel causado por la gesti\u00f3n incorrecta de IRQ mientras se accede a valores GPIO. Esto se hace reemplazando generic_handle_irq con handle_nested_irq."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.1.125",
|
||||
"matchCriteriaId": "44CA08BE-AA91-4D79-9DC6-9ADFFD6C0C4D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.72",
|
||||
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/194f9f94a5169547d682e9bbcc5ae6d18a564735",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/25692750c0259c5b65afec467d97201a485e8a00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/47d3749ec0cb56b7b98917c190a8c10cb54216fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79aef6187e16b2d32307c8ff610e9e04f7f86e1f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57919",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:26.053",
|
||||
"lastModified": "2025-01-19T12:15:26.053",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T13:38:22.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,105 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de divisi\u00f3n en los c\u00e1lculos de escala del plano DM dm_get_plane_scale no tiene en cuenta el tama\u00f1o de escala del plano igual a cero, lo que genera un error en el kernel debido a la divisi\u00f3n por cero. Se soluciona estableciendo el tama\u00f1o de escala exterior como cero cuando el tama\u00f1o de dst es cero, de forma similar a lo que hace drm_calc_scale(). Este problema comenz\u00f3 con la introducci\u00f3n del modo de superposici\u00f3n del cursor que utiliza esta funci\u00f3n para evaluar los cambios del modo del cursor a trav\u00e9s de dm_crtc_get_cursor_mode() antes de verificar el estado del plano. [Dec17 17:14] Ups: error de divisi\u00f3n: 0000 [#1] PREEMPT SMP NOPTI [ +0.000018] CPU: 5 PID: 1660 Comm: surface-DP-1 No contaminado 6.10.0+ #231 [ +0.000007] Nombre del hardware: Valve Jupiter/Jupiter, BIOS F7A0131 30/01/2024 [ +0.000004] RIP: 0010:dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000553] C\u00f3digo: 44 0f b7 41 3a 44 0f b7 49 3e 83 e0 0f 48 0f a3 c2 73 21 69 41 28 e8 03 00 00 31 d2 41 f7 f1 31 d2 89 06 69 41 2c e8 03 00 00 <41> f7 f0 89 07 e9 d7 d8 7e e9 44 89 c8 45 89 c1 41 89 c0 eb d4 66 [ +0.000005] RSP: 0018:ffffa8df0de6b8a0 EFLAGS: 00010246 [ +0.000006] RAX: 00000000000003e8 RBX: ffff9ac65c1f6e00 RCX: ffff9ac65d055500 [ +0,000003] RDX: 0000000000000000 RSI: ffffa8df0de6b8b0 RDI: ffffa8df0de6b8b4 [ +0.000004] RBP: ffff9ac64e7a5800 R08: 000000000000000 R09: 0000000000000a00 [ +0.000003] R10: 0000000000000ff R11: 0000000000000054 R12: ffff9ac6d0700010 [ +0.000003] R13: ffff9ac65d054f00 R14: ffff9ac65d055500 R15: ffff9ac64e7a60a0 [ +0.000004] FS: 00007f869ea00640(0000) GS:ffff9ac970080000(0000) knlGS:0000000000000000 [ +0.000004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000003] CR2: 000055ca701becd0 CR3: 000000010e7f2000 CR4: 0000000000350ef0 [ +0.000004] Rastreo de llamadas: [ +0.000007] [ +0.000006] ? __die_body.cold+0x19/0x27 [ +0.000009] ? die+0x2e/0x50 [ +0.000007] ? do_trap+0xca/0x110 [ +0.000007] ? do_error_trap+0x6a/0x90 [ +0.000006] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000504] ? exc_divide_error+0x38/0x50 [ +0.000005] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000488] ? [+0.000050] \u00bf __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000047] drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000062] drm_ioctl+0x27a/0x4f0 [drm] [ +0.000049] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000055] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu] [ +0.000360] __x64_sys_ioctl+0x97/0xd0 [ +0.000010] do_syscall_64+0x82/0x190 [ +0.000008] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000044] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000040] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __check_object_size+0x50/0x220 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? drm_ioctl+0x2a4/0x4f0 [drm] [ +0.000039] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000043] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __pm_runtime_suspend+0x69/0xc0 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? amdgpu_drm_ioctl+0x71/0x90 [amdgpu] [ +0.000366] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? syscall_salir_al_modo_usuario+0x77/0x210 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000007] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ +0.000008] RIP: 0033:0x55bb7cd962bc [ +0.000007] C\u00f3digo: 4c 89 6c 24 18 4c 89 64 24 20 4c 89 74 24 28 0f 57 c0 0f 11 44 24 30 89 c7 48 8d 54 24 08 b8 10 00 00 00 be bc 64 ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.12.10",
|
||||
"matchCriteriaId": "AD20F8BA-D1BC-4584-8C68-17E958381157"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5225fd2a26211d012533acf98a6ad3f983885817",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c2eaa73bd542b0168a0519e4a1c6e94bc121ec3d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-12xx/CVE-2025-1269.json
Normal file
60
CVE-2025/CVE-2025-12xx/CVE-2025-1269.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1269",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-02-18T14:15:28.513",
|
||||
"lastModified": "2025-02-18T14:15:28.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/limanmys/core/releases/tag/release.master.1010",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0038",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-14xx/CVE-2025-1414.json
Normal file
25
CVE-2025/CVE-2025-14xx/CVE-2025-1414.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-1414",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-02-18T14:15:28.670",
|
||||
"lastModified": "2025-02-18T14:15:28.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1943179",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-12/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-24032",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-10T16:15:39.153",
|
||||
"lastModified": "2025-02-10T16:15:39.153",
|
||||
"lastModified": "2025-02-18T14:15:28.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -64,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -93,6 +93,10 @@
|
||||
{
|
||||
"url": "https://github.com/OpenSC/pam_pkcs11/security/advisories/GHSA-8r8p-7mgp-vf56",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00021.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T16:16:49.867",
|
||||
"lastModified": "2025-02-14T17:15:20.917",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-18T14:59:38.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_1.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T16:16:50.180",
|
||||
"lastModified": "2025-02-13T16:16:50.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-18T14:57:24.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,79 @@
|
||||
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de buffer en TP-Link TL-WR841ND V11, causada por los par\u00e1metros dnsserver1 y dnsserver2 en /userRpm/WanSlaacCfgRpm.htm. Esta vulnerabilidad permite a los atacantes ocasionar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
50
README.md
50
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-18T13:02:54.058198+00:00
|
||||
2025-02-18T15:01:16.063065+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-18T12:15:16.087000+00:00
|
||||
2025-02-18T14:59:38.510000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,32 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281634
|
||||
281636
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-13636](CVE-2024/CVE-2024-136xx/CVE-2024-13636.json) (`2025-02-18T11:15:10.143`)
|
||||
- [CVE-2024-13667](CVE-2024/CVE-2024-136xx/CVE-2024-13667.json) (`2025-02-18T11:15:11.090`)
|
||||
- [CVE-2024-13681](CVE-2024/CVE-2024-136xx/CVE-2024-13681.json) (`2025-02-18T11:15:11.270`)
|
||||
- [CVE-2024-13691](CVE-2024/CVE-2024-136xx/CVE-2024-13691.json) (`2025-02-18T11:15:11.430`)
|
||||
- [CVE-2024-13783](CVE-2024/CVE-2024-137xx/CVE-2024-13783.json) (`2025-02-18T11:15:11.600`)
|
||||
- [CVE-2024-13797](CVE-2024/CVE-2024-137xx/CVE-2024-13797.json) (`2025-02-18T11:15:11.753`)
|
||||
- [CVE-2025-0521](CVE-2025/CVE-2025-05xx/CVE-2025-0521.json) (`2025-02-18T11:15:12.740`)
|
||||
- [CVE-2025-0817](CVE-2025/CVE-2025-08xx/CVE-2025-0817.json) (`2025-02-18T11:15:12.893`)
|
||||
- [CVE-2025-1035](CVE-2025/CVE-2025-10xx/CVE-2025-1035.json) (`2025-02-18T12:15:16.087`)
|
||||
- [CVE-2025-1269](CVE-2025/CVE-2025-12xx/CVE-2025-1269.json) (`2025-02-18T14:15:28.513`)
|
||||
- [CVE-2025-1414](CVE-2025/CVE-2025-14xx/CVE-2025-1414.json) (`2025-02-18T14:15:28.670`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `33`
|
||||
|
||||
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2025-02-18T11:15:11.903`)
|
||||
- [CVE-2024-2199](CVE-2024/CVE-2024-21xx/CVE-2024-2199.json) (`2025-02-18T11:15:12.273`)
|
||||
- [CVE-2024-3657](CVE-2024/CVE-2024-36xx/CVE-2024-3657.json) (`2025-02-18T11:15:12.433`)
|
||||
- [CVE-2024-5953](CVE-2024/CVE-2024-59xx/CVE-2024-5953.json) (`2025-02-18T11:15:12.583`)
|
||||
- [CVE-2022-46169](CVE-2022/CVE-2022-461xx/CVE-2022-46169.json) (`2025-02-18T14:51:04.277`)
|
||||
- [CVE-2023-50167](CVE-2023/CVE-2023-501xx/CVE-2023-50167.json) (`2025-02-18T13:43:27.293`)
|
||||
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-18T14:15:27.107`)
|
||||
- [CVE-2024-1696](CVE-2024/CVE-2024-16xx/CVE-2024-1696.json) (`2025-02-18T13:43:18.590`)
|
||||
- [CVE-2024-22011](CVE-2024/CVE-2024-220xx/CVE-2024-22011.json) (`2025-02-18T13:42:57.540`)
|
||||
- [CVE-2024-24275](CVE-2024/CVE-2024-242xx/CVE-2024-24275.json) (`2025-02-18T13:44:28.043`)
|
||||
- [CVE-2024-24276](CVE-2024/CVE-2024-242xx/CVE-2024-24276.json) (`2025-02-18T13:44:14.953`)
|
||||
- [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2025-02-18T13:42:34.137`)
|
||||
- [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2025-02-18T13:42:12.110`)
|
||||
- [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2025-02-18T13:42:04.037`)
|
||||
- [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2025-02-18T13:41:56.553`)
|
||||
- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-18T14:15:27.900`)
|
||||
- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-18T14:15:28.070`)
|
||||
- [CVE-2024-57241](CVE-2024/CVE-2024-572xx/CVE-2024-57241.json) (`2025-02-18T14:15:28.237`)
|
||||
- [CVE-2024-57905](CVE-2024/CVE-2024-579xx/CVE-2024-57905.json) (`2025-02-18T13:40:32.897`)
|
||||
- [CVE-2024-57906](CVE-2024/CVE-2024-579xx/CVE-2024-57906.json) (`2025-02-18T13:40:18.470`)
|
||||
- [CVE-2024-57907](CVE-2024/CVE-2024-579xx/CVE-2024-57907.json) (`2025-02-18T13:40:05.290`)
|
||||
- [CVE-2024-57908](CVE-2024/CVE-2024-579xx/CVE-2024-57908.json) (`2025-02-18T13:39:42.783`)
|
||||
- [CVE-2024-57909](CVE-2024/CVE-2024-579xx/CVE-2024-57909.json) (`2025-02-18T13:39:06.190`)
|
||||
- [CVE-2024-57912](CVE-2024/CVE-2024-579xx/CVE-2024-57912.json) (`2025-02-18T13:38:39.953`)
|
||||
- [CVE-2024-57916](CVE-2024/CVE-2024-579xx/CVE-2024-57916.json) (`2025-02-18T13:38:31.347`)
|
||||
- [CVE-2024-57919](CVE-2024/CVE-2024-579xx/CVE-2024-57919.json) (`2025-02-18T13:38:22.377`)
|
||||
- [CVE-2025-24032](CVE-2025/CVE-2025-240xx/CVE-2025-24032.json) (`2025-02-18T14:15:28.770`)
|
||||
- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T14:59:38.510`)
|
||||
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-18T14:57:24.510`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
94
_state.csv
94
_state.csv
@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486
|
||||
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
|
||||
CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000
|
||||
CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000
|
||||
CVE-2020-1631,0,0,451a7b2411a128b3b860c824a1399cf8c45f17392884902469b8b74ae9b0a79e,2024-11-21T05:11:02.493000
|
||||
CVE-2020-1631,0,1,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
|
||||
CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000
|
||||
CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000
|
||||
CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000
|
||||
@ -166537,7 +166537,7 @@ CVE-2021-1901,0,0,b4e439599e636bd2af3f4917af437f418f3102e0c7a63069310a81adcf8a4e
|
||||
CVE-2021-1903,0,0,d39f8f46801673020c5fbf3ea01fae62f95ab502fce8796c85a54991fed2fd38,2024-11-21T05:45:22.487000
|
||||
CVE-2021-1904,0,0,736c70e50ad0301f8658a558129e85f2c3820d51a12d0cb07c0e689d67b51d07,2024-11-21T05:45:22.860000
|
||||
CVE-2021-1905,0,0,372125f83a874275be00c1ffa8da76d54507cb820495157f0730c4f460e930e9,2025-01-29T20:15:27.953000
|
||||
CVE-2021-1906,0,0,9b3a01b9efc2f2440352c641555cacc0123c7ee1786c0b365709eb048843d4c9,2024-11-21T05:45:23.897000
|
||||
CVE-2021-1906,0,1,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
|
||||
CVE-2021-1907,0,0,8faafa9970a3672f067ece059b551bd2adc47cbf8ba4f75421ae6f6b8c30f6d5,2024-11-21T05:45:24.550000
|
||||
CVE-2021-1909,0,0,09b73ecdef2f380acd80f25a5da214cc33c77d1e8af71d49aad377ad62e8a0d2,2024-11-21T05:45:24.763000
|
||||
CVE-2021-1910,0,0,a6374620334700cdcae2f54d499d65ec2bbdf4b8d8dd71d334a216c6c2c176fe,2024-11-21T05:45:25.270000
|
||||
@ -176565,7 +176565,7 @@ CVE-2021-32644,0,0,48326864e3c31b32f0a2a40c894f4c5b136a56d07940984e0dd5cc5d1fc98
|
||||
CVE-2021-32645,0,0,9ccb448ef4de54166b4a9bb78f7bf78b88ec7ed02e5d39b6aaf9d53721c1c7e6,2024-11-21T06:07:26.863000
|
||||
CVE-2021-32646,0,0,8b20a03ce7ae582704f08e6c885ebaac0c533a1c8e4c47c8c7120f9c4abe2385,2024-11-21T06:07:26.993000
|
||||
CVE-2021-32647,0,0,c99a9247f5a69d1d18fc3868b9feddd2d5c1cfa057b7d5e9eeb861f20cdb1970,2024-11-21T06:07:27.147000
|
||||
CVE-2021-32648,0,0,df521eddeed51bc771cefcde15b150e58ec651e1713a6b975c21391f32c7919b,2024-11-21T06:07:27.300000
|
||||
CVE-2021-32648,0,1,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
|
||||
CVE-2021-32649,0,0,ec6446253c3390080ce76cfe06ab7e81e042190c48d349c3bbe41d3582775742,2024-11-21T06:07:27.430000
|
||||
CVE-2021-32650,0,0,d5f4ce6dfd3368853beb539f2091f1046487c5cbc12b94f90a4301791365a1eb,2024-11-21T06:07:27.550000
|
||||
CVE-2021-32651,0,0,cbadacd8e821828cc3ee8a01abf2792bbd8d05e094c35e440cf4cdd8ff657d70,2024-11-21T06:07:27.657000
|
||||
@ -181494,7 +181494,7 @@ CVE-2021-3914,0,0,587d3c5496a3894f3bee9050cac22e88e23c870c5f08774001d16b01d73514
|
||||
CVE-2021-39140,0,0,0d9122e27f2e8ed15d337a2299d703bde300b1bfc5641e6a2d94398671530bde,2024-11-21T06:18:40.777000
|
||||
CVE-2021-39141,0,0,308173be0e42d3b05e3159d40259ea4c33203fe28aebec15c3e70290187fba0a,2024-11-21T06:18:41.053000
|
||||
CVE-2021-39143,0,0,ffd9d8fa28b7e55b36ad11f211caff12c1dd3699acec6a9366db77a7d01be1df,2024-11-21T06:18:41.313000
|
||||
CVE-2021-39144,0,0,267579ecbbd4d8577d9f612ad7cba7e483f35d072d5d78ca4e5167ab68b09cc5,2024-11-21T06:18:41.480000
|
||||
CVE-2021-39144,0,1,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
|
||||
CVE-2021-39145,0,0,9062191979151d36b337ca921b5d90e49dc062b4974dde4e6e8076a6ae806f74,2024-11-21T06:18:41.880000
|
||||
CVE-2021-39146,0,0,a68f99bfb9c34ab239930244698e1dfe09b229ea585fcfca9e82690b53f706d2,2024-11-21T06:18:42.123000
|
||||
CVE-2021-39147,0,0,c59b801126c107f7229606315684ca5bddd626cafdf34772e7610770cf359be9,2024-11-21T06:18:42.353000
|
||||
@ -181583,7 +181583,7 @@ CVE-2021-39222,0,0,71610020ce9e67dc6940837aefe504acf8a8d9fdb64ff351427e97a92ab7a
|
||||
CVE-2021-39223,0,0,5c82a3350e48ddcff666b93be9d4046e000db4dacdb95c195e7d0a6ac4994a66,2024-11-21T06:18:56.700000
|
||||
CVE-2021-39224,0,0,0dbf7b0b7c0bfb5a2d9503d6d8b25452b69229fa68d356a1f3ea08c1eb5c6037,2024-11-21T06:18:56.860000
|
||||
CVE-2021-39225,0,0,0657e7f09b5d865111d8be38a777e243b614f6eb04392640f272b6c40ad1c8e4,2024-11-21T06:18:57.023000
|
||||
CVE-2021-39226,0,0,5d24d6fed5999ea4ee1b2259e9bb2f20a49cdfb7257cbea1d423dfa8f3bd9fd5,2024-11-21T06:18:57.193000
|
||||
CVE-2021-39226,0,1,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
|
||||
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
|
||||
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
|
||||
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
|
||||
@ -183276,7 +183276,7 @@ CVE-2021-41273,0,0,99397a929c92479c9f01da437507d101a5bf50eb4f748f5c7c67a12a6baaa
|
||||
CVE-2021-41274,0,0,7158857e7d9becd3b84392aa0da7e34d2226b9ffe9aeee343c59c3868ee024e3,2024-11-21T06:25:56.540000
|
||||
CVE-2021-41275,0,0,3a49ec4bc6781140610890599c8c13b510fa22785ea728e600da8381edd2a293,2024-11-21T06:25:56.670000
|
||||
CVE-2021-41276,0,0,77b0bd73bf0cb70e85934ea984c04179674e78ac11807816d660704623492517,2024-11-21T06:25:56.823000
|
||||
CVE-2021-41277,0,0,7a9bd7263f18595040ab44d916b953bf2e9b478e1860f3093c6dda56e8b9ce0b,2024-11-21T06:25:56.970000
|
||||
CVE-2021-41277,0,1,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
|
||||
CVE-2021-41278,0,0,12082549d8e21ddc5cfe62e6f0a9abd13e7d3cdf0888335bc0d75510b76033a0,2024-11-21T06:25:57.203000
|
||||
CVE-2021-41279,0,0,08dbaadaa38da000bb5a66fa4874a7c1582995ca6d179537b3e54f5f561379fd,2024-11-21T06:25:57.340000
|
||||
CVE-2021-4128,0,0,a7ff56c7d35e301b0a6c7f5571b37ed5026ab961314fd66e1ee36016b813b933,2024-11-21T06:36:57.697000
|
||||
@ -194265,7 +194265,7 @@ CVE-2022-24812,0,0,ba1810f3f8f684688400e185ebc7233835c3ff6495510564b8dac490202d0
|
||||
CVE-2022-24813,0,0,877de67ab2140b2965630d6b87135eaf6ace0d62798d255eaaad903269f6f716,2024-11-21T06:51:09.340000
|
||||
CVE-2022-24814,0,0,842db0f91ff63ac21bda327b9c3901d7b44f013aad2b3062d150a0c3eda475d7,2024-11-21T06:51:09.463000
|
||||
CVE-2022-24815,0,0,27e7266001f871c48274f931037b93d1533250e699e309d319783ba507b69571,2024-11-21T06:51:09.587000
|
||||
CVE-2022-24816,0,0,80d4b63f30809f6b5675544b5ebe7cd62cc8691be08f7b87abdc112bf6b6b6a6,2024-11-21T06:51:09.730000
|
||||
CVE-2022-24816,0,1,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
|
||||
CVE-2022-24817,0,0,a9b66571183a48bb0e197f3de17073db6b3e8acb18975114b7691755a44c848d,2024-11-21T06:51:09.863000
|
||||
CVE-2022-24818,0,0,a1ec3bb9985bb733a04420f18fd769587d8bdd5026fd3de5f563672d821e2f49,2024-11-21T06:51:09.987000
|
||||
CVE-2022-24819,0,0,2c88a72c04bc40dc0e3ecd356f74d1b49fc751aa38ec58544ec9cfabe9b06b80,2024-11-21T06:51:10.110000
|
||||
@ -197267,7 +197267,7 @@ CVE-2022-28550,0,0,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131
|
||||
CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000
|
||||
CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000
|
||||
CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000
|
||||
CVE-2022-2856,0,0,b84ccce006d6462b614d737c34cd37214778de96a599175a0e80459edae5ee51,2024-11-21T07:01:48.987000
|
||||
CVE-2022-2856,0,1,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
|
||||
CVE-2022-28560,0,0,e4b562b74d9cdbf01bd96ffaeba2fe191d5510688ed63ab34991480eb886b49c,2024-11-21T06:57:30.927000
|
||||
CVE-2022-28561,0,0,518c19fe66b4e09bc9800bc1acea302b3504c0f43ee73ab2e30472e903ec5797,2024-11-21T06:57:31.067000
|
||||
CVE-2022-28568,0,0,beb032e0c658d78fbcbcb904731866c4eac85eb53ad4d016a962c9ad42c8eec9,2024-11-21T06:57:31.207000
|
||||
@ -210983,7 +210983,7 @@ CVE-2022-46165,0,0,b52f4e59ab87d9ef826d1b1aa91e6a7d2ddf200190d4f26766b76124199a2
|
||||
CVE-2022-46166,0,0,12dbb8116693845af5bad0761e01ce8e5a1e7215ce1813d4f82e11aaf281dd95,2024-11-21T07:30:14.600000
|
||||
CVE-2022-46167,0,0,9fbc7368e3aa4e77dec66e0cd263dbe6cd1e49e34d7c4d09dd2bdc23ec0be5dd,2024-11-21T07:30:14.737000
|
||||
CVE-2022-46168,0,0,cfb90e24d3dcc101412afd836697be794033b1f4d9d566f7537a84c49dad0fbf,2024-11-21T07:30:14.850000
|
||||
CVE-2022-46169,0,0,32b03597dd8fa3719598f0afc2cbaa868385343552ad83ea80fe25b1bb00f8fc,2024-11-21T07:30:14.963000
|
||||
CVE-2022-46169,0,1,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
|
||||
CVE-2022-4617,0,0,8ebdc24048b2debd57a0848e54b1493c0fac1e5b4a06e75da5ac8ae75c06b81d,2024-11-21T07:35:36.497000
|
||||
CVE-2022-46170,0,0,7d0728aad33cc4004748812cc2b8df0d4850c877dc0ccd5269efed0d41cc4c76,2024-11-21T07:30:15.103000
|
||||
CVE-2022-46171,0,0,b44f4ea344bc0e6f16aab325e032b48c286c83d7bf551fdc6b86ced5865dcaba,2024-11-21T07:30:15.227000
|
||||
@ -238623,7 +238623,7 @@ CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c
|
||||
CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db123,2025-02-13T18:15:49.103000
|
||||
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
|
||||
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
|
||||
CVE-2023-50167,0,0,0d0dede05e4c03dcbcab9dc79f70bcf8ddf382f7f0da43067c571eb115842d20,2024-11-21T08:36:35.927000
|
||||
CVE-2023-50167,0,1,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
|
||||
CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000
|
||||
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
|
||||
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
|
||||
@ -244023,7 +244023,7 @@ CVE-2024-10616,0,0,9f20ea65efb8dfda7223bacba97b30c279c1d4b567d2392dfb095dad2d91b
|
||||
CVE-2024-10617,0,0,9716e9909b1963761532dbdeddb02df8dc76024997ef46c92363f00fe38665be,2024-11-04T16:44:40.280000
|
||||
CVE-2024-10618,0,0,f6ca69c9af73cdc0a5243c2eaf4419f95aafc639742259d0677010e595b53afc,2024-11-04T15:11:29.697000
|
||||
CVE-2024-10619,0,0,fc49d071a4ef7dabac9b358961edaed3ee7ae1ad0d8ad00999d5bcf739685ba8,2024-11-04T15:11:44.627000
|
||||
CVE-2024-1062,0,1,93332fe60f068e9cb056d0d2b6b480126af8205d38ab14ad34922652d0234049,2025-02-18T11:15:11.903000
|
||||
CVE-2024-1062,0,0,93332fe60f068e9cb056d0d2b6b480126af8205d38ab14ad34922652d0234049,2025-02-18T11:15:11.903000
|
||||
CVE-2024-10620,0,0,49a621fbed7cb9d28dafe4c2e61b1330b978fe18eddd8c84f23a8045a537a566,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10621,0,0,e653f9c261d51ef748d8caf5df8f99c49516cc3db939e790a4d7a4778b35fb6f,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10623,0,0,6e237096fbd094bbf3471247b87238053c5a778164061b5929cdb16711f26aa3,2024-11-21T13:57:24.187000
|
||||
@ -245978,7 +245978,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
|
||||
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
|
||||
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
|
||||
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
|
||||
CVE-2024-12797,0,0,8e4767f11287b706d346667cace5e4f10fd798d075ca9e4849b5e77077862f85,2025-02-15T01:15:10.250000
|
||||
CVE-2024-12797,0,1,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
|
||||
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
|
||||
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
|
||||
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
|
||||
@ -246677,7 +246677,7 @@ CVE-2024-13625,0,0,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f29
|
||||
CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000
|
||||
CVE-2024-13627,0,0,091818d37bd994aab1b6b18bae211dee9546cb2e17475bf34984a23caeb51798,2025-02-17T06:15:12.047000
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-13636,1,1,c685b1a09dc1c258e65b547dde9c2237c56f30935eb20290c56e8541aa2b245e,2025-02-18T11:15:10.143000
|
||||
CVE-2024-13636,0,0,c685b1a09dc1c258e65b547dde9c2237c56f30935eb20290c56e8541aa2b245e,2025-02-18T11:15:10.143000
|
||||
CVE-2024-13639,0,0,2fa3cbcf0e6974db61fb65364ec620ba817caf77aea64fecbbfef94d3304d5da,2025-02-13T09:15:07.273000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
|
||||
@ -246698,19 +246698,19 @@ CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020
|
||||
CVE-2024-13662,0,0,56f3ccc8e33600f927bf8694da0271aa04060815d9c0913215c0208ea29f19b6,2025-01-31T16:15:33.593000
|
||||
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
|
||||
CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000
|
||||
CVE-2024-13667,1,1,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
|
||||
CVE-2024-13667,0,0,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
|
||||
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
|
||||
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
|
||||
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
|
||||
CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
|
||||
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
|
||||
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
|
||||
CVE-2024-13681,1,1,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
|
||||
CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
|
||||
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
|
||||
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
|
||||
CVE-2024-13691,1,1,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
|
||||
CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
|
||||
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
|
||||
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
|
||||
CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000
|
||||
@ -246755,12 +246755,12 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c
|
||||
CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc27c,2025-02-13T05:15:14.177000
|
||||
CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000
|
||||
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
|
||||
CVE-2024-13783,1,1,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000
|
||||
CVE-2024-13783,0,0,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000
|
||||
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
|
||||
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
|
||||
CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000
|
||||
CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
|
||||
CVE-2024-13797,1,1,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000
|
||||
CVE-2024-13797,0,0,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000
|
||||
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
|
||||
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
|
||||
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
|
||||
@ -247071,7 +247071,7 @@ CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7ac
|
||||
CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000
|
||||
CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
|
||||
CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000
|
||||
CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000
|
||||
CVE-2024-1696,0,1,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
|
||||
CVE-2024-1697,0,0,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000
|
||||
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
|
||||
CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000
|
||||
@ -249146,7 +249146,7 @@ CVE-2024-21985,0,0,63520fa4ce7e029aa7afb7a06539a8fcc598f88e49929e619949a1f3683b4
|
||||
CVE-2024-21987,0,0,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000
|
||||
CVE-2024-21988,0,0,55386eaddbe790c0c8f4791da8d917ba72db26c9496e2de58c929fb47d6a62a1,2024-12-13T17:26:35.453000
|
||||
CVE-2024-21989,0,0,ec1f8c6759f34204336860d28f718a39448a2b2bdb75835c73d2b79957701208,2025-02-10T19:27:49.223000
|
||||
CVE-2024-2199,0,1,a6786599a4a5820775f4602d7a9bafaa90979aefe397312c660cd19b04d55fde,2025-02-18T11:15:12.273000
|
||||
CVE-2024-2199,0,0,a6786599a4a5820775f4602d7a9bafaa90979aefe397312c660cd19b04d55fde,2025-02-18T11:15:12.273000
|
||||
CVE-2024-21990,0,0,9eb0662307f97fc6d2796dd1976a11e5da5b34d0ec169039cd848c0a3cb7b1ef,2025-02-10T19:29:29.260000
|
||||
CVE-2024-21993,0,0,2667da6a83620bbdf6c064071c782ead828538a1f130072d020adf2efaaf4bdf,2024-11-22T15:12:38.550000
|
||||
CVE-2024-21994,0,0,dfa944ce6140f880318b48048b89b590252448e31249ca7189b297298d6f9934,2024-11-12T13:56:54.483000
|
||||
@ -249160,7 +249160,7 @@ CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c
|
||||
CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000
|
||||
CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000
|
||||
CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000
|
||||
CVE-2024-22011,0,0,d82bce95d9a57da4eb5cf6d66a8bf1abb544ebef2a691e896b0fec8f38f6dcb4,2024-11-21T08:55:23.190000
|
||||
CVE-2024-22011,0,1,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
|
||||
CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000
|
||||
CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000
|
||||
CVE-2024-22014,0,0,4cfec9b3d2520e43390c367346e4fcec3fa28706e41a48543905fc5c1d8c3d45,2024-11-21T08:55:23.560000
|
||||
@ -250818,8 +250818,8 @@ CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2
|
||||
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
|
||||
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
|
||||
CVE-2024-24272,0,0,5864839a910b3cf34f75bdf7fd1f937bb6e6ec5b97bf46e24e0cf397dc23313c,2024-11-21T08:59:05.650000
|
||||
CVE-2024-24275,0,0,bff899221792788008cea5183e97c21cd0fac0b9fb306798436d4d5ed9d8e53f,2024-11-21T08:59:05.800000
|
||||
CVE-2024-24276,0,0,061bf146868f07bcda0348cae54330a699b55d48f7a6f3e50594dab1944bd9e1,2024-11-21T08:59:05.947000
|
||||
CVE-2024-24275,0,1,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
|
||||
CVE-2024-24276,0,1,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
|
||||
CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000
|
||||
CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000
|
||||
CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000
|
||||
@ -253119,7 +253119,7 @@ CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfa
|
||||
CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000
|
||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27217,0,0,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000
|
||||
CVE-2024-27218,0,0,a6afd710b1815d5aade34dbd13f31bcc4ed06ca89b8c78421e6b3ddd9c0670f7,2024-11-21T09:04:07.573000
|
||||
CVE-2024-27218,0,1,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
|
||||
CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000
|
||||
CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000
|
||||
CVE-2024-27220,0,0,4ee101d4577b781f601dfca4d5026ead710e942a600f8f26b9599978224cc5ac,2024-11-21T09:04:07.860000
|
||||
@ -253129,9 +253129,9 @@ CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f58
|
||||
CVE-2024-27224,0,0,f785a013141b3d88fe26f11eac326de71e5d58c27726e6d6328a3f861f1bfcdb,2024-11-21T09:04:08.610000
|
||||
CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892ac7e,2024-11-21T09:04:08.790000
|
||||
CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000
|
||||
CVE-2024-27227,0,0,dcca2367d57d4397f48fa9870727f94190cbfda537f6d6f20e882fb121acdbe0,2024-11-21T09:04:09.160000
|
||||
CVE-2024-27227,0,1,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
|
||||
CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000
|
||||
CVE-2024-27229,0,0,7a8f40ae8d535da86b6dc895564969026db17e2e4974efbbbc79049db376c4f4,2024-11-21T09:04:09.467000
|
||||
CVE-2024-27229,0,1,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
|
||||
CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000
|
||||
CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000
|
||||
CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000
|
||||
@ -253140,7 +253140,7 @@ CVE-2024-27233,0,0,619ec8955cdc02f44102a12e814b0558d5d674c6696f24a4298c3a1d2ebf1
|
||||
CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
|
||||
CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49510,2024-11-21T09:04:10.320000
|
||||
CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000
|
||||
CVE-2024-27237,0,0,4a46ea8a7e5b91cb490eaca4902ef1482cd25a65e6ab90099f7d88c855e3b694,2024-11-21T09:04:10.700000
|
||||
CVE-2024-27237,0,1,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
|
||||
CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000
|
||||
CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000
|
||||
CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000
|
||||
@ -260229,7 +260229,7 @@ CVE-2024-36558,0,0,3eef99d7f2f1ab45215ec1d530d0754399299d75641595c2e163c4da0384b
|
||||
CVE-2024-3656,0,0,cc6741c2183e9b71634bb4ef1d35a6085988e0cc98193d8f3bcaf2ac00dfb710,2024-12-23T14:15:05.553000
|
||||
CVE-2024-36568,0,0,4dc3650ba5db2618f853f2d8a4fc5d941192ca1d82f4f78ca0f379bf1740efe1,2024-11-21T09:22:24.367000
|
||||
CVE-2024-36569,0,0,237834c9de6e90d428bcfe4a628116c726e8895e63611649f26cb41fa5adc5f6,2024-11-21T09:22:24.610000
|
||||
CVE-2024-3657,0,1,65371cb4ec0560a092094bc7ca0286719e773d0feaf30ac7df11d20585c946f7,2025-02-18T11:15:12.433000
|
||||
CVE-2024-3657,0,0,65371cb4ec0560a092094bc7ca0286719e773d0feaf30ac7df11d20585c946f7,2025-02-18T11:15:12.433000
|
||||
CVE-2024-36572,0,0,02acea4131ba4ced8c9d2c27f6e617000aadbd5a25e6fdc9a8033330ee9a5a90,2024-11-21T09:22:24.843000
|
||||
CVE-2024-36573,0,0,d87d175fe9382bcadec22d28685b368889b641612b84c819cf92c06630288f26,2024-11-21T09:22:25.083000
|
||||
CVE-2024-36574,0,0,d68d635dd3f24ff9c6b0ca38f06ae05b2e77100c9b5acc1aa810bfa6f9172104,2024-11-21T09:22:25.310000
|
||||
@ -261074,9 +261074,9 @@ CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9
|
||||
CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000
|
||||
CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000
|
||||
CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000
|
||||
CVE-2024-37601,0,0,f230969139cb0db1c29edc663e7a6bcf2a5122a62e631bc192f90df5a5bf5dc6,2025-02-14T21:15:15.440000
|
||||
CVE-2024-37601,0,1,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
|
||||
CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000
|
||||
CVE-2024-37603,0,0,fa43c5369171a454f76936d53f2f011e443e635e5dd34777dab9f532908923fe,2025-02-14T21:15:15.637000
|
||||
CVE-2024-37603,0,1,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
|
||||
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
|
||||
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
|
||||
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
|
||||
@ -274656,7 +274656,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b
|
||||
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
|
||||
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
|
||||
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
|
||||
CVE-2024-57241,0,0,f88252f93812dfd93d00fb4d7b494f823afd7db94b241dc55a38faafcfb5ae78,2025-02-14T21:15:15.833000
|
||||
CVE-2024-57241,0,1,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
|
||||
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
|
||||
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
|
||||
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
|
||||
@ -274977,22 +274977,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685
|
||||
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
|
||||
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
|
||||
CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000
|
||||
CVE-2024-57905,0,0,5e024729d9663e05b8d838553a39e64f4fdb461909e95216d52b10d2b1616dfd,2025-01-19T12:15:24.710000
|
||||
CVE-2024-57906,0,0,e24c60843962d8e4a1862e99f92081f350cbdcaa6bcd2463c5d63481bd29331e,2025-02-02T11:15:12.710000
|
||||
CVE-2024-57907,0,0,4f3a58345855b99d521f31233fad0f3fdb094fcc8e7c017ee3db22a1196059d4,2025-02-02T11:15:12.887000
|
||||
CVE-2024-57908,0,0,b2ccd594c2600b9fa0f2c4123bd91fa737883ad64c9536ea76cb151c6932eec8,2025-02-02T11:15:13.003000
|
||||
CVE-2024-57909,0,0,ae18a7f484593d9d8f60ee64eea22f35aef4d7728fe0680162e49c2c9c950cdb,2025-01-19T12:15:25.083000
|
||||
CVE-2024-57905,0,1,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
|
||||
CVE-2024-57906,0,1,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
|
||||
CVE-2024-57907,0,1,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
|
||||
CVE-2024-57908,0,1,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
|
||||
CVE-2024-57909,0,1,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
|
||||
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
|
||||
CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
|
||||
CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
|
||||
CVE-2024-57912,0,0,be11335be8bfa68d409a4f4804aa8268272390f1c397b2c8c2e88ef78a024412,2025-02-02T11:15:13.627000
|
||||
CVE-2024-57912,0,1,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
|
||||
CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000
|
||||
CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000
|
||||
CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000
|
||||
CVE-2024-57916,0,0,12a7bb608455922a6d14fb69d97d993b787974fabfa7435658a4922fe0472e61,2025-01-19T12:15:25.763000
|
||||
CVE-2024-57916,0,1,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
|
||||
CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000
|
||||
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
||||
CVE-2024-57919,0,0,5cbc59745d82fa4b3927b517294029f28a0b98501aaf7d89670e0f14c928e2bc,2025-01-19T12:15:26.053000
|
||||
CVE-2024-57919,0,1,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
||||
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
|
||||
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
||||
@ -275194,7 +275194,7 @@ CVE-2024-5949,0,0,fe5e2637150e272cf082537e0e3cefdb0d839b62c75d205d27884005afec17
|
||||
CVE-2024-5950,0,0,a78d500e380a8683be6de1b6ede7696fb96614af4e886c1082dc67edbebdb180,2024-11-21T09:48:38.043000
|
||||
CVE-2024-5951,0,0,6ca5ff3cd42fd08fff399488183cbf1951f9079ffd4d29e5f2b6b2af828d5de9,2024-11-21T09:48:38.163000
|
||||
CVE-2024-5952,0,0,a190c9a9018a1f2ab58177f40637c06f330e66f62b7b6378f23916dd2d1714f0,2024-11-21T09:48:38.283000
|
||||
CVE-2024-5953,0,1,aa4a50ea7577493ef9dcd7257a58de9a2e34c293141ccd6914bd12d0dc638726,2025-02-18T11:15:12.583000
|
||||
CVE-2024-5953,0,0,aa4a50ea7577493ef9dcd7257a58de9a2e34c293141ccd6914bd12d0dc638726,2025-02-18T11:15:12.583000
|
||||
CVE-2024-5955,0,0,507aeceb22df9806a088e192ead5b6d5ae63c1088b74893a0b3c7d743ea2b6e3,2024-12-20T06:15:22.943000
|
||||
CVE-2024-5956,0,0,e9563f3d433df5f631aaa571a1b9eb69e01bff299de8e6814f8c22eb94c0eed5,2024-09-06T16:25:19.253000
|
||||
CVE-2024-5957,0,0,0c96b582bddb8809e949513e2b3e6545ad729973e5974f8b12406a050d04a9ee,2024-09-06T16:24:23.317000
|
||||
@ -278969,7 +278969,7 @@ CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a47
|
||||
CVE-2025-0516,0,0,54ab7a64b43a5bfec8dcc0561006b4b6d888b05cbf982c088d6e719e3d73b992,2025-02-12T16:15:42.883000
|
||||
CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000
|
||||
CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000
|
||||
CVE-2025-0521,1,1,d141672158f3dd6b43e8362cbb49b94292957b9dc12c9c2a20a4b4cb911bea60,2025-02-18T11:15:12.740000
|
||||
CVE-2025-0521,0,0,d141672158f3dd6b43e8362cbb49b94292957b9dc12c9c2a20a4b4cb911bea60,2025-02-18T11:15:12.740000
|
||||
CVE-2025-0522,0,0,c8a0deca91ab7a70ac2596d161948276f43ea6a4ed62efff36cb1682db433422,2025-02-06T15:15:17.127000
|
||||
CVE-2025-0525,0,0,babf1a33188acdd067666dc0ba0175c8755fd69045eceebc9e557709ce71228e,2025-02-11T15:15:19.370000
|
||||
CVE-2025-0526,0,0,53dec4a6dd32d10587365e0ad07600d979649e21e792ed7853f6469f9e22a090,2025-02-11T15:15:19.520000
|
||||
@ -279127,7 +279127,7 @@ CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34
|
||||
CVE-2025-0814,0,0,6e84b81253656a1d32a82ba911740347214b0ddf70b532a879c2dbfdc544f5dd,2025-02-13T07:15:10.973000
|
||||
CVE-2025-0815,0,0,7de889e4d3bd0a2a91237ff690c09d713b31f9d5f2a51b5b2591129d680ff441,2025-02-13T07:15:11.160000
|
||||
CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c34291,2025-02-13T07:15:11.353000
|
||||
CVE-2025-0817,1,1,fa85cbf919c0f1f78d80bbc9c45d6dbc7441179fd105aef6a72c7d08c87fad7f,2025-02-18T11:15:12.893000
|
||||
CVE-2025-0817,0,0,fa85cbf919c0f1f78d80bbc9c45d6dbc7441179fd105aef6a72c7d08c87fad7f,2025-02-18T11:15:12.893000
|
||||
CVE-2025-0821,0,0,eef623ecbc4f931b67c977737dbf8b956ec963ba6d7dfab149142eb36bc3e525,2025-02-14T11:15:10.230000
|
||||
CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d92,2025-02-15T13:15:28.847000
|
||||
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
|
||||
@ -279228,7 +279228,7 @@ CVE-2025-1023,0,0,39df3b4906147b7a327b7abf854deb2df3fce38458ba003b8ff0de0bf89476
|
||||
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
|
||||
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
|
||||
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
|
||||
CVE-2025-1035,1,1,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
|
||||
CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
|
||||
CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000
|
||||
CVE-2025-1044,0,0,c0ae396acdc4cb805f7c247ba80e9ae0bf74adcc41c3f7c47e03b883299d9f0b,2025-02-11T20:15:35.913000
|
||||
CVE-2025-1052,0,0,aec20324a2d34b4ccc027cb34c73e0a932e87739ed38f2c72735848089a66235,2025-02-11T20:15:36.070000
|
||||
@ -279352,6 +279352,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
|
||||
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000
|
||||
CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000
|
||||
CVE-2025-1269,1,1,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000
|
||||
@ -279397,6 +279398,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b
|
||||
CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000
|
||||
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
|
||||
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
|
||||
CVE-2025-1414,1,1,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -280925,7 +280927,7 @@ CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22
|
||||
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
|
||||
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
|
||||
CVE-2025-24031,0,0,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000
|
||||
CVE-2025-24032,0,0,7b65a1bdbe0761250b9026d009c67b62fd4a97ffbb0e14891aabfd53a479ecd8,2025-02-10T16:15:39.153000
|
||||
CVE-2025-24032,0,1,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
|
||||
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
|
||||
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
|
||||
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
|
||||
@ -281513,10 +281515,10 @@ CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c773527
|
||||
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
|
||||
CVE-2025-25897,0,0,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000
|
||||
CVE-2025-25898,0,0,ce3f5d0179ed4ddc6d491c3be6fbda7289ce3638f8b82677f1620f1da2e7683b,2025-02-14T17:15:20.917000
|
||||
CVE-2025-25898,0,1,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
|
||||
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
|
||||
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
|
||||
CVE-2025-25901,0,0,4bb3318a426075afea20e3cd7e6ccc008d1508d9384b2eedc4349a3b069c9099,2025-02-13T16:16:50.180000
|
||||
CVE-2025-25901,0,1,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
|
||||
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
|
||||
CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000
|
||||
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user