Update NVD
This commit is contained in:
parent
4524f69496
commit
db1ee937b0
49849 changed files with 139060 additions and 64056 deletions
|
@ -560,7 +560,7 @@ $(document).ready(
|
|||
<p>
|
||||
The CPE API is used to easily retrieve information on a single CPE record or a collection
|
||||
of CPE records from the <a href="/products/cpe/statistics"> Official CPE Dictionary</a> .
|
||||
The dictionary contains <span id="apiCpeNames">1,378,603</span>
|
||||
The dictionary contains <span id="apiCpeNames">1,379,868</span>
|
||||
CPE Names and more than 420,000
|
||||
match strings. Because of this, the NVD enforces
|
||||
offset-based pagination to answer requests for large collections. Through a series of
|
||||
|
|
|
@ -118,7 +118,7 @@ body>* {
|
|||
rel="shortcut icon" type="image/x-icon" />
|
||||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||||
type="image/x-icon" />
|
||||
<meta name="_csrf" content="2ffd8117-e61e-41b6-881d-2156eba0ece8" />
|
||||
<meta name="_csrf" content="6326163c-fb74-4e0a-8929-7abc732338c1" />
|
||||
<meta charset="UTF-8">
|
||||
<script>
|
||||
function onSubmit(token) {
|
||||
|
@ -536,7 +536,7 @@ body>* {
|
|||
id="apiKeyRequestForm"
|
||||
action="/developers/api-key-requested"
|
||||
method="POST"
|
||||
style="border: 1px solid #1b1b1b90;" data-nvd-form="true"><input type="hidden" name="_csrf" value="2ffd8117-e61e-41b6-881d-2156eba0ece8"/>
|
||||
style="border: 1px solid #1b1b1b90;" data-nvd-form="true"><input type="hidden" name="_csrf" value="6326163c-fb74-4e0a-8929-7abc732338c1"/>
|
||||
|
||||
<br/>
|
||||
|
||||
|
|
|
@ -559,7 +559,7 @@ $(document).ready(
|
|||
<h3>CVE API</h3>
|
||||
<p>
|
||||
The CVE API is used to easily retrieve information on a single CVE or a collection
|
||||
of CVE from the NVD. The NVD contains <span id="apiCveCount">285,277</span>
|
||||
of CVE from the NVD. The NVD contains <span id="apiCveCount">285,640</span>
|
||||
CVE records. Because of this, its APIs enforce
|
||||
offset-based pagination to answer requests for large collections. Through a series of
|
||||
smaller “chunked” responses controlled by an offset <code>startIndex</code> and a page
|
||||
|
|
|
@ -629,7 +629,7 @@ body>* {
|
|||
<tr>
|
||||
<td><a href="https://cve.org" target="_blank" rel="noopener noreferrer">CVE
|
||||
Vulnerabilities</a></td>
|
||||
<td>285277</td>
|
||||
<td>285640</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://ncp.nist.gov">Checklists</a></td>
|
||||
|
@ -652,7 +652,7 @@ body>* {
|
|||
</tr>
|
||||
<tr>
|
||||
<td><a href="/products/cpe">CPE Names</a></td>
|
||||
<td >1378603</td>
|
||||
<td >1379868</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
@ -764,26 +764,20 @@ body>* {
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52585"
|
||||
id="cveDetailAnchor-0">CVE-2023-52585</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
|
||||
|
||||
Return invalid error code -EINVAL for invalid block id.
|
||||
|
||||
Fixes the below:
|
||||
|
||||
drivers/gpu/drm/am...
|
||||
<strong><a href="/vuln/detail/CVE-2025-28867"
|
||||
id="cveDetailAnchor-0">CVE-2025-28867</a></strong> - Cross-Site Request Forgery (CSRF) vulnerability in stesvis Frontpage category filter allows Cross Site Request Forgery. This issue affects Frontpage category filter: from n/a through 1.0.2.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52585#vulnDescriptionTitle">read CVE-2023-52585</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:07 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 11, 2025; 5:15:44 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-0">
|
||||
|
||||
|
||||
<span id="cvss3-link-0"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-28867&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-0" aria-label="V3 score for CVE-2025-28867">8.8 HIGH</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -791,23 +785,20 @@ drivers/gpu/drm/am...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52591"
|
||||
id="cveDetailAnchor-1">CVE-2023-52591</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
reiserfs: Avoid touching renamed directory if parent does not change
|
||||
|
||||
The VFS will not be locking moved directory if its parent does not
|
||||
change. Change reiserfs rename code to av...
|
||||
<strong><a href="/vuln/detail/CVE-2025-28870"
|
||||
id="cveDetailAnchor-1">CVE-2025-28870</a></strong> - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in amocrm amoCRM WebForm allows DOM-Based XSS. This issue affects amoCRM WebForm: from n/a through 1.1.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52591#vulnDescriptionTitle">read CVE-2023-52591</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:08 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 11, 2025; 5:15:44 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-1">
|
||||
|
||||
|
||||
<span id="cvss3-link-1"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-28870&vector=AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-1" aria-label="V3 score for CVE-2025-28870">5.4 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -815,23 +806,23 @@ change. Change reiserfs rename code to av...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52597"
|
||||
id="cveDetailAnchor-2">CVE-2023-52597</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
KVM: s390: fix setting of fpc register
|
||||
|
||||
kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
|
||||
(fpc) register of a guest cpu. The new value is tested for validity...
|
||||
<strong><a href="/vuln/detail/CVE-2021-44923"
|
||||
id="cveDetailAnchor-2">CVE-2021-44923</a></strong> - A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52597#vulnDescriptionTitle">read CVE-2023-52597</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:09 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
December 21, 2021; 4:15:07 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-2">
|
||||
|
||||
|
||||
<span id="cvss3-link-2"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44923&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-2" aria-label="V3 score for CVE-2021-44923">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-2"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44923&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-2" aria-label="V2 score for CVE-2021-44923">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -839,23 +830,20 @@ kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52601"
|
||||
id="cveDetailAnchor-3">CVE-2023-52601</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
jfs: fix array-index-out-of-bounds in dbAdjTree
|
||||
|
||||
Currently there is a bound check missing in the dbAdjTree while
|
||||
accessing the dmt_stree. To add the required check added the bool...
|
||||
<strong><a href="/vuln/detail/CVE-2022-4645"
|
||||
id="cveDetailAnchor-3">CVE-2022-4645</a></strong> - LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52601#vulnDescriptionTitle">read CVE-2023-52601</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:10 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 03, 2023; 11:15:09 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-3">
|
||||
|
||||
|
||||
<span id="cvss3-link-3"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-4645&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-3" aria-label="V3 score for CVE-2022-4645">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -863,166 +851,22 @@ accessing the dmt_stree. To add the required check added the bool...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52602"
|
||||
id="cveDetailAnchor-4">CVE-2023-52602</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
jfs: fix slab-out-of-bounds Read in dtSearch
|
||||
|
||||
Currently while searching for current page in the sorted entry table
|
||||
of the page there is a out of bound access. Added a bound check...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52602#vulnDescriptionTitle">read CVE-2023-52602</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:10 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-4">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52607"
|
||||
id="cveDetailAnchor-5">CVE-2023-52607</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
|
||||
|
||||
kasprintf() returns a pointer to dynamically allocated memory
|
||||
which can be NULL upon failure. Ensure the allocation...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52607#vulnDescriptionTitle">read CVE-2023-52607</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:11 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-5">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2024-26627"
|
||||
id="cveDetailAnchor-6">CVE-2024-26627</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
|
||||
|
||||
Inside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host
|
||||
lock every time for deciding ...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2024-26627#vulnDescriptionTitle">read CVE-2024-26627</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:12 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-6">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46978"
|
||||
id="cveDetailAnchor-7">CVE-2021-46978</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
KVM: nVMX: Always make an attempt to map eVMCS after migration
|
||||
|
||||
When enlightened VMCS is in use and nested state is migrated with
|
||||
vmx_get_nested_state()/vmx_set_nested_state() KV...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46978#vulnDescriptionTitle">read CVE-2021-46978</a><br> <strong>Published:</strong>
|
||||
February 28, 2024; 4:15:37 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-7">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46973"
|
||||
id="cveDetailAnchor-8">CVE-2021-46973</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
net: qrtr: Avoid potential use after free in MHI send
|
||||
|
||||
It is possible that the MHI ul_callback will be invoked immediately
|
||||
following the queueing of the skb for transmission, lea...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46973#vulnDescriptionTitle">read CVE-2021-46973</a><br> <strong>Published:</strong>
|
||||
February 27, 2024; 2:04:07 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-8">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46957"
|
||||
id="cveDetailAnchor-9">CVE-2021-46957</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
|
||||
|
||||
The execution of sys_read end up hitting a BUG_ON() in __find_get_block
|
||||
after installing kprobe at sys_rea...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46957#vulnDescriptionTitle">read CVE-2021-46957</a><br> <strong>Published:</strong>
|
||||
February 27, 2024; 2:04:06 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-9">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2020-16304"
|
||||
id="cveDetailAnchor-10">CVE-2020-16304</a></strong> - A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.
|
||||
<strong><a href="/vuln/detail/CVE-2020-17538"
|
||||
id="cveDetailAnchor-4">CVE-2020-17538</a></strong> - A buffer overflow vulnerability in GetNumSameData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
August 12, 2020; 11:15:14 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-10">
|
||||
<p id="severity-score-4">
|
||||
|
||||
<span id="cvss3-link-10"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16304&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-10" aria-label="V3 score for CVE-2020-16304">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-10"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16304&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-10" aria-label="V2 score for CVE-2020-16304">4.3 MEDIUM</a><br />
|
||||
<span id="cvss3-link-4"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-17538&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-4" aria-label="V3 score for CVE-2020-17538">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-4"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-17538&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-4" aria-label="V2 score for CVE-2020-17538">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1031,22 +875,22 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2020-16297"
|
||||
id="cveDetailAnchor-11">CVE-2020-16297</a></strong> - A buffer overflow vulnerability in FloydSteinbergDitheringC() in contrib/gdevbjca.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
<strong><a href="/vuln/detail/CVE-2020-16296"
|
||||
id="cveDetailAnchor-5">CVE-2020-16296</a></strong> - A buffer overflow vulnerability in GetNumWrongData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
August 12, 2020; 11:15:13 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-11">
|
||||
<p id="severity-score-5">
|
||||
|
||||
<span id="cvss3-link-11"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16297&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2020-16297">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-11"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16297&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-11" aria-label="V2 score for CVE-2020-16297">4.3 MEDIUM</a><br />
|
||||
<span id="cvss3-link-5"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16296&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-5" aria-label="V3 score for CVE-2020-16296">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-5"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16296&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-5" aria-label="V2 score for CVE-2020-16296">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1055,19 +899,181 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36274"
|
||||
id="cveDetailAnchor-12">CVE-2023-36274</a></strong> - LibreDWG v0.11 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2018-14015"
|
||||
id="cveDetailAnchor-6">CVE-2018-14015</a></strong> - The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-14015#vulnDescriptionTitle">read CVE-2018-14015</a><br> <strong>Published:</strong>
|
||||
July 12, 2018; 4:29:00 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-6">
|
||||
|
||||
<span id="cvss3-link-6"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-14015&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-6" aria-label="V3 score for CVE-2018-14015">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-6"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-14015&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-6" aria-label="V2 score for CVE-2018-14015">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2017-17506"
|
||||
id="cveDetailAnchor-7">CVE-2017-17506</a></strong> - In HDF5 1.10.1, there is an out of bounds read vulnerability in the function H5Opline_pline_decode in H5Opline.c in libhdf5.a. For example, h5dump would crash when someone opens a crafted hdf5 file.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
December 10, 2017; 10:29:00 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-7">
|
||||
|
||||
<span id="cvss3-link-7"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2017-17506&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-7" aria-label="V3 score for CVE-2017-17506">6.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-7"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2017-17506&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-7" aria-label="V2 score for CVE-2017-17506">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-13873"
|
||||
id="cveDetailAnchor-8">CVE-2018-13873</a></strong> - An issue was discovered in the HDF HDF5 1.8.20 library. There is a buffer over-read in H5O_chunk_deserialize in H5Ocache.c.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
July 10, 2018; 5:29:00 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-8">
|
||||
|
||||
<span id="cvss3-link-8"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-13873&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-8" aria-label="V3 score for CVE-2018-13873">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-8"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-13873&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-8" aria-label="V2 score for CVE-2018-13873">7.5 HIGH</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49190"
|
||||
id="cveDetailAnchor-9">CVE-2022-49190</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
kernel/resource: fix kfree() of bootmem memory again
|
||||
|
||||
Since commit ebff7d8f270d ("mem hotunplug: fix kfree() of bootmem
|
||||
memory"), we could get a resource allocated during boot vi...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49190#vulnDescriptionTitle">read CVE-2022-49190</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:56 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-9">
|
||||
|
||||
<span id="cvss3-link-9"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49190&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-9" aria-label="V3 score for CVE-2022-49190">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49201"
|
||||
id="cveDetailAnchor-10">CVE-2022-49201</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
ibmvnic: fix race between xmit and reset
|
||||
|
||||
There is a race between reset and the transmit paths that can lead to
|
||||
ibmvnic_xmit() accessing an scrq after it has been freed in the re...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49201#vulnDescriptionTitle">read CVE-2022-49201</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-10">
|
||||
|
||||
<span id="cvss3-link-10"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49201&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-10" aria-label="V3 score for CVE-2022-49201">4.7 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49203"
|
||||
id="cveDetailAnchor-11">CVE-2022-49203</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
drm/amd/display: Fix double free during GPU reset on DC streams
|
||||
|
||||
[Why]
|
||||
The issue only occurs during the GPU reset code path.
|
||||
|
||||
We first backup the current state prior to commiting...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49203#vulnDescriptionTitle">read CVE-2022-49203</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-11">
|
||||
|
||||
<span id="cvss3-link-11"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49203&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2022-49203">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49206"
|
||||
id="cveDetailAnchor-12">CVE-2022-49206</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
|
||||
|
||||
In case the second xa_insert() fails, the obj_event is not released. Fix
|
||||
the error unwind flow to free that...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49206#vulnDescriptionTitle">read CVE-2022-49206</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-12">
|
||||
|
||||
<span id="cvss3-link-12"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36274&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-12" aria-label="V3 score for CVE-2023-36274">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49206&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-12" aria-label="V3 score for CVE-2022-49206">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1076,19 +1082,25 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36271"
|
||||
id="cveDetailAnchor-13">CVE-2023-36271</a></strong> - LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49207"
|
||||
id="cveDetailAnchor-13">CVE-2022-49207</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
bpf, sockmap: Fix memleak in sk_psock_queue_msg
|
||||
|
||||
If tcp_bpf_sendmsg is running during a tear down operation we may enqueue
|
||||
data on the ingress msg queue while tear down is trying...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49207#vulnDescriptionTitle">read CVE-2022-49207</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-13">
|
||||
|
||||
<span id="cvss3-link-13"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36271&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2023-36271">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49207&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2022-49207">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1097,19 +1109,27 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36272"
|
||||
id="cveDetailAnchor-14">CVE-2023-36272</a></strong> - LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49208"
|
||||
id="cveDetailAnchor-14">CVE-2022-49208</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
RDMA/irdma: Prevent some integer underflows
|
||||
|
||||
My static checker complains that:
|
||||
|
||||
drivers/infiniband/hw/irdma/ctrl.c:3605 irdma_sc_ceq_init()
|
||||
warn: can subtract underflow '...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49208#vulnDescriptionTitle">read CVE-2022-49208</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-14">
|
||||
|
||||
<span id="cvss3-link-14"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36272&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-14" aria-label="V3 score for CVE-2023-36272">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49208&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-14" aria-label="V3 score for CVE-2022-49208">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1118,23 +1138,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2019-8394"
|
||||
id="cveDetailAnchor-15">CVE-2019-8394</a></strong> - Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49209"
|
||||
id="cveDetailAnchor-15">CVE-2022-49209</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
|
||||
|
||||
If tcp_bpf_sendmsg() is running while sk msg is full. When sk_msg_alloc()
|
||||
returns -ENOMEM error, tcp_bpf_sendms...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
February 16, 2019; 11:29:00 PM -0500
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49209#vulnDescriptionTitle">read CVE-2022-49209</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-15">
|
||||
|
||||
<span id="cvss3-link-15"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2019-8394&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-15" aria-label="V3 score for CVE-2019-8394">6.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-15"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2019-8394&vector=(AV:N/AC:L/Au:S/C:N/I:P/A:N)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-15" aria-label="V2 score for CVE-2019-8394">4.0 MEDIUM</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49209&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-15" aria-label="V3 score for CVE-2022-49209">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1142,24 +1165,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-20753"
|
||||
id="cveDetailAnchor-16">CVE-2018-20753</a></strong> - Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the ...
|
||||
<strong><a href="/vuln/detail/CVE-2022-49210"
|
||||
id="cveDetailAnchor-16">CVE-2022-49210</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
MIPS: pgalloc: fix memory leak caused by pgd_free()
|
||||
|
||||
pgd page is freed by generic implementation pgd_free() since commit
|
||||
f9cb654cb550 ("asm-generic: pgalloc: provide generic pgd_...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-20753#vulnDescriptionTitle">read CVE-2018-20753</a><br> <strong>Published:</strong>
|
||||
February 05, 2019; 1:29:00 AM -0500
|
||||
href="/vuln/detail/CVE-2022-49210#vulnDescriptionTitle">read CVE-2022-49210</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-16">
|
||||
|
||||
<span id="cvss3-link-16"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-20753&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-16" aria-label="V3 score for CVE-2018-20753">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-16"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-20753&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-16" aria-label="V2 score for CVE-2018-20753">7.5 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49210&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-16" aria-label="V3 score for CVE-2022-49210">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1167,23 +1192,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19323"
|
||||
id="cveDetailAnchor-17">CVE-2018-19323</a></strong> - The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes functionality to read and write Machine Specific Registers (MSRs).
|
||||
<strong><a href="/vuln/detail/CVE-2022-49211"
|
||||
id="cveDetailAnchor-17">CVE-2022-49211</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
|
||||
|
||||
The of_find_compatible_node() function returns a node pointer with
|
||||
refcount incremented, We should use of_node_put() on it w...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49211#vulnDescriptionTitle">read CVE-2022-49211</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-17">
|
||||
|
||||
<span id="cvss3-link-17"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19323&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-17" aria-label="V3 score for CVE-2018-19323">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-17"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19323&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:C)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-17" aria-label="V2 score for CVE-2018-19323">9.0 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49211&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-17" aria-label="V3 score for CVE-2022-49211">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1191,24 +1219,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19322"
|
||||
id="cveDetailAnchor-18">CVE-2018-19322</a></strong> - The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read/write data from/to IO ports. This could be l...
|
||||
<strong><a href="/vuln/detail/CVE-2021-47631"
|
||||
id="cveDetailAnchor-18">CVE-2021-47631</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
ARM: davinci: da850-evm: Avoid NULL pointer dereference
|
||||
|
||||
With newer versions of GCC, there is a panic in da850_evm_config_emac()
|
||||
when booting multi_v5_defconfig in QEMU under the...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-19322#vulnDescriptionTitle">read CVE-2018-19322</a><br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
href="/vuln/detail/CVE-2021-47631#vulnDescriptionTitle">read CVE-2021-47631</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 1:37:04 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-18">
|
||||
|
||||
<span id="cvss3-link-18"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19322&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-18" aria-label="V3 score for CVE-2018-19322">7.8 HIGH</a><br />
|
||||
</span> <span id="cvss2-link-18"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19322&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-18" aria-label="V2 score for CVE-2018-19322">4.6 MEDIUM</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-47631&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-18" aria-label="V3 score for CVE-2021-47631">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1216,24 +1246,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19321"
|
||||
id="cveDetailAnchor-19">CVE-2018-19321</a></strong> - The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This co...
|
||||
<strong><a href="/vuln/detail/CVE-2021-47632"
|
||||
id="cveDetailAnchor-19">CVE-2021-47632</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
|
||||
|
||||
Commit 1f9ad21c3b38 ("powerpc/mm: Implement set_memory() routines")
|
||||
included a spin_lock() to change_page_attr...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-19321#vulnDescriptionTitle">read CVE-2018-19321</a><br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
href="/vuln/detail/CVE-2021-47632#vulnDescriptionTitle">read CVE-2021-47632</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 1:37:04 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-19">
|
||||
|
||||
<span id="cvss3-link-19"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19321&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-19" aria-label="V3 score for CVE-2018-19321">7.8 HIGH</a><br />
|
||||
</span> <span id="cvss2-link-19"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19321&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-19" aria-label="V2 score for CVE-2018-19321">7.2 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-47632&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-19" aria-label="V3 score for CVE-2021-47632">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
|
|
@ -710,26 +710,20 @@ body>* {
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52585"
|
||||
id="cveDetailAnchor-0">CVE-2023-52585</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
|
||||
|
||||
Return invalid error code -EINVAL for invalid block id.
|
||||
|
||||
Fixes the below:
|
||||
|
||||
drivers/gpu/drm/am...
|
||||
<strong><a href="/vuln/detail/CVE-2025-28867"
|
||||
id="cveDetailAnchor-0">CVE-2025-28867</a></strong> - Cross-Site Request Forgery (CSRF) vulnerability in stesvis Frontpage category filter allows Cross Site Request Forgery. This issue affects Frontpage category filter: from n/a through 1.0.2.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52585#vulnDescriptionTitle">read CVE-2023-52585</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:07 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 11, 2025; 5:15:44 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-0">
|
||||
|
||||
|
||||
<span id="cvss3-link-0"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-28867&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-0" aria-label="V3 score for CVE-2025-28867">8.8 HIGH</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -737,23 +731,20 @@ drivers/gpu/drm/am...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52591"
|
||||
id="cveDetailAnchor-1">CVE-2023-52591</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
reiserfs: Avoid touching renamed directory if parent does not change
|
||||
|
||||
The VFS will not be locking moved directory if its parent does not
|
||||
change. Change reiserfs rename code to av...
|
||||
<strong><a href="/vuln/detail/CVE-2025-28870"
|
||||
id="cveDetailAnchor-1">CVE-2025-28870</a></strong> - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in amocrm amoCRM WebForm allows DOM-Based XSS. This issue affects amoCRM WebForm: from n/a through 1.1.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52591#vulnDescriptionTitle">read CVE-2023-52591</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:08 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 11, 2025; 5:15:44 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-1">
|
||||
|
||||
|
||||
<span id="cvss3-link-1"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-28870&vector=AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-1" aria-label="V3 score for CVE-2025-28870">5.4 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -761,23 +752,23 @@ change. Change reiserfs rename code to av...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52597"
|
||||
id="cveDetailAnchor-2">CVE-2023-52597</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
KVM: s390: fix setting of fpc register
|
||||
|
||||
kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
|
||||
(fpc) register of a guest cpu. The new value is tested for validity...
|
||||
<strong><a href="/vuln/detail/CVE-2021-44923"
|
||||
id="cveDetailAnchor-2">CVE-2021-44923</a></strong> - A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52597#vulnDescriptionTitle">read CVE-2023-52597</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:09 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
December 21, 2021; 4:15:07 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-2">
|
||||
|
||||
|
||||
<span id="cvss3-link-2"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44923&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-2" aria-label="V3 score for CVE-2021-44923">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-2"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44923&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-2" aria-label="V2 score for CVE-2021-44923">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -785,23 +776,20 @@ kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52601"
|
||||
id="cveDetailAnchor-3">CVE-2023-52601</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
jfs: fix array-index-out-of-bounds in dbAdjTree
|
||||
|
||||
Currently there is a bound check missing in the dbAdjTree while
|
||||
accessing the dmt_stree. To add the required check added the bool...
|
||||
<strong><a href="/vuln/detail/CVE-2022-4645"
|
||||
id="cveDetailAnchor-3">CVE-2022-4645</a></strong> - LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52601#vulnDescriptionTitle">read CVE-2023-52601</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:10 AM -0500
|
||||
<br> <strong>Published:</strong>
|
||||
March 03, 2023; 11:15:09 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-3">
|
||||
|
||||
|
||||
<span id="cvss3-link-3"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-4645&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-3" aria-label="V3 score for CVE-2022-4645">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -809,166 +797,22 @@ accessing the dmt_stree. To add the required check added the bool...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52602"
|
||||
id="cveDetailAnchor-4">CVE-2023-52602</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
jfs: fix slab-out-of-bounds Read in dtSearch
|
||||
|
||||
Currently while searching for current page in the sorted entry table
|
||||
of the page there is a out of bound access. Added a bound check...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52602#vulnDescriptionTitle">read CVE-2023-52602</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:10 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-4">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-52607"
|
||||
id="cveDetailAnchor-5">CVE-2023-52607</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
|
||||
|
||||
kasprintf() returns a pointer to dynamically allocated memory
|
||||
which can be NULL upon failure. Ensure the allocation...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2023-52607#vulnDescriptionTitle">read CVE-2023-52607</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:11 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-5">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2024-26627"
|
||||
id="cveDetailAnchor-6">CVE-2024-26627</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
|
||||
|
||||
Inside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host
|
||||
lock every time for deciding ...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2024-26627#vulnDescriptionTitle">read CVE-2024-26627</a><br> <strong>Published:</strong>
|
||||
March 06, 2024; 2:15:12 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-6">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46978"
|
||||
id="cveDetailAnchor-7">CVE-2021-46978</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
KVM: nVMX: Always make an attempt to map eVMCS after migration
|
||||
|
||||
When enlightened VMCS is in use and nested state is migrated with
|
||||
vmx_get_nested_state()/vmx_set_nested_state() KV...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46978#vulnDescriptionTitle">read CVE-2021-46978</a><br> <strong>Published:</strong>
|
||||
February 28, 2024; 4:15:37 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-7">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46973"
|
||||
id="cveDetailAnchor-8">CVE-2021-46973</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
net: qrtr: Avoid potential use after free in MHI send
|
||||
|
||||
It is possible that the MHI ul_callback will be invoked immediately
|
||||
following the queueing of the skb for transmission, lea...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46973#vulnDescriptionTitle">read CVE-2021-46973</a><br> <strong>Published:</strong>
|
||||
February 27, 2024; 2:04:07 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-8">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2021-46957"
|
||||
id="cveDetailAnchor-9">CVE-2021-46957</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
|
||||
|
||||
The execution of sys_read end up hitting a BUG_ON() in __find_get_block
|
||||
after installing kprobe at sys_rea...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2021-46957#vulnDescriptionTitle">read CVE-2021-46957</a><br> <strong>Published:</strong>
|
||||
February 27, 2024; 2:04:06 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-9">
|
||||
|
||||
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2020-16304"
|
||||
id="cveDetailAnchor-10">CVE-2020-16304</a></strong> - A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.
|
||||
<strong><a href="/vuln/detail/CVE-2020-17538"
|
||||
id="cveDetailAnchor-4">CVE-2020-17538</a></strong> - A buffer overflow vulnerability in GetNumSameData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
August 12, 2020; 11:15:14 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-10">
|
||||
<p id="severity-score-4">
|
||||
|
||||
<span id="cvss3-link-10"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16304&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-10" aria-label="V3 score for CVE-2020-16304">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-10"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16304&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-10" aria-label="V2 score for CVE-2020-16304">4.3 MEDIUM</a><br />
|
||||
<span id="cvss3-link-4"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-17538&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-4" aria-label="V3 score for CVE-2020-17538">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-4"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-17538&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-4" aria-label="V2 score for CVE-2020-17538">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -977,22 +821,22 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2020-16297"
|
||||
id="cveDetailAnchor-11">CVE-2020-16297</a></strong> - A buffer overflow vulnerability in FloydSteinbergDitheringC() in contrib/gdevbjca.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
<strong><a href="/vuln/detail/CVE-2020-16296"
|
||||
id="cveDetailAnchor-5">CVE-2020-16296</a></strong> - A buffer overflow vulnerability in GetNumWrongData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
August 12, 2020; 11:15:13 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-11">
|
||||
<p id="severity-score-5">
|
||||
|
||||
<span id="cvss3-link-11"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16297&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2020-16297">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-11"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16297&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-11" aria-label="V2 score for CVE-2020-16297">4.3 MEDIUM</a><br />
|
||||
<span id="cvss3-link-5"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-16296&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-5" aria-label="V3 score for CVE-2020-16296">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-5"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-16296&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-5" aria-label="V2 score for CVE-2020-16296">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1001,19 +845,181 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36274"
|
||||
id="cveDetailAnchor-12">CVE-2023-36274</a></strong> - LibreDWG v0.11 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2018-14015"
|
||||
id="cveDetailAnchor-6">CVE-2018-14015</a></strong> - The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-14015#vulnDescriptionTitle">read CVE-2018-14015</a><br> <strong>Published:</strong>
|
||||
July 12, 2018; 4:29:00 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-6">
|
||||
|
||||
<span id="cvss3-link-6"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-14015&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-6" aria-label="V3 score for CVE-2018-14015">5.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-6"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-14015&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-6" aria-label="V2 score for CVE-2018-14015">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2017-17506"
|
||||
id="cveDetailAnchor-7">CVE-2017-17506</a></strong> - In HDF5 1.10.1, there is an out of bounds read vulnerability in the function H5Opline_pline_decode in H5Opline.c in libhdf5.a. For example, h5dump would crash when someone opens a crafted hdf5 file.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
December 10, 2017; 10:29:00 PM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-7">
|
||||
|
||||
<span id="cvss3-link-7"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2017-17506&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-7" aria-label="V3 score for CVE-2017-17506">6.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-7"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2017-17506&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-7" aria-label="V2 score for CVE-2017-17506">4.3 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-13873"
|
||||
id="cveDetailAnchor-8">CVE-2018-13873</a></strong> - An issue was discovered in the HDF HDF5 1.8.20 library. There is a buffer over-read in H5O_chunk_deserialize in H5Ocache.c.
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
July 10, 2018; 5:29:00 PM -0400
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-8">
|
||||
|
||||
<span id="cvss3-link-8"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-13873&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-8" aria-label="V3 score for CVE-2018-13873">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-8"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-13873&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-8" aria-label="V2 score for CVE-2018-13873">7.5 HIGH</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49190"
|
||||
id="cveDetailAnchor-9">CVE-2022-49190</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
kernel/resource: fix kfree() of bootmem memory again
|
||||
|
||||
Since commit ebff7d8f270d ("mem hotunplug: fix kfree() of bootmem
|
||||
memory"), we could get a resource allocated during boot vi...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49190#vulnDescriptionTitle">read CVE-2022-49190</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:56 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-9">
|
||||
|
||||
<span id="cvss3-link-9"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49190&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-9" aria-label="V3 score for CVE-2022-49190">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49201"
|
||||
id="cveDetailAnchor-10">CVE-2022-49201</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
ibmvnic: fix race between xmit and reset
|
||||
|
||||
There is a race between reset and the transmit paths that can lead to
|
||||
ibmvnic_xmit() accessing an scrq after it has been freed in the re...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49201#vulnDescriptionTitle">read CVE-2022-49201</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-10">
|
||||
|
||||
<span id="cvss3-link-10"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49201&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-10" aria-label="V3 score for CVE-2022-49201">4.7 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49203"
|
||||
id="cveDetailAnchor-11">CVE-2022-49203</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
drm/amd/display: Fix double free during GPU reset on DC streams
|
||||
|
||||
[Why]
|
||||
The issue only occurs during the GPU reset code path.
|
||||
|
||||
We first backup the current state prior to commiting...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49203#vulnDescriptionTitle">read CVE-2022-49203</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-11">
|
||||
|
||||
<span id="cvss3-link-11"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49203&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2022-49203">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2022-49206"
|
||||
id="cveDetailAnchor-12">CVE-2022-49206</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
|
||||
|
||||
In case the second xa_insert() fails, the obj_event is not released. Fix
|
||||
the error unwind flow to free that...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49206#vulnDescriptionTitle">read CVE-2022-49206</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-12">
|
||||
|
||||
<span id="cvss3-link-12"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36274&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-12" aria-label="V3 score for CVE-2023-36274">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49206&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-12" aria-label="V3 score for CVE-2022-49206">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1022,19 +1028,25 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36271"
|
||||
id="cveDetailAnchor-13">CVE-2023-36271</a></strong> - LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49207"
|
||||
id="cveDetailAnchor-13">CVE-2022-49207</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
bpf, sockmap: Fix memleak in sk_psock_queue_msg
|
||||
|
||||
If tcp_bpf_sendmsg is running during a tear down operation we may enqueue
|
||||
data on the ingress msg queue while tear down is trying...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49207#vulnDescriptionTitle">read CVE-2022-49207</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-13">
|
||||
|
||||
<span id="cvss3-link-13"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36271&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2023-36271">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49207&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2022-49207">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1043,19 +1055,27 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2023-36272"
|
||||
id="cveDetailAnchor-14">CVE-2023-36272</a></strong> - LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49208"
|
||||
id="cveDetailAnchor-14">CVE-2022-49208</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
RDMA/irdma: Prevent some integer underflows
|
||||
|
||||
My static checker complains that:
|
||||
|
||||
drivers/infiniband/hw/irdma/ctrl.c:3605 irdma_sc_ceq_init()
|
||||
warn: can subtract underflow '...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
June 23, 2023; 11:15:10 AM -0400
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49208#vulnDescriptionTitle">read CVE-2022-49208</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:57 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-14">
|
||||
|
||||
<span id="cvss3-link-14"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2023-36272&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-14" aria-label="V3 score for CVE-2023-36272">8.8 HIGH</a><br />
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49208&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-14" aria-label="V3 score for CVE-2022-49208">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
|
@ -1064,23 +1084,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2019-8394"
|
||||
id="cveDetailAnchor-15">CVE-2019-8394</a></strong> - Zoho ManageEngine ServiceDesk Plus (SDP) before 10.0 build 10012 allows remote attackers to upload arbitrary files via login page customization.
|
||||
<strong><a href="/vuln/detail/CVE-2022-49209"
|
||||
id="cveDetailAnchor-15">CVE-2022-49209</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
|
||||
|
||||
If tcp_bpf_sendmsg() is running while sk msg is full. When sk_msg_alloc()
|
||||
returns -ENOMEM error, tcp_bpf_sendms...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
February 16, 2019; 11:29:00 PM -0500
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49209#vulnDescriptionTitle">read CVE-2022-49209</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-15">
|
||||
|
||||
<span id="cvss3-link-15"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2019-8394&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-15" aria-label="V3 score for CVE-2019-8394">6.5 MEDIUM</a><br />
|
||||
</span> <span id="cvss2-link-15"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2019-8394&vector=(AV:N/AC:L/Au:S/C:N/I:P/A:N)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-15" aria-label="V2 score for CVE-2019-8394">4.0 MEDIUM</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49209&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-15" aria-label="V3 score for CVE-2022-49209">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1088,24 +1111,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-20753"
|
||||
id="cveDetailAnchor-16">CVE-2018-20753</a></strong> - Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the ...
|
||||
<strong><a href="/vuln/detail/CVE-2022-49210"
|
||||
id="cveDetailAnchor-16">CVE-2022-49210</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
MIPS: pgalloc: fix memory leak caused by pgd_free()
|
||||
|
||||
pgd page is freed by generic implementation pgd_free() since commit
|
||||
f9cb654cb550 ("asm-generic: pgalloc: provide generic pgd_...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-20753#vulnDescriptionTitle">read CVE-2018-20753</a><br> <strong>Published:</strong>
|
||||
February 05, 2019; 1:29:00 AM -0500
|
||||
href="/vuln/detail/CVE-2022-49210#vulnDescriptionTitle">read CVE-2022-49210</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-16">
|
||||
|
||||
<span id="cvss3-link-16"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-20753&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-16" aria-label="V3 score for CVE-2018-20753">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-16"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-20753&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-16" aria-label="V2 score for CVE-2018-20753">7.5 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49210&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-16" aria-label="V3 score for CVE-2022-49210">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1113,23 +1138,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19323"
|
||||
id="cveDetailAnchor-17">CVE-2018-19323</a></strong> - The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes functionality to read and write Machine Specific Registers (MSRs).
|
||||
<strong><a href="/vuln/detail/CVE-2022-49211"
|
||||
id="cveDetailAnchor-17">CVE-2022-49211</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
|
||||
|
||||
The of_find_compatible_node() function returns a node pointer with
|
||||
refcount incremented, We should use of_node_put() on it w...
|
||||
|
||||
<br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
<a
|
||||
href="/vuln/detail/CVE-2022-49211#vulnDescriptionTitle">read CVE-2022-49211</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 2:00:58 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-17">
|
||||
|
||||
<span id="cvss3-link-17"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19323&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-critical" data-testid="vuln-cvss3-link-17" aria-label="V3 score for CVE-2018-19323">9.8 CRITICAL</a><br />
|
||||
</span> <span id="cvss2-link-17"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19323&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:C)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-17" aria-label="V2 score for CVE-2018-19323">9.0 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-49211&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-17" aria-label="V3 score for CVE-2022-49211">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1137,24 +1165,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19322"
|
||||
id="cveDetailAnchor-18">CVE-2018-19322</a></strong> - The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read/write data from/to IO ports. This could be l...
|
||||
<strong><a href="/vuln/detail/CVE-2021-47631"
|
||||
id="cveDetailAnchor-18">CVE-2021-47631</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
ARM: davinci: da850-evm: Avoid NULL pointer dereference
|
||||
|
||||
With newer versions of GCC, there is a panic in da850_evm_config_emac()
|
||||
when booting multi_v5_defconfig in QEMU under the...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-19322#vulnDescriptionTitle">read CVE-2018-19322</a><br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
href="/vuln/detail/CVE-2021-47631#vulnDescriptionTitle">read CVE-2021-47631</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 1:37:04 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-18">
|
||||
|
||||
<span id="cvss3-link-18"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19322&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-18" aria-label="V3 score for CVE-2018-19322">7.8 HIGH</a><br />
|
||||
</span> <span id="cvss2-link-18"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19322&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss2-link-18" aria-label="V2 score for CVE-2018-19322">4.6 MEDIUM</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-47631&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-18" aria-label="V3 score for CVE-2021-47631">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
@ -1162,24 +1192,26 @@ after installing kprobe at sys_rea...
|
|||
<li>
|
||||
<div class="col-lg-9">
|
||||
<p>
|
||||
<strong><a href="/vuln/detail/CVE-2018-19321"
|
||||
id="cveDetailAnchor-19">CVE-2018-19321</a></strong> - The GPCIDrv and GDrv low-level drivers in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 expose functionality to read and write arbitrary physical memory. This co...
|
||||
<strong><a href="/vuln/detail/CVE-2021-47632"
|
||||
id="cveDetailAnchor-19">CVE-2021-47632</a></strong> - In the Linux kernel, the following vulnerability has been resolved:
|
||||
|
||||
powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
|
||||
|
||||
Commit 1f9ad21c3b38 ("powerpc/mm: Implement set_memory() routines")
|
||||
included a spin_lock() to change_page_attr...
|
||||
|
||||
<a
|
||||
href="/vuln/detail/CVE-2018-19321#vulnDescriptionTitle">read CVE-2018-19321</a><br> <strong>Published:</strong>
|
||||
December 21, 2018; 6:29:00 PM -0500
|
||||
href="/vuln/detail/CVE-2021-47632#vulnDescriptionTitle">read CVE-2021-47632</a><br> <strong>Published:</strong>
|
||||
February 26, 2025; 1:37:04 AM -0500
|
||||
</p>
|
||||
</div>
|
||||
<div class="col-lg-3">
|
||||
<p id="severity-score-19">
|
||||
|
||||
<span id="cvss3-link-19"> <em>V3.1:</em> <a
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-19321&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss3-link-19" aria-label="V3 score for CVE-2018-19321">7.8 HIGH</a><br />
|
||||
</span> <span id="cvss2-link-19"> <em> V2.0:</em> <a
|
||||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-19321&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&version=2.0&source=NIST"
|
||||
class="label label-danger" data-testid="vuln-cvss2-link-19" aria-label="V2 score for CVE-2018-19321">7.2 HIGH</a><br />
|
||||
</span>
|
||||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-47632&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=NIST"
|
||||
class="label label-warning" data-testid="vuln-cvss3-link-19" aria-label="V3 score for CVE-2021-47632">5.5 MEDIUM</a><br />
|
||||
</span>
|
||||
</p>
|
||||
</div>
|
||||
</li>
|
||||
|
|
|
@ -547,31 +547,31 @@ body>* {
|
|||
|
||||
<tr>
|
||||
<td>January</td>
|
||||
<td class="cpe-count">12,604</td>
|
||||
<td class="cpe-count">15,192</td>
|
||||
<td class="cpe-count">132</td>
|
||||
<td class="cpe-count">499</td>
|
||||
<td class="cpe-count">12,602</td>
|
||||
<td class="cpe-count">15,182</td>
|
||||
<td class="cpe-count">131</td>
|
||||
<td class="cpe-count">498</td>
|
||||
<td class="cpe-count">1,601</td>
|
||||
</tr>
|
||||
|
||||
|
||||
<tr>
|
||||
<td>February</td>
|
||||
<td class="cpe-count">12,917</td>
|
||||
<td class="cpe-count">14,337</td>
|
||||
<td class="cpe-count">12,913</td>
|
||||
<td class="cpe-count">14,299</td>
|
||||
<td class="cpe-count">212</td>
|
||||
<td class="cpe-count">615</td>
|
||||
<td class="cpe-count">613</td>
|
||||
<td class="cpe-count">1,839</td>
|
||||
</tr>
|
||||
|
||||
|
||||
<tr>
|
||||
<td>March</td>
|
||||
<td class="cpe-count">3,364</td>
|
||||
<td class="cpe-count">5,930</td>
|
||||
<td class="cpe-count">109</td>
|
||||
<td class="cpe-count">192</td>
|
||||
<td class="cpe-count">651</td>
|
||||
<td class="cpe-count">4,918</td>
|
||||
<td class="cpe-count">7,873</td>
|
||||
<td class="cpe-count">125</td>
|
||||
<td class="cpe-count">224</td>
|
||||
<td class="cpe-count">996</td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
|
@ -611,7 +611,7 @@ body>* {
|
|||
<tr>
|
||||
<td>January</td>
|
||||
<td class="cpe-count">20,252</td>
|
||||
<td class="cpe-count">19,459</td>
|
||||
<td class="cpe-count">19,458</td>
|
||||
<td class="cpe-count">359</td>
|
||||
<td class="cpe-count">1,073</td>
|
||||
<td class="cpe-count">669</td>
|
||||
|
@ -621,7 +621,7 @@ body>* {
|
|||
<tr>
|
||||
<td>February</td>
|
||||
<td class="cpe-count">16,191</td>
|
||||
<td class="cpe-count">17,670</td>
|
||||
<td class="cpe-count">17,624</td>
|
||||
<td class="cpe-count">255</td>
|
||||
<td class="cpe-count">757</td>
|
||||
<td class="cpe-count">784</td>
|
||||
|
@ -641,7 +641,7 @@ body>* {
|
|||
<tr>
|
||||
<td>April</td>
|
||||
<td class="cpe-count">2,927</td>
|
||||
<td class="cpe-count">3,382</td>
|
||||
<td class="cpe-count">3,282</td>
|
||||
<td class="cpe-count">7</td>
|
||||
<td class="cpe-count">78</td>
|
||||
<td class="cpe-count">64</td>
|
||||
|
@ -651,7 +651,7 @@ body>* {
|
|||
<tr>
|
||||
<td>May</td>
|
||||
<td class="cpe-count">524</td>
|
||||
<td class="cpe-count">858</td>
|
||||
<td class="cpe-count">856</td>
|
||||
<td class="cpe-count">8</td>
|
||||
<td class="cpe-count">10</td>
|
||||
<td class="cpe-count">40</td>
|
||||
|
@ -671,7 +671,7 @@ body>* {
|
|||
<tr>
|
||||
<td>July</td>
|
||||
<td class="cpe-count">12,571</td>
|
||||
<td class="cpe-count">11,220</td>
|
||||
<td class="cpe-count">11,218</td>
|
||||
<td class="cpe-count">176</td>
|
||||
<td class="cpe-count">916</td>
|
||||
<td class="cpe-count">263</td>
|
||||
|
@ -681,7 +681,7 @@ body>* {
|
|||
<tr>
|
||||
<td>August</td>
|
||||
<td class="cpe-count">12,576</td>
|
||||
<td class="cpe-count">14,389</td>
|
||||
<td class="cpe-count">14,387</td>
|
||||
<td class="cpe-count">192</td>
|
||||
<td class="cpe-count">676</td>
|
||||
<td class="cpe-count">2,119</td>
|
||||
|
@ -691,7 +691,7 @@ body>* {
|
|||
<tr>
|
||||
<td>September</td>
|
||||
<td class="cpe-count">16,081</td>
|
||||
<td class="cpe-count">14,170</td>
|
||||
<td class="cpe-count">14,168</td>
|
||||
<td class="cpe-count">253</td>
|
||||
<td class="cpe-count">888</td>
|
||||
<td class="cpe-count">1,529</td>
|
||||
|
@ -701,7 +701,7 @@ body>* {
|
|||
<tr>
|
||||
<td>October</td>
|
||||
<td class="cpe-count">18,148</td>
|
||||
<td class="cpe-count">22,555</td>
|
||||
<td class="cpe-count">22,551</td>
|
||||
<td class="cpe-count">250</td>
|
||||
<td class="cpe-count">735</td>
|
||||
<td class="cpe-count">4,188</td>
|
||||
|
@ -711,7 +711,7 @@ body>* {
|
|||
<tr>
|
||||
<td>November</td>
|
||||
<td class="cpe-count">14,895</td>
|
||||
<td class="cpe-count">15,004</td>
|
||||
<td class="cpe-count">14,998</td>
|
||||
<td class="cpe-count">204</td>
|
||||
<td class="cpe-count">963</td>
|
||||
<td class="cpe-count">1,463</td>
|
||||
|
@ -764,7 +764,7 @@ body>* {
|
|||
<tr>
|
||||
<td>January</td>
|
||||
<td class="cpe-count">18,296</td>
|
||||
<td class="cpe-count">21,992</td>
|
||||
<td class="cpe-count">21,910</td>
|
||||
<td class="cpe-count">419</td>
|
||||
<td class="cpe-count">1,097</td>
|
||||
<td class="cpe-count">984</td>
|
||||
|
@ -794,7 +794,7 @@ body>* {
|
|||
<tr>
|
||||
<td>April</td>
|
||||
<td class="cpe-count">14,262</td>
|
||||
<td class="cpe-count">12,795</td>
|
||||
<td class="cpe-count">12,783</td>
|
||||
<td class="cpe-count">221</td>
|
||||
<td class="cpe-count">1,405</td>
|
||||
<td class="cpe-count">778</td>
|
||||
|
@ -814,7 +814,7 @@ body>* {
|
|||
<tr>
|
||||
<td>June</td>
|
||||
<td class="cpe-count">19,858</td>
|
||||
<td class="cpe-count">21,527</td>
|
||||
<td class="cpe-count">21,524</td>
|
||||
<td class="cpe-count">260</td>
|
||||
<td class="cpe-count">3,043</td>
|
||||
<td class="cpe-count">483</td>
|
||||
|
@ -834,7 +834,7 @@ body>* {
|
|||
<tr>
|
||||
<td>August</td>
|
||||
<td class="cpe-count">20,942</td>
|
||||
<td class="cpe-count">26,728</td>
|
||||
<td class="cpe-count">26,726</td>
|
||||
<td class="cpe-count">240</td>
|
||||
<td class="cpe-count">4,929</td>
|
||||
<td class="cpe-count">1,486</td>
|
||||
|
@ -844,7 +844,7 @@ body>* {
|
|||
<tr>
|
||||
<td>September</td>
|
||||
<td class="cpe-count">16,827</td>
|
||||
<td class="cpe-count">21,890</td>
|
||||
<td class="cpe-count">21,879</td>
|
||||
<td class="cpe-count">239</td>
|
||||
<td class="cpe-count">1,058</td>
|
||||
<td class="cpe-count">1,690</td>
|
||||
|
@ -874,7 +874,7 @@ body>* {
|
|||
<tr>
|
||||
<td>December</td>
|
||||
<td class="cpe-count">18,122</td>
|
||||
<td class="cpe-count">21,768</td>
|
||||
<td class="cpe-count">21,767</td>
|
||||
<td class="cpe-count">299</td>
|
||||
<td class="cpe-count">1,320</td>
|
||||
<td class="cpe-count">1,038</td>
|
||||
|
@ -937,7 +937,7 @@ body>* {
|
|||
<tr>
|
||||
<td>March</td>
|
||||
<td class="cpe-count">13,566</td>
|
||||
<td class="cpe-count">13,724</td>
|
||||
<td class="cpe-count">13,653</td>
|
||||
<td class="cpe-count">188</td>
|
||||
<td class="cpe-count">1,738</td>
|
||||
<td class="cpe-count">1,009</td>
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -630,354 +630,360 @@ body>* {
|
|||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_1"
|
||||
href="/vuln/cvmap/report/17590">11/20/2024</a>
|
||||
href="/vuln/cvmap/report/18963">03/17/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_2"
|
||||
href="/vuln/cvmap/report/17369">11/06/2024</a>
|
||||
href="/vuln/cvmap/report/17590">11/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_3"
|
||||
href="/vuln/cvmap/report/17129">10/17/2024</a>
|
||||
href="/vuln/cvmap/report/17369">11/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_4"
|
||||
href="/vuln/cvmap/report/16266">09/05/2024</a>
|
||||
href="/vuln/cvmap/report/17129">10/17/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_5"
|
||||
href="/vuln/cvmap/report/15536">06/17/2024</a>
|
||||
href="/vuln/cvmap/report/16266">09/05/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_6"
|
||||
href="/vuln/cvmap/report/15252">02/15/2024</a>
|
||||
href="/vuln/cvmap/report/15536">06/17/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_7"
|
||||
href="/vuln/cvmap/report/13420">11/06/2023</a>
|
||||
href="/vuln/cvmap/report/15252">02/15/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_8"
|
||||
href="/vuln/cvmap/report/12552">09/14/2023</a>
|
||||
href="/vuln/cvmap/report/13420">11/06/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_9"
|
||||
href="/vuln/cvmap/report/12496">09/12/2023</a>
|
||||
href="/vuln/cvmap/report/12552">09/14/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_10"
|
||||
href="/vuln/cvmap/report/12473">09/11/2023</a>
|
||||
href="/vuln/cvmap/report/12496">09/12/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_11"
|
||||
href="/vuln/cvmap/report/12426">09/08/2023</a>
|
||||
href="/vuln/cvmap/report/12473">09/11/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_12"
|
||||
href="/vuln/cvmap/report/11352">07/10/2023</a>
|
||||
href="/vuln/cvmap/report/12426">09/08/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_13"
|
||||
href="/vuln/cvmap/report/11274">07/06/2023</a>
|
||||
href="/vuln/cvmap/report/11352">07/10/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_14"
|
||||
href="/vuln/cvmap/report/11066">06/27/2023</a>
|
||||
href="/vuln/cvmap/report/11274">07/06/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_15"
|
||||
href="/vuln/cvmap/report/9509">03/10/2023</a>
|
||||
href="/vuln/cvmap/report/11066">06/27/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_16"
|
||||
href="/vuln/cvmap/report/9477">03/09/2023</a>
|
||||
href="/vuln/cvmap/report/9509">03/10/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_17"
|
||||
href="/vuln/cvmap/report/9266">02/23/2023</a>
|
||||
href="/vuln/cvmap/report/9477">03/09/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_18"
|
||||
href="/vuln/cvmap/report/9068">02/08/2023</a>
|
||||
href="/vuln/cvmap/report/9266">02/23/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_19"
|
||||
href="/vuln/cvmap/report/9047">02/07/2023</a>
|
||||
href="/vuln/cvmap/report/9068">02/08/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_20"
|
||||
href="/vuln/cvmap/report/8801">01/19/2023</a>
|
||||
href="/vuln/cvmap/report/9047">02/07/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_21"
|
||||
href="/vuln/cvmap/report/8331">12/06/2022</a>
|
||||
href="/vuln/cvmap/report/8801">01/19/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_22"
|
||||
href="/vuln/cvmap/report/8122">11/18/2022</a>
|
||||
href="/vuln/cvmap/report/8331">12/06/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_23"
|
||||
href="/vuln/cvmap/report/7819">10/28/2022</a>
|
||||
href="/vuln/cvmap/report/8122">11/18/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_24"
|
||||
href="/vuln/cvmap/report/7548">10/11/2022</a>
|
||||
href="/vuln/cvmap/report/7819">10/28/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_25"
|
||||
href="/vuln/cvmap/report/7483">10/04/2022</a>
|
||||
href="/vuln/cvmap/report/7548">10/11/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_26"
|
||||
href="/vuln/cvmap/report/7478">10/03/2022</a>
|
||||
href="/vuln/cvmap/report/7483">10/04/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_27"
|
||||
href="/vuln/cvmap/report/7396">09/26/2022</a>
|
||||
href="/vuln/cvmap/report/7478">10/03/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_28"
|
||||
href="/vuln/cvmap/report/7377">09/23/2022</a>
|
||||
href="/vuln/cvmap/report/7396">09/26/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_29"
|
||||
href="/vuln/cvmap/report/7304">09/20/2022</a>
|
||||
href="/vuln/cvmap/report/7377">09/23/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_30"
|
||||
href="/vuln/cvmap/report/6964">08/18/2022</a>
|
||||
href="/vuln/cvmap/report/7304">09/20/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_31"
|
||||
href="/vuln/cvmap/report/6761">08/05/2022</a>
|
||||
href="/vuln/cvmap/report/6964">08/18/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_32"
|
||||
href="/vuln/cvmap/report/6656">07/29/2022</a>
|
||||
href="/vuln/cvmap/report/6761">08/05/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_33"
|
||||
href="/vuln/cvmap/report/6595">07/27/2022</a>
|
||||
href="/vuln/cvmap/report/6656">07/29/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_34"
|
||||
href="/vuln/cvmap/report/4984">03/08/2022</a>
|
||||
href="/vuln/cvmap/report/6595">07/27/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_35"
|
||||
href="/vuln/cvmap/report/4855">02/23/2022</a>
|
||||
href="/vuln/cvmap/report/4984">03/08/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_36"
|
||||
href="/vuln/cvmap/report/4721">02/09/2022</a>
|
||||
href="/vuln/cvmap/report/4855">02/23/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_37"
|
||||
href="/vuln/cvmap/report/4470">01/18/2022</a>
|
||||
href="/vuln/cvmap/report/4721">02/09/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_38"
|
||||
href="/vuln/cvmap/report/4286">12/21/2021</a>
|
||||
href="/vuln/cvmap/report/4470">01/18/2022</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_39"
|
||||
href="/vuln/cvmap/report/4264">12/19/2021</a>
|
||||
href="/vuln/cvmap/report/4286">12/21/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_40"
|
||||
href="/vuln/cvmap/report/4206">12/13/2021</a>
|
||||
href="/vuln/cvmap/report/4264">12/19/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_41"
|
||||
href="/vuln/cvmap/report/3843">11/04/2021</a>
|
||||
href="/vuln/cvmap/report/4206">12/13/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_42"
|
||||
href="/vuln/cvmap/report/3822">11/03/2021</a>
|
||||
href="/vuln/cvmap/report/3843">11/04/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_43"
|
||||
href="/vuln/cvmap/report/3709">10/26/2021</a>
|
||||
href="/vuln/cvmap/report/3822">11/03/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_44"
|
||||
href="/vuln/cvmap/report/2516">06/08/2021</a>
|
||||
href="/vuln/cvmap/report/3709">10/26/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_45"
|
||||
href="/vuln/cvmap/report/2509">06/07/2021</a>
|
||||
href="/vuln/cvmap/report/2516">06/08/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_46"
|
||||
href="/vuln/cvmap/report/2328">05/07/2021</a>
|
||||
href="/vuln/cvmap/report/2509">06/07/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_47"
|
||||
href="/vuln/cvmap/report/1574">12/31/2020</a>
|
||||
href="/vuln/cvmap/report/2328">05/07/2021</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_48"
|
||||
href="/vuln/cvmap/report/1484">12/14/2020</a>
|
||||
href="/vuln/cvmap/report/1574">12/31/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_49"
|
||||
href="/vuln/cvmap/report/1467">12/10/2020</a>
|
||||
href="/vuln/cvmap/report/1484">12/14/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_50"
|
||||
href="/vuln/cvmap/report/1191">10/26/2020</a>
|
||||
href="/vuln/cvmap/report/1467">12/10/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_51"
|
||||
href="/vuln/cvmap/report/1169">10/22/2020</a>
|
||||
href="/vuln/cvmap/report/1191">10/26/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_52"
|
||||
href="/vuln/cvmap/report/1113">10/19/2020</a>
|
||||
href="/vuln/cvmap/report/1169">10/22/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_53"
|
||||
href="/vuln/cvmap/report/1081">10/16/2020</a>
|
||||
href="/vuln/cvmap/report/1113">10/19/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_54"
|
||||
href="/vuln/cvmap/report/883">09/18/2020</a>
|
||||
href="/vuln/cvmap/report/1081">10/16/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_55"
|
||||
href="/vuln/cvmap/report/731">08/27/2020</a>
|
||||
href="/vuln/cvmap/report/883">09/18/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_56"
|
||||
href="/vuln/cvmap/report/226">06/02/2020</a>
|
||||
href="/vuln/cvmap/report/731">08/27/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_57"
|
||||
href="/vuln/cvmap/report/203">05/28/2020</a>
|
||||
href="/vuln/cvmap/report/226">06/02/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_58"
|
||||
href="/vuln/cvmap/report/175">05/21/2020</a>
|
||||
href="/vuln/cvmap/report/203">05/28/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_59"
|
||||
href="/vuln/cvmap/report/175">05/21/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_60"
|
||||
href="/vuln/cvmap/report/10">05/13/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
|
|
|
@ -600,144 +600,150 @@ body>* {
|
|||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_1"
|
||||
href="/vuln/cvmap/report/18846">03/06/2025</a>
|
||||
href="/vuln/cvmap/report/18961">03/14/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_2"
|
||||
href="/vuln/cvmap/report/18765">03/03/2025</a>
|
||||
href="/vuln/cvmap/report/18846">03/06/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_3"
|
||||
href="/vuln/cvmap/report/18583">02/12/2025</a>
|
||||
href="/vuln/cvmap/report/18765">03/03/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_4"
|
||||
href="/vuln/cvmap/report/18272">01/23/2025</a>
|
||||
href="/vuln/cvmap/report/18583">02/12/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_5"
|
||||
href="/vuln/cvmap/report/17628">11/20/2024</a>
|
||||
href="/vuln/cvmap/report/18272">01/23/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_6"
|
||||
href="/vuln/cvmap/report/17030">10/11/2024</a>
|
||||
href="/vuln/cvmap/report/17628">11/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_7"
|
||||
href="/vuln/cvmap/report/16628">09/19/2024</a>
|
||||
href="/vuln/cvmap/report/17030">10/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_8"
|
||||
href="/vuln/cvmap/report/16433">09/12/2024</a>
|
||||
href="/vuln/cvmap/report/16628">09/19/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_9"
|
||||
href="/vuln/cvmap/report/16089">08/23/2024</a>
|
||||
href="/vuln/cvmap/report/16433">09/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_10"
|
||||
href="/vuln/cvmap/report/15946">08/15/2024</a>
|
||||
href="/vuln/cvmap/report/16089">08/23/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_11"
|
||||
href="/vuln/cvmap/report/15922">08/14/2024</a>
|
||||
href="/vuln/cvmap/report/15946">08/15/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_12"
|
||||
href="/vuln/cvmap/report/15886">08/12/2024</a>
|
||||
href="/vuln/cvmap/report/15922">08/14/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_13"
|
||||
href="/vuln/cvmap/report/15599">07/03/2024</a>
|
||||
href="/vuln/cvmap/report/15886">08/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_14"
|
||||
href="/vuln/cvmap/report/15573">06/26/2024</a>
|
||||
href="/vuln/cvmap/report/15599">07/03/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_15"
|
||||
href="/vuln/cvmap/report/15516">06/12/2024</a>
|
||||
href="/vuln/cvmap/report/15573">06/26/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_16"
|
||||
href="/vuln/cvmap/report/14976">02/01/2024</a>
|
||||
href="/vuln/cvmap/report/15516">06/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_17"
|
||||
href="/vuln/cvmap/report/14771">01/19/2024</a>
|
||||
href="/vuln/cvmap/report/14976">02/01/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_18"
|
||||
href="/vuln/cvmap/report/14731">01/18/2024</a>
|
||||
href="/vuln/cvmap/report/14771">01/19/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_19"
|
||||
href="/vuln/cvmap/report/14635">01/11/2024</a>
|
||||
href="/vuln/cvmap/report/14731">01/18/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_20"
|
||||
href="/vuln/cvmap/report/14221">12/15/2023</a>
|
||||
href="/vuln/cvmap/report/14635">01/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_21"
|
||||
href="/vuln/cvmap/report/13723">11/17/2023</a>
|
||||
href="/vuln/cvmap/report/14221">12/15/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_22"
|
||||
href="/vuln/cvmap/report/13050">10/16/2023</a>
|
||||
href="/vuln/cvmap/report/13723">11/17/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_23"
|
||||
href="/vuln/cvmap/report/12887">10/05/2023</a>
|
||||
href="/vuln/cvmap/report/13050">10/16/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_24"
|
||||
href="/vuln/cvmap/report/12887">10/05/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_25"
|
||||
href="/vuln/cvmap/report/12441">09/08/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
|
|
|
@ -515,138 +515,144 @@ body>* {
|
|||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_1"
|
||||
href="/vuln/cvmap/report/18829">03/05/2025</a>
|
||||
href="/vuln/cvmap/report/18967">03/17/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_2"
|
||||
href="/vuln/cvmap/report/18796">03/04/2025</a>
|
||||
href="/vuln/cvmap/report/18829">03/05/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_3"
|
||||
href="/vuln/cvmap/report/18163">01/14/2025</a>
|
||||
href="/vuln/cvmap/report/18796">03/04/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_4"
|
||||
href="/vuln/cvmap/report/18153">01/13/2025</a>
|
||||
href="/vuln/cvmap/report/18163">01/14/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_5"
|
||||
href="/vuln/cvmap/report/18143">01/10/2025</a>
|
||||
href="/vuln/cvmap/report/18153">01/13/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_6"
|
||||
href="/vuln/cvmap/report/17951">12/12/2024</a>
|
||||
href="/vuln/cvmap/report/18143">01/10/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_7"
|
||||
href="/vuln/cvmap/report/17926">12/11/2024</a>
|
||||
href="/vuln/cvmap/report/17951">12/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_8"
|
||||
href="/vuln/cvmap/report/17869">12/09/2024</a>
|
||||
href="/vuln/cvmap/report/17926">12/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_9"
|
||||
href="/vuln/cvmap/report/17414">11/07/2024</a>
|
||||
href="/vuln/cvmap/report/17869">12/09/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_10"
|
||||
href="/vuln/cvmap/report/17387">11/06/2024</a>
|
||||
href="/vuln/cvmap/report/17414">11/07/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_11"
|
||||
href="/vuln/cvmap/report/16857">10/01/2024</a>
|
||||
href="/vuln/cvmap/report/17387">11/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_12"
|
||||
href="/vuln/cvmap/report/16544">09/17/2024</a>
|
||||
href="/vuln/cvmap/report/16857">10/01/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_13"
|
||||
href="/vuln/cvmap/report/16485">09/13/2024</a>
|
||||
href="/vuln/cvmap/report/16544">09/17/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_14"
|
||||
href="/vuln/cvmap/report/16448">09/12/2024</a>
|
||||
href="/vuln/cvmap/report/16485">09/13/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_15"
|
||||
href="/vuln/cvmap/report/16411">09/11/2024</a>
|
||||
href="/vuln/cvmap/report/16448">09/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_16"
|
||||
href="/vuln/cvmap/report/16321">09/06/2024</a>
|
||||
href="/vuln/cvmap/report/16411">09/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_17"
|
||||
href="/vuln/cvmap/report/16227">09/03/2024</a>
|
||||
href="/vuln/cvmap/report/16321">09/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_18"
|
||||
href="/vuln/cvmap/report/16023">08/20/2024</a>
|
||||
href="/vuln/cvmap/report/16227">09/03/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_19"
|
||||
href="/vuln/cvmap/report/15757">07/26/2024</a>
|
||||
href="/vuln/cvmap/report/16023">08/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_20"
|
||||
href="/vuln/cvmap/report/15678">07/16/2024</a>
|
||||
href="/vuln/cvmap/report/15757">07/26/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_21"
|
||||
href="/vuln/cvmap/report/14232">12/15/2023</a>
|
||||
href="/vuln/cvmap/report/15678">07/16/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_22"
|
||||
href="/vuln/cvmap/report/14151">12/12/2023</a>
|
||||
href="/vuln/cvmap/report/14232">12/15/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_23"
|
||||
href="/vuln/cvmap/report/14151">12/12/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CVSS_v3.1_24"
|
||||
href="/vuln/cvmap/report/11047">06/26/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
|
@ -666,216 +672,222 @@ body>* {
|
|||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_1"
|
||||
href="/vuln/cvmap/report/18946">03/13/2025</a>
|
||||
href="/vuln/cvmap/report/18964">03/17/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_2"
|
||||
href="/vuln/cvmap/report/18875">03/07/2025</a>
|
||||
href="/vuln/cvmap/report/18946">03/13/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_3"
|
||||
href="/vuln/cvmap/report/18817">03/05/2025</a>
|
||||
href="/vuln/cvmap/report/18875">03/07/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_4"
|
||||
href="/vuln/cvmap/report/18202">01/17/2025</a>
|
||||
href="/vuln/cvmap/report/18817">03/05/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_5"
|
||||
href="/vuln/cvmap/report/18158">01/14/2025</a>
|
||||
href="/vuln/cvmap/report/18202">01/17/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_6"
|
||||
href="/vuln/cvmap/report/18151">01/13/2025</a>
|
||||
href="/vuln/cvmap/report/18158">01/14/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_7"
|
||||
href="/vuln/cvmap/report/18135">01/10/2025</a>
|
||||
href="/vuln/cvmap/report/18151">01/13/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_8"
|
||||
href="/vuln/cvmap/report/17936">12/12/2024</a>
|
||||
href="/vuln/cvmap/report/18135">01/10/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_9"
|
||||
href="/vuln/cvmap/report/17859">12/09/2024</a>
|
||||
href="/vuln/cvmap/report/17936">12/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_10"
|
||||
href="/vuln/cvmap/report/17852">12/06/2024</a>
|
||||
href="/vuln/cvmap/report/17859">12/09/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_11"
|
||||
href="/vuln/cvmap/report/17594">11/20/2024</a>
|
||||
href="/vuln/cvmap/report/17852">12/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_12"
|
||||
href="/vuln/cvmap/report/17407">11/07/2024</a>
|
||||
href="/vuln/cvmap/report/17594">11/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_13"
|
||||
href="/vuln/cvmap/report/17370">11/06/2024</a>
|
||||
href="/vuln/cvmap/report/17407">11/07/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_14"
|
||||
href="/vuln/cvmap/report/16850">10/01/2024</a>
|
||||
href="/vuln/cvmap/report/17370">11/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_15"
|
||||
href="/vuln/cvmap/report/16301">09/06/2024</a>
|
||||
href="/vuln/cvmap/report/16850">10/01/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_16"
|
||||
href="/vuln/cvmap/report/15671">07/16/2024</a>
|
||||
href="/vuln/cvmap/report/16301">09/06/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_17"
|
||||
href="/vuln/cvmap/report/14766">01/19/2024</a>
|
||||
href="/vuln/cvmap/report/15671">07/16/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_18"
|
||||
href="/vuln/cvmap/report/14219">12/15/2023</a>
|
||||
href="/vuln/cvmap/report/14766">01/19/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_19"
|
||||
href="/vuln/cvmap/report/14130">12/12/2023</a>
|
||||
href="/vuln/cvmap/report/14219">12/15/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_20"
|
||||
href="/vuln/cvmap/report/14108">12/11/2023</a>
|
||||
href="/vuln/cvmap/report/14130">12/12/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_21"
|
||||
href="/vuln/cvmap/report/13649">11/15/2023</a>
|
||||
href="/vuln/cvmap/report/14108">12/11/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_22"
|
||||
href="/vuln/cvmap/report/13607">11/14/2023</a>
|
||||
href="/vuln/cvmap/report/13649">11/15/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_23"
|
||||
href="/vuln/cvmap/report/13098">10/18/2023</a>
|
||||
href="/vuln/cvmap/report/13607">11/14/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_24"
|
||||
href="/vuln/cvmap/report/13072">10/17/2023</a>
|
||||
href="/vuln/cvmap/report/13098">10/18/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_25"
|
||||
href="/vuln/cvmap/report/13049">10/16/2023</a>
|
||||
href="/vuln/cvmap/report/13072">10/17/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_26"
|
||||
href="/vuln/cvmap/report/13038">10/14/2023</a>
|
||||
href="/vuln/cvmap/report/13049">10/16/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_27"
|
||||
href="/vuln/cvmap/report/13013">10/13/2023</a>
|
||||
href="/vuln/cvmap/report/13038">10/14/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_28"
|
||||
href="/vuln/cvmap/report/12772">09/28/2023</a>
|
||||
href="/vuln/cvmap/report/13013">10/13/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_29"
|
||||
href="/vuln/cvmap/report/12707">09/25/2023</a>
|
||||
href="/vuln/cvmap/report/12772">09/28/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_30"
|
||||
href="/vuln/cvmap/report/12129">08/17/2023</a>
|
||||
href="/vuln/cvmap/report/12707">09/25/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_31"
|
||||
href="/vuln/cvmap/report/12117">08/16/2023</a>
|
||||
href="/vuln/cvmap/report/12129">08/17/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_32"
|
||||
href="/vuln/cvmap/report/12059">08/13/2023</a>
|
||||
href="/vuln/cvmap/report/12117">08/16/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_33"
|
||||
href="/vuln/cvmap/report/11423">07/12/2023</a>
|
||||
href="/vuln/cvmap/report/12059">08/13/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_34"
|
||||
href="/vuln/cvmap/report/11364">07/10/2023</a>
|
||||
href="/vuln/cvmap/report/11423">07/12/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_35"
|
||||
href="/vuln/cvmap/report/11263">07/06/2023</a>
|
||||
href="/vuln/cvmap/report/11364">07/10/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_36"
|
||||
href="/vuln/cvmap/report/11263">07/06/2023</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_37"
|
||||
href="/vuln/cvmap/report/1451">12/08/2020</a>
|
||||
</td>
|
||||
</tr>
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -1716,198 +1716,204 @@ body>* {
|
|||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_1"
|
||||
href="/vuln/cvmap/report/18686">02/26/2025</a>
|
||||
href="/vuln/cvmap/report/18960">03/14/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_2"
|
||||
href="/vuln/cvmap/report/18643">02/19/2025</a>
|
||||
href="/vuln/cvmap/report/18686">02/26/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_3"
|
||||
href="/vuln/cvmap/report/18203">01/17/2025</a>
|
||||
href="/vuln/cvmap/report/18643">02/19/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_4"
|
||||
href="/vuln/cvmap/report/18183">01/16/2025</a>
|
||||
href="/vuln/cvmap/report/18203">01/17/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_5"
|
||||
href="/vuln/cvmap/report/18159">01/14/2025</a>
|
||||
href="/vuln/cvmap/report/18183">01/16/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_6"
|
||||
href="/vuln/cvmap/report/18100">01/08/2025</a>
|
||||
href="/vuln/cvmap/report/18159">01/14/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_7"
|
||||
href="/vuln/cvmap/report/18076">01/06/2025</a>
|
||||
href="/vuln/cvmap/report/18100">01/08/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_8"
|
||||
href="/vuln/cvmap/report/18059">01/02/2025</a>
|
||||
href="/vuln/cvmap/report/18076">01/06/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_9"
|
||||
href="/vuln/cvmap/report/18046">12/27/2024</a>
|
||||
href="/vuln/cvmap/report/18059">01/02/2025</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_10"
|
||||
href="/vuln/cvmap/report/17789">11/29/2024</a>
|
||||
href="/vuln/cvmap/report/18046">12/27/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_11"
|
||||
href="/vuln/cvmap/report/17599">11/20/2024</a>
|
||||
href="/vuln/cvmap/report/17789">11/29/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_12"
|
||||
href="/vuln/cvmap/report/16620">09/19/2024</a>
|
||||
href="/vuln/cvmap/report/17599">11/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_13"
|
||||
href="/vuln/cvmap/report/16529">09/17/2024</a>
|
||||
href="/vuln/cvmap/report/16620">09/19/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_14"
|
||||
href="/vuln/cvmap/report/16466">09/13/2024</a>
|
||||
href="/vuln/cvmap/report/16529">09/17/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_15"
|
||||
href="/vuln/cvmap/report/16162">08/29/2024</a>
|
||||
href="/vuln/cvmap/report/16466">09/13/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_16"
|
||||
href="/vuln/cvmap/report/15957">08/16/2024</a>
|
||||
href="/vuln/cvmap/report/16162">08/29/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_17"
|
||||
href="/vuln/cvmap/report/15941">08/15/2024</a>
|
||||
href="/vuln/cvmap/report/15957">08/16/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_18"
|
||||
href="/vuln/cvmap/report/15919">08/14/2024</a>
|
||||
href="/vuln/cvmap/report/15941">08/15/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_19"
|
||||
href="/vuln/cvmap/report/15635">07/11/2024</a>
|
||||
href="/vuln/cvmap/report/15919">08/14/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_20"
|
||||
href="/vuln/cvmap/report/15583">06/28/2024</a>
|
||||
href="/vuln/cvmap/report/15635">07/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_21"
|
||||
href="/vuln/cvmap/report/15580">06/27/2024</a>
|
||||
href="/vuln/cvmap/report/15583">06/28/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_22"
|
||||
href="/vuln/cvmap/report/15559">06/24/2024</a>
|
||||
href="/vuln/cvmap/report/15580">06/27/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_23"
|
||||
href="/vuln/cvmap/report/15556">06/21/2024</a>
|
||||
href="/vuln/cvmap/report/15559">06/24/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_24"
|
||||
href="/vuln/cvmap/report/15552">06/20/2024</a>
|
||||
href="/vuln/cvmap/report/15556">06/21/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_25"
|
||||
href="/vuln/cvmap/report/15511">06/12/2024</a>
|
||||
href="/vuln/cvmap/report/15552">06/20/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_26"
|
||||
href="/vuln/cvmap/report/15482">06/11/2024</a>
|
||||
href="/vuln/cvmap/report/15511">06/12/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_27"
|
||||
href="/vuln/cvmap/report/15469">06/10/2024</a>
|
||||
href="/vuln/cvmap/report/15482">06/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_28"
|
||||
href="/vuln/cvmap/report/15452">05/29/2024</a>
|
||||
href="/vuln/cvmap/report/15469">06/10/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_29"
|
||||
href="/vuln/cvmap/report/15448">05/28/2024</a>
|
||||
href="/vuln/cvmap/report/15452">05/29/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_30"
|
||||
href="/vuln/cvmap/report/15442">05/23/2024</a>
|
||||
href="/vuln/cvmap/report/15448">05/28/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_31"
|
||||
href="/vuln/cvmap/report/15434">05/16/2024</a>
|
||||
href="/vuln/cvmap/report/15442">05/23/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_32"
|
||||
href="/vuln/cvmap/report/15409">04/26/2024</a>
|
||||
href="/vuln/cvmap/report/15434">05/16/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_33"
|
||||
href="/vuln/cvmap/report/15409">04/26/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a id="reportDate_CWE_34"
|
||||
href="/vuln/cvmap/report/15396">04/11/2024</a>
|
||||
</td>
|
||||
</tr>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18829"
|
||||
href="/vuln/cvmap/report/18967"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18946"
|
||||
href="/vuln/cvmap/report/18964"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18946"
|
||||
href="/vuln/cvmap/report/18964"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18946"
|
||||
href="/vuln/cvmap/report/18964"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/17590"
|
||||
href="/vuln/cvmap/report/18963"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18828"
|
||||
href="/vuln/cvmap/report/18966"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18754"
|
||||
href="/vuln/cvmap/report/18965"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
|
@ -502,7 +502,7 @@ body>* {
|
|||
role="alert">
|
||||
This is not the latest report. Click
|
||||
<a id="wldLinkToLatestReport"
|
||||
href="/vuln/cvmap/report/18957"
|
||||
href="/vuln/cvmap/report/18968"
|
||||
target="_blank" rel="noopener noreferrer">
|
||||
here to view the latest report.
|
||||
</a>
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue