mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 03:01:36 +00:00
Auto-Update: 2025-05-20T10:00:19.482610+00:00
This commit is contained in:
parent
31f6584839
commit
0c2e0390df
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45159",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-10-05T11:15:14.063",
|
||||
"lastModified": "2024-11-21T08:26:27.540",
|
||||
"lastModified": "2025-05-20T09:15:19.890",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,11 +115,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2001/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-45160",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-10-05T16:15:12.167",
|
||||
"lastModified": "2024-11-21T08:26:27.673",
|
||||
"lastModified": "2025-05-20T09:15:20.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability."
|
||||
"value": "In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -115,18 +115,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1e.my.site.com/s/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/vulnerability-disclosure-policy/",
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2002/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45161",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-11-06T13:15:09.730",
|
||||
"lastModified": "2024-11-21T08:26:27.807",
|
||||
"lastModified": "2025-05-20T09:15:20.277",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -118,11 +118,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2003/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.1e.com/product-packs/network/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45162",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-10-13T13:15:11.910",
|
||||
"lastModified": "2024-11-21T08:26:27.933",
|
||||
"lastModified": "2025-05-20T09:15:20.453",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,11 +115,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2004/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-45163",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-11-06T13:15:09.807",
|
||||
"lastModified": "2024-11-21T08:26:28.060",
|
||||
"lastModified": "2025-05-20T09:15:20.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nThe 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI\n\n"
|
||||
"value": "The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -111,18 +111,12 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://https://exchange.1e.com/product-packs/network/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
"url": "https://exchange.1e.com/product-packs/network/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2005/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://https://exchange.1e.com/product-packs/network/",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-5964",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2023-11-06T13:15:10.187",
|
||||
"lastModified": "2024-11-21T08:42:52.617",
|
||||
"lastModified": "2025-05-20T09:15:20.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nThe 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue DELETE the instruction\u00a0\u201cShow dialogue with caption %Caption% and message %Message%\u201d from the list of instructions in the Settings UI, and replace it with the new instruction\u00a01E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as\u00a0\u201cShow %Type% type notification with header %Header% and message %Message%\u201d with a version of 7.1 or above."
|
||||
"value": "The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue DELETE the instruction\u00a0\u201cShow dialogue with caption %Caption% and message %Message%\u201d from the list of instructions in the Settings UI, and replace it with the new instruction\u00a01E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as\u00a0\u201cShow %Type% type notification with header %Header% and message %Message%\u201d with a version of 7.1 or above."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -108,11 +108,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2006/",
|
||||
"source": "security@1e.com"
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.1e.com/product-packs/end-user-interaction/",
|
||||
|
68
CVE-2024/CVE-2024-58xx/CVE-2024-5878.json
Normal file
68
CVE-2024/CVE-2024-58xx/CVE-2024-5878.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-5878",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-05-20T08:15:32.503",
|
||||
"lastModified": "2025-05-20T08:15:32.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled SimpleLightbox JavaScript library (version 2.1.5) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/nextgen-gallery/trunk/static/Lightbox/simplelightbox/nextgen_simple_lightbox_init.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simplelightbox/trunk/dist/simple-lightbox.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3157076/nextgen-gallery",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bcbc8ce6-5eb7-4599-b844-72eb2ff3093c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7211",
|
||||
"sourceIdentifier": "security@1e.com",
|
||||
"published": "2024-08-01T17:16:09.727",
|
||||
"lastModified": "2025-03-13T17:15:33.897",
|
||||
"lastModified": "2025-05-20T09:15:20.953",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,11 +115,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
|
||||
"source": "security@1e.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2024-2001/",
|
||||
"source": "security@1e.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-49xx/CVE-2025-4951.json
Normal file
56
CVE-2025/CVE-2025-49xx/CVE-2025-4951.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-4951",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-05-20T09:15:21.207",
|
||||
"lastModified": "2025-05-20T09:15:21.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Editions of Rapid7 AppSpider Pro before version\u00a07.5.018 is vulnerable to a stored cross-site scripting vulnerability in the \"ScanName\" field.\nDespite the application preventing the inclusion of special characters within the \"ScanName\" field, this could be bypassed by modifying the configuration file directly.\n\nThis is fixed as of version\u00a07.5.018"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@rapid7.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@rapid7.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.rapid7.com/release-notes/appspider/20250516/",
|
||||
"source": "cve@rapid7.com"
|
||||
}
|
||||
]
|
||||
}
|
20
README.md
20
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-05-20T08:00:19.202757+00:00
|
||||
2025-05-20T10:00:19.482610+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-05-20T06:15:38.883000+00:00
|
||||
2025-05-20T09:15:21.207000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
294811
|
||||
294813
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-2929](CVE-2025/CVE-2025-29xx/CVE-2025-2929.json) (`2025-05-20T06:15:38.737`)
|
||||
- [CVE-2025-4322](CVE-2025/CVE-2025-43xx/CVE-2025-4322.json) (`2025-05-20T06:15:38.883`)
|
||||
- [CVE-2024-5878](CVE-2024/CVE-2024-58xx/CVE-2024-5878.json) (`2025-05-20T08:15:32.503`)
|
||||
- [CVE-2025-4951](CVE-2025/CVE-2025-49xx/CVE-2025-4951.json) (`2025-05-20T09:15:21.207`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2022-29623](CVE-2022/CVE-2022-296xx/CVE-2022-29623.json) (`2025-05-20T06:15:38.267`)
|
||||
- [CVE-2023-45159](CVE-2023/CVE-2023-451xx/CVE-2023-45159.json) (`2025-05-20T09:15:19.890`)
|
||||
- [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2025-05-20T09:15:20.110`)
|
||||
- [CVE-2023-45161](CVE-2023/CVE-2023-451xx/CVE-2023-45161.json) (`2025-05-20T09:15:20.277`)
|
||||
- [CVE-2023-45162](CVE-2023/CVE-2023-451xx/CVE-2023-45162.json) (`2025-05-20T09:15:20.453`)
|
||||
- [CVE-2023-45163](CVE-2023/CVE-2023-451xx/CVE-2023-45163.json) (`2025-05-20T09:15:20.620`)
|
||||
- [CVE-2023-5964](CVE-2023/CVE-2023-59xx/CVE-2023-5964.json) (`2025-05-20T09:15:20.783`)
|
||||
- [CVE-2024-7211](CVE-2024/CVE-2024-72xx/CVE-2024-7211.json) (`2025-05-20T09:15:20.953`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
22
_state.csv
22
_state.csv
@ -198323,7 +198323,7 @@ CVE-2022-29619,0,0,8b57193e29e1c5db820598af81955cb8ef436217f430b4816fc5244d9008c
|
||||
CVE-2022-2962,0,0,a06ff056d8fa16537ae210df997671eef12ba2424c4cb62bf44592cb21c7fa48,2025-04-23T18:15:48.600000
|
||||
CVE-2022-29620,0,0,1b5d9ab713bc4368b58f56698384b0be6859e0b5f33ffa04fcff74b18611eb67,2024-11-21T06:59:26.920000
|
||||
CVE-2022-29622,0,0,ddd94bd0ce6bfb86e9ffe07e7e8bfddf9bba772bc504d804c6607956b739145d,2024-11-21T06:59:27.063000
|
||||
CVE-2022-29623,0,1,a17df269c0e39815bd5ef7df254f4b6515419929eb0ee137da90b0531f670719,2025-05-20T06:15:38.267000
|
||||
CVE-2022-29623,0,0,a17df269c0e39815bd5ef7df254f4b6515419929eb0ee137da90b0531f670719,2025-05-20T06:15:38.267000
|
||||
CVE-2022-29624,0,0,e0749953c80faf1df7f82852bc13829ea14d66ffc837efcbeabe194e42a024a1,2024-11-21T06:59:27.360000
|
||||
CVE-2022-29627,0,0,dc814ea8434f706b08f8e1b29057a571abf6add1cd77775b0905eb2df1d5df8d,2024-11-21T06:59:27.497000
|
||||
CVE-2022-29628,0,0,3a3ff3894e961965d3f51fde0683c15eaf592196d39ee75c41fdeff53828313a,2024-11-21T06:59:27.643000
|
||||
@ -235981,12 +235981,12 @@ CVE-2023-45150,0,0,c7f9dd08e5d77b39bc516d75b449467167616f136216a14a5454a52abd145
|
||||
CVE-2023-45151,0,0,600ad9bef1af059cc06cf18b91759f47e4001f5306c7bd0430380f7c365a7deb,2024-11-21T08:26:27.163000
|
||||
CVE-2023-45152,0,0,943782991041bd072188f8052045aaa97addd1415f2ecc4292b6c970e4d54ad7,2024-11-21T08:26:27.290000
|
||||
CVE-2023-45158,0,0,cb1ee5b47a4e4a2c609f7bacd4116415e479ffc185940ef324302139e32c5d3c,2024-11-21T08:26:27.417000
|
||||
CVE-2023-45159,0,0,f29df7f918ed5e7ab0d1a716cc7594717050259bbdeb44426240e79e8ac51f91,2024-11-21T08:26:27.540000
|
||||
CVE-2023-45159,0,1,b9bc6287da98dec1694ba39ed6a4ea54fb597e262f5f018e60953cb38c730905,2025-05-20T09:15:19.890000
|
||||
CVE-2023-4516,0,0,e52eb7078473a64c22cc5e7d51b66a4c2a7e135da3f90b0c02d26572bd669cdb,2024-11-21T08:35:19.940000
|
||||
CVE-2023-45160,0,0,8bf5b6dab3d2de484b3579269581503da09a213f9b1f780032700e3677995b48,2024-11-21T08:26:27.673000
|
||||
CVE-2023-45161,0,0,6e5edc02493dd630b3c39be9dbe1ccfab174eb66f2c16ff1e6f8ce09f55c80ef,2024-11-21T08:26:27.807000
|
||||
CVE-2023-45162,0,0,7c360b584e0481a242ecf8f9599ab48049687d368490c1bd44c6a34dc4c95e36,2024-11-21T08:26:27.933000
|
||||
CVE-2023-45163,0,0,f82d830f625745916add74f4d711ccffd3f67c54efcee9dcf0ba736a80de774e,2024-11-21T08:26:28.060000
|
||||
CVE-2023-45160,0,1,e88fea2b396f0a645f60cafac5ef44cee77e41ff7c265b4908b1b3f6e9cd1883,2025-05-20T09:15:20.110000
|
||||
CVE-2023-45161,0,1,7d106015c84ab31b616d83ed9a5d4ec16832e510a44881ef4e9ab96f0416c465,2025-05-20T09:15:20.277000
|
||||
CVE-2023-45162,0,1,8ff1570da578ce6e73413b5565a9ba3568c0516572a1c79b6e19631a830c977c,2025-05-20T09:15:20.453000
|
||||
CVE-2023-45163,0,1,8622920795bd8322d97be3b8dfb1e3ceb1f083d9d013a98f8c8d5d0646fbf5c7,2025-05-20T09:15:20.620000
|
||||
CVE-2023-45165,0,0,e0a24584cf7e01397eb37eb125f5a89d07d23fb12b0d63a28674130d9490ad54,2024-11-21T08:26:28.180000
|
||||
CVE-2023-45166,0,0,ca78f5b0d900affe2aeec2b5e842d25075b740d8bc85ca31614781d5e8f31712,2024-11-21T08:26:28.320000
|
||||
CVE-2023-45167,0,0,3fac0182ae93b6f4487853ce543f75e36ef54e71153d1e86e0dedcd3164dc70b,2024-11-21T08:26:28.427000
|
||||
@ -242731,7 +242731,7 @@ CVE-2023-5960,0,0,0a5a002761a86fa1b6485cdb85b3bcbd0fd79d97666e56db2ab5d7f92b3abf
|
||||
CVE-2023-5961,0,0,d753467e36892ee45d9ca5fa392d677843a1ef1a00b32288494ae65179f9d54a,2024-11-21T08:42:52.213000
|
||||
CVE-2023-5962,0,0,d11a011ec907801009f51abd2a1c600f76fa89575f907dc98e28506cedadc02c,2024-11-21T08:42:52.350000
|
||||
CVE-2023-5963,0,0,e36b3714b0b40635b9ab945402c88b1f60e9dcd9f87e9b5bf0d400ed1c381ec9,2024-11-21T08:42:52.487000
|
||||
CVE-2023-5964,0,0,8c05b32c42ce99a5b0b7b10906247b004d5903cf19af78e237562bd99f440b45,2024-11-21T08:42:52.617000
|
||||
CVE-2023-5964,0,1,539eec2f3f6481ed806e608497667999a1fa1e487f2044410d25b9e4b7644687,2025-05-20T09:15:20.783000
|
||||
CVE-2023-5965,0,0,43b68f25622cbc4afaacc75a6c3bea1eb57560d01f134e017f0f7f56c84c584a,2024-11-21T08:42:52.750000
|
||||
CVE-2023-5966,0,0,d228a55ef2906277c190e5ccbe803f52316e5ec7568dae55bcb2a52828adcd9a,2024-11-21T08:42:52.887000
|
||||
CVE-2023-5967,0,0,0ab93dcc8bd1df1b00af3a1010094972d14e93007e5d6ad366ec57ce4dd8af0b,2024-11-21T08:42:53.007000
|
||||
@ -278184,6 +278184,7 @@ CVE-2024-5874,0,0,a9e63275a6908bf33435b1a068d43670d23b99f7e26f6c3e737caf48c16722
|
||||
CVE-2024-5875,0,0,44af9bee588327c2ca80a9b9f8de675fcbafdc3655e379b366f773cfa94b6083,2024-11-22T20:15:11.030000
|
||||
CVE-2024-5876,0,0,7286b893a116712d4761303a4e95bae2ff052335781740d3a04822319399d335,2024-11-22T20:15:11.150000
|
||||
CVE-2024-5877,0,0,80c9d096970c353d960baff3613e5714705d2472757521ca853917c42670fd80,2024-11-22T20:15:11.260000
|
||||
CVE-2024-5878,1,1,4d1b66d7ebdf286e883cfe16abb16892bfa3f8055dedca98cc82e119a070c6d7,2025-05-20T08:15:32.503000
|
||||
CVE-2024-5879,0,0,25d590c240497c40edd9974939e9cd1cb176442396e55f11847e771d41e50789,2024-09-03T14:59:58.410000
|
||||
CVE-2024-5880,0,0,78f8c17ca2ad5fed28c3a337430fec0785ea8b668d98c2fb361597e109dcd3f6,2024-08-21T12:30:33.697000
|
||||
CVE-2024-5881,0,0,21d92582eca7d96a4d513ea191ceb6e9c724b7a61d96b6d9d17dd755a85dcf77,2024-11-21T09:48:30.933000
|
||||
@ -279443,7 +279444,7 @@ CVE-2024-7206,0,0,ad60a7a5a75d525e01cac28f53d4e84e66cf8597e578c42124f1b03bae3bfa
|
||||
CVE-2024-7207,0,0,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000
|
||||
CVE-2024-7208,0,0,5c1c8a0c5391bbafe9eb145590dff4387ed7a993e57835f061faba629740fb08,2024-11-21T09:51:05.693000
|
||||
CVE-2024-7209,0,0,329011cdb361ddb9d01891aacfdb2f81d01db18c5a881c79b57c0a85691aa572,2024-11-21T09:51:05.863000
|
||||
CVE-2024-7211,0,0,74f4b96eec610a6fd5702b572b63482e78caceb20ff9387e44c746ec3474bfc0,2025-03-13T17:15:33.897000
|
||||
CVE-2024-7211,0,1,4cc94f465b2af1cc76dca7e93b6057940eb3a466594f92b065f391c3976f8896,2025-05-20T09:15:20.953000
|
||||
CVE-2024-7212,0,0,255208a552d011daea8c4c0306723dc64701b6dc83a5500e5102ce4f6a4e311a,2024-11-21T09:51:06.083000
|
||||
CVE-2024-7213,0,0,ae2422a3eb9d8111cbdba82544a713dc0adfa15fa4aab588cf289b337f742a06,2024-11-21T09:51:06.243000
|
||||
CVE-2024-7214,0,0,4b60dac041ea2b5cca8216779266a06040ee6c89788223dec568748093b55139,2024-11-21T09:51:06.390000
|
||||
@ -289571,7 +289572,7 @@ CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb
|
||||
CVE-2025-29280,0,0,c83ace369ab12b752e492629ae9e8f33e54a84e80d1b54f1d7c41067196d649c,2025-04-15T18:39:27.967000
|
||||
CVE-2025-29281,0,0,2a7988381be20926091f1694d6a54d7bfbb1804fbd7d2018b969009fcc5366ef,2025-04-15T18:39:27.967000
|
||||
CVE-2025-29287,0,0,42df811955ba1e4d114222caf2c52a1ffbd7161bdcf19b3119f6c2c189270252,2025-04-24T16:37:54.607000
|
||||
CVE-2025-2929,1,1,15dc49988499361e66ce336a7e2eea08f9615e17195b4afff997ef366a6985dd,2025-05-20T06:15:38.737000
|
||||
CVE-2025-2929,0,0,15dc49988499361e66ce336a7e2eea08f9615e17195b4afff997ef366a6985dd,2025-05-20T06:15:38.737000
|
||||
CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000
|
||||
CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000
|
||||
CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000
|
||||
@ -293443,7 +293444,7 @@ CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e
|
||||
CVE-2025-4316,0,0,a3cffae4e2b5f53f1a661b0b9d82da9e0409120ddd80fb5f02808f802009be7c,2025-05-14T13:15:48.907000
|
||||
CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000
|
||||
CVE-2025-4318,0,0,73cdf24936a82810c3179f2491c41f7aa46df0277cfdc5785e8661e453babeab,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4322,1,1,292bf523e4e7125c7124e6b1b1b5c7988452be5954d24cb534315d754d74c78e,2025-05-20T06:15:38.883000
|
||||
CVE-2025-4322,0,0,292bf523e4e7125c7124e6b1b1b5c7988452be5954d24cb534315d754d74c78e,2025-05-20T06:15:38.883000
|
||||
CVE-2025-4323,0,0,a92a49c291d6e9dc74ae26b690a6171ab8ae00628949ef68fbb0006bd7671b31,2025-05-07T14:13:35.980000
|
||||
CVE-2025-4324,0,0,58fa7de6e56ad865b5257250bcee13b8e1686fe64bd3ad7adcfbc671861c19e1,2025-05-07T14:13:35.980000
|
||||
CVE-2025-4325,0,0,1299ff4897172a144ee0e16b1d34c0aad4d0fd187c1a443cf1078d388ba95503,2025-05-07T14:13:35.980000
|
||||
@ -294809,4 +294810,5 @@ CVE-2025-4940,0,0,b6be136fc0ef4b0eb5a8eec752f22b0f38f3d3b001a9b3bbdf166af200dea9
|
||||
CVE-2025-4941,0,0,4c57c981711880dd52105d2b77aac4c5f12f4423aa23a377c58de75d52cc1c76,2025-05-19T17:15:28.883000
|
||||
CVE-2025-4945,0,0,da8fb39a1d18adc5b07df1f5ff561259b24dda4c7d62b67ade3bc1e2feb817ce,2025-05-19T17:15:29.103000
|
||||
CVE-2025-4948,0,0,f655cc28946460aec5eb35f476b31c0d2a80bbf05c0aebc0d5eae8ac7d7d37b6,2025-05-19T16:15:36.790000
|
||||
CVE-2025-4951,1,1,b4c30a581d030a75b450a9c4c5578dfa2f0031aca87c2209df151d924369b706,2025-05-20T09:15:21.207000
|
||||
CVE-2025-4971,0,0,bd64c77f6ebfe3123c278b4a1adcfdb3e60cd3a30600fc53908cb97638876438,2025-05-20T00:15:25.253000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user