Auto-Update: 2025-05-20T10:00:19.482610+00:00

This commit is contained in:
cad-safe-bot 2025-05-20 10:03:54 +00:00
parent 31f6584839
commit 0c2e0390df
11 changed files with 174 additions and 74 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45159",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-05T11:15:14.063",
"lastModified": "2024-11-21T08:26:27.540",
"lastModified": "2025-05-20T09:15:19.890",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,11 +115,8 @@
],
"references": [
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2001/",
"source": "security@1e.com"
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-45160",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-05T16:15:12.167",
"lastModified": "2024-11-21T08:26:27.673",
"lastModified": "2025-05-20T09:15:20.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability."
"value": "In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0\n\nThis issue has also been fixed in the Mac Client in updated versions of Non-Windows release v8.1.2.62 - please re-download from the 1E Support site. \n\nCustomers with Mac Client versions higher than v8.1 will need to upgrade to v23.11 to remediate this vulnerability."
},
{
"lang": "es",
@ -115,18 +115,7 @@
],
"references": [
{
"url": "https://1e.my.site.com/s/",
"source": "security@1e.com"
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.1e.com/vulnerability-disclosure-policy/",
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2002/",
"source": "security@1e.com"
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45161",
"sourceIdentifier": "security@1e.com",
"published": "2023-11-06T13:15:09.730",
"lastModified": "2024-11-21T08:26:27.807",
"lastModified": "2025-05-20T09:15:20.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -118,11 +118,8 @@
]
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2003/",
"source": "security@1e.com"
},
{
"url": "https://exchange.1e.com/product-packs/network/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45162",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-13T13:15:11.910",
"lastModified": "2024-11-21T08:26:27.933",
"lastModified": "2025-05-20T09:15:20.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,11 +115,8 @@
],
"references": [
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2004/",
"source": "security@1e.com"
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-45163",
"sourceIdentifier": "security@1e.com",
"published": "2023-11-06T13:15:09.807",
"lastModified": "2024-11-21T08:26:28.060",
"lastModified": "2025-05-20T09:15:20.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThe 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI\n\n"
"value": "The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI"
},
{
"lang": "es",
@ -111,18 +111,12 @@
],
"references": [
{
"url": "https://https://exchange.1e.com/product-packs/network/",
"source": "security@1e.com",
"tags": [
"Product"
]
"url": "https://exchange.1e.com/product-packs/network/",
"source": "security@1e.com"
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2005/",
"source": "security@1e.com"
},
{
"url": "https://https://exchange.1e.com/product-packs/network/",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-5964",
"sourceIdentifier": "security@1e.com",
"published": "2023-11-06T13:15:10.187",
"lastModified": "2024-11-21T08:42:52.617",
"lastModified": "2025-05-20T09:15:20.783",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThe 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue DELETE the instruction\u00a0\u201cShow dialogue with caption %Caption% and message %Message%\u201d from the list of instructions in the Settings UI, and replace it with the new instruction\u00a01E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as\u00a0\u201cShow %Type% type notification with header %Header% and message %Message%\u201d with a version of 7.1 or above."
"value": "The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.\n\nTo remediate this issue DELETE the instruction\u00a0\u201cShow dialogue with caption %Caption% and message %Message%\u201d from the list of instructions in the Settings UI, and replace it with the new instruction\u00a01E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as\u00a0\u201cShow %Type% type notification with header %Header% and message %Message%\u201d with a version of 7.1 or above."
},
{
"lang": "es",
@ -108,11 +108,8 @@
]
},
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2006/",
"source": "security@1e.com"
},
{
"url": "https://exchange.1e.com/product-packs/end-user-interaction/",

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-5878",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-05-20T08:15:32.503",
"lastModified": "2025-05-20T08:15:32.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled SimpleLightbox JavaScript library (version 2.1.5) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/nextgen-gallery/trunk/static/Lightbox/simplelightbox/nextgen_simple_lightbox_init.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/simplelightbox/trunk/dist/simple-lightbox.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3157076/nextgen-gallery",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bcbc8ce6-5eb7-4599-b844-72eb2ff3093c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7211",
"sourceIdentifier": "security@1e.com",
"published": "2024-08-01T17:16:09.727",
"lastModified": "2025-03-13T17:15:33.897",
"lastModified": "2025-05-20T09:15:20.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,11 +115,8 @@
],
"references": [
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2024-2001/",
"source": "security@1e.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-4951",
"sourceIdentifier": "cve@rapid7.com",
"published": "2025-05-20T09:15:21.207",
"lastModified": "2025-05-20T09:15:21.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Editions of Rapid7 AppSpider Pro before version\u00a07.5.018 is vulnerable to a stored cross-site scripting vulnerability in the \"ScanName\" field.\nDespite the application preventing the inclusion of special characters within the \"ScanName\" field, this could be bypassed by modifying the configuration file directly.\n\nThis is fixed as of version\u00a07.5.018"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.5,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve@rapid7.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://docs.rapid7.com/release-notes/appspider/20250516/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-20T08:00:19.202757+00:00
2025-05-20T10:00:19.482610+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-20T06:15:38.883000+00:00
2025-05-20T09:15:21.207000+00:00
```
### Last Data Feed Release
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
294811
294813
```
### CVEs added in the last Commit
Recently added CVEs: `2`
- [CVE-2025-2929](CVE-2025/CVE-2025-29xx/CVE-2025-2929.json) (`2025-05-20T06:15:38.737`)
- [CVE-2025-4322](CVE-2025/CVE-2025-43xx/CVE-2025-4322.json) (`2025-05-20T06:15:38.883`)
- [CVE-2024-5878](CVE-2024/CVE-2024-58xx/CVE-2024-5878.json) (`2025-05-20T08:15:32.503`)
- [CVE-2025-4951](CVE-2025/CVE-2025-49xx/CVE-2025-4951.json) (`2025-05-20T09:15:21.207`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `7`
- [CVE-2022-29623](CVE-2022/CVE-2022-296xx/CVE-2022-29623.json) (`2025-05-20T06:15:38.267`)
- [CVE-2023-45159](CVE-2023/CVE-2023-451xx/CVE-2023-45159.json) (`2025-05-20T09:15:19.890`)
- [CVE-2023-45160](CVE-2023/CVE-2023-451xx/CVE-2023-45160.json) (`2025-05-20T09:15:20.110`)
- [CVE-2023-45161](CVE-2023/CVE-2023-451xx/CVE-2023-45161.json) (`2025-05-20T09:15:20.277`)
- [CVE-2023-45162](CVE-2023/CVE-2023-451xx/CVE-2023-45162.json) (`2025-05-20T09:15:20.453`)
- [CVE-2023-45163](CVE-2023/CVE-2023-451xx/CVE-2023-45163.json) (`2025-05-20T09:15:20.620`)
- [CVE-2023-5964](CVE-2023/CVE-2023-59xx/CVE-2023-5964.json) (`2025-05-20T09:15:20.783`)
- [CVE-2024-7211](CVE-2024/CVE-2024-72xx/CVE-2024-7211.json) (`2025-05-20T09:15:20.953`)
## Download and Usage

View File

@ -198323,7 +198323,7 @@ CVE-2022-29619,0,0,8b57193e29e1c5db820598af81955cb8ef436217f430b4816fc5244d9008c
CVE-2022-2962,0,0,a06ff056d8fa16537ae210df997671eef12ba2424c4cb62bf44592cb21c7fa48,2025-04-23T18:15:48.600000
CVE-2022-29620,0,0,1b5d9ab713bc4368b58f56698384b0be6859e0b5f33ffa04fcff74b18611eb67,2024-11-21T06:59:26.920000
CVE-2022-29622,0,0,ddd94bd0ce6bfb86e9ffe07e7e8bfddf9bba772bc504d804c6607956b739145d,2024-11-21T06:59:27.063000
CVE-2022-29623,0,1,a17df269c0e39815bd5ef7df254f4b6515419929eb0ee137da90b0531f670719,2025-05-20T06:15:38.267000
CVE-2022-29623,0,0,a17df269c0e39815bd5ef7df254f4b6515419929eb0ee137da90b0531f670719,2025-05-20T06:15:38.267000
CVE-2022-29624,0,0,e0749953c80faf1df7f82852bc13829ea14d66ffc837efcbeabe194e42a024a1,2024-11-21T06:59:27.360000
CVE-2022-29627,0,0,dc814ea8434f706b08f8e1b29057a571abf6add1cd77775b0905eb2df1d5df8d,2024-11-21T06:59:27.497000
CVE-2022-29628,0,0,3a3ff3894e961965d3f51fde0683c15eaf592196d39ee75c41fdeff53828313a,2024-11-21T06:59:27.643000
@ -235981,12 +235981,12 @@ CVE-2023-45150,0,0,c7f9dd08e5d77b39bc516d75b449467167616f136216a14a5454a52abd145
CVE-2023-45151,0,0,600ad9bef1af059cc06cf18b91759f47e4001f5306c7bd0430380f7c365a7deb,2024-11-21T08:26:27.163000
CVE-2023-45152,0,0,943782991041bd072188f8052045aaa97addd1415f2ecc4292b6c970e4d54ad7,2024-11-21T08:26:27.290000
CVE-2023-45158,0,0,cb1ee5b47a4e4a2c609f7bacd4116415e479ffc185940ef324302139e32c5d3c,2024-11-21T08:26:27.417000
CVE-2023-45159,0,0,f29df7f918ed5e7ab0d1a716cc7594717050259bbdeb44426240e79e8ac51f91,2024-11-21T08:26:27.540000
CVE-2023-45159,0,1,b9bc6287da98dec1694ba39ed6a4ea54fb597e262f5f018e60953cb38c730905,2025-05-20T09:15:19.890000
CVE-2023-4516,0,0,e52eb7078473a64c22cc5e7d51b66a4c2a7e135da3f90b0c02d26572bd669cdb,2024-11-21T08:35:19.940000
CVE-2023-45160,0,0,8bf5b6dab3d2de484b3579269581503da09a213f9b1f780032700e3677995b48,2024-11-21T08:26:27.673000
CVE-2023-45161,0,0,6e5edc02493dd630b3c39be9dbe1ccfab174eb66f2c16ff1e6f8ce09f55c80ef,2024-11-21T08:26:27.807000
CVE-2023-45162,0,0,7c360b584e0481a242ecf8f9599ab48049687d368490c1bd44c6a34dc4c95e36,2024-11-21T08:26:27.933000
CVE-2023-45163,0,0,f82d830f625745916add74f4d711ccffd3f67c54efcee9dcf0ba736a80de774e,2024-11-21T08:26:28.060000
CVE-2023-45160,0,1,e88fea2b396f0a645f60cafac5ef44cee77e41ff7c265b4908b1b3f6e9cd1883,2025-05-20T09:15:20.110000
CVE-2023-45161,0,1,7d106015c84ab31b616d83ed9a5d4ec16832e510a44881ef4e9ab96f0416c465,2025-05-20T09:15:20.277000
CVE-2023-45162,0,1,8ff1570da578ce6e73413b5565a9ba3568c0516572a1c79b6e19631a830c977c,2025-05-20T09:15:20.453000
CVE-2023-45163,0,1,8622920795bd8322d97be3b8dfb1e3ceb1f083d9d013a98f8c8d5d0646fbf5c7,2025-05-20T09:15:20.620000
CVE-2023-45165,0,0,e0a24584cf7e01397eb37eb125f5a89d07d23fb12b0d63a28674130d9490ad54,2024-11-21T08:26:28.180000
CVE-2023-45166,0,0,ca78f5b0d900affe2aeec2b5e842d25075b740d8bc85ca31614781d5e8f31712,2024-11-21T08:26:28.320000
CVE-2023-45167,0,0,3fac0182ae93b6f4487853ce543f75e36ef54e71153d1e86e0dedcd3164dc70b,2024-11-21T08:26:28.427000
@ -242731,7 +242731,7 @@ CVE-2023-5960,0,0,0a5a002761a86fa1b6485cdb85b3bcbd0fd79d97666e56db2ab5d7f92b3abf
CVE-2023-5961,0,0,d753467e36892ee45d9ca5fa392d677843a1ef1a00b32288494ae65179f9d54a,2024-11-21T08:42:52.213000
CVE-2023-5962,0,0,d11a011ec907801009f51abd2a1c600f76fa89575f907dc98e28506cedadc02c,2024-11-21T08:42:52.350000
CVE-2023-5963,0,0,e36b3714b0b40635b9ab945402c88b1f60e9dcd9f87e9b5bf0d400ed1c381ec9,2024-11-21T08:42:52.487000
CVE-2023-5964,0,0,8c05b32c42ce99a5b0b7b10906247b004d5903cf19af78e237562bd99f440b45,2024-11-21T08:42:52.617000
CVE-2023-5964,0,1,539eec2f3f6481ed806e608497667999a1fa1e487f2044410d25b9e4b7644687,2025-05-20T09:15:20.783000
CVE-2023-5965,0,0,43b68f25622cbc4afaacc75a6c3bea1eb57560d01f134e017f0f7f56c84c584a,2024-11-21T08:42:52.750000
CVE-2023-5966,0,0,d228a55ef2906277c190e5ccbe803f52316e5ec7568dae55bcb2a52828adcd9a,2024-11-21T08:42:52.887000
CVE-2023-5967,0,0,0ab93dcc8bd1df1b00af3a1010094972d14e93007e5d6ad366ec57ce4dd8af0b,2024-11-21T08:42:53.007000
@ -278184,6 +278184,7 @@ CVE-2024-5874,0,0,a9e63275a6908bf33435b1a068d43670d23b99f7e26f6c3e737caf48c16722
CVE-2024-5875,0,0,44af9bee588327c2ca80a9b9f8de675fcbafdc3655e379b366f773cfa94b6083,2024-11-22T20:15:11.030000
CVE-2024-5876,0,0,7286b893a116712d4761303a4e95bae2ff052335781740d3a04822319399d335,2024-11-22T20:15:11.150000
CVE-2024-5877,0,0,80c9d096970c353d960baff3613e5714705d2472757521ca853917c42670fd80,2024-11-22T20:15:11.260000
CVE-2024-5878,1,1,4d1b66d7ebdf286e883cfe16abb16892bfa3f8055dedca98cc82e119a070c6d7,2025-05-20T08:15:32.503000
CVE-2024-5879,0,0,25d590c240497c40edd9974939e9cd1cb176442396e55f11847e771d41e50789,2024-09-03T14:59:58.410000
CVE-2024-5880,0,0,78f8c17ca2ad5fed28c3a337430fec0785ea8b668d98c2fb361597e109dcd3f6,2024-08-21T12:30:33.697000
CVE-2024-5881,0,0,21d92582eca7d96a4d513ea191ceb6e9c724b7a61d96b6d9d17dd755a85dcf77,2024-11-21T09:48:30.933000
@ -279443,7 +279444,7 @@ CVE-2024-7206,0,0,ad60a7a5a75d525e01cac28f53d4e84e66cf8597e578c42124f1b03bae3bfa
CVE-2024-7207,0,0,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000
CVE-2024-7208,0,0,5c1c8a0c5391bbafe9eb145590dff4387ed7a993e57835f061faba629740fb08,2024-11-21T09:51:05.693000
CVE-2024-7209,0,0,329011cdb361ddb9d01891aacfdb2f81d01db18c5a881c79b57c0a85691aa572,2024-11-21T09:51:05.863000
CVE-2024-7211,0,0,74f4b96eec610a6fd5702b572b63482e78caceb20ff9387e44c746ec3474bfc0,2025-03-13T17:15:33.897000
CVE-2024-7211,0,1,4cc94f465b2af1cc76dca7e93b6057940eb3a466594f92b065f391c3976f8896,2025-05-20T09:15:20.953000
CVE-2024-7212,0,0,255208a552d011daea8c4c0306723dc64701b6dc83a5500e5102ce4f6a4e311a,2024-11-21T09:51:06.083000
CVE-2024-7213,0,0,ae2422a3eb9d8111cbdba82544a713dc0adfa15fa4aab588cf289b337f742a06,2024-11-21T09:51:06.243000
CVE-2024-7214,0,0,4b60dac041ea2b5cca8216779266a06040ee6c89788223dec568748093b55139,2024-11-21T09:51:06.390000
@ -289571,7 +289572,7 @@ CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb
CVE-2025-29280,0,0,c83ace369ab12b752e492629ae9e8f33e54a84e80d1b54f1d7c41067196d649c,2025-04-15T18:39:27.967000
CVE-2025-29281,0,0,2a7988381be20926091f1694d6a54d7bfbb1804fbd7d2018b969009fcc5366ef,2025-04-15T18:39:27.967000
CVE-2025-29287,0,0,42df811955ba1e4d114222caf2c52a1ffbd7161bdcf19b3119f6c2c189270252,2025-04-24T16:37:54.607000
CVE-2025-2929,1,1,15dc49988499361e66ce336a7e2eea08f9615e17195b4afff997ef366a6985dd,2025-05-20T06:15:38.737000
CVE-2025-2929,0,0,15dc49988499361e66ce336a7e2eea08f9615e17195b4afff997ef366a6985dd,2025-05-20T06:15:38.737000
CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000
CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000
CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000
@ -293443,7 +293444,7 @@ CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e
CVE-2025-4316,0,0,a3cffae4e2b5f53f1a661b0b9d82da9e0409120ddd80fb5f02808f802009be7c,2025-05-14T13:15:48.907000
CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000
CVE-2025-4318,0,0,73cdf24936a82810c3179f2491c41f7aa46df0277cfdc5785e8661e453babeab,2025-05-05T20:54:19.760000
CVE-2025-4322,1,1,292bf523e4e7125c7124e6b1b1b5c7988452be5954d24cb534315d754d74c78e,2025-05-20T06:15:38.883000
CVE-2025-4322,0,0,292bf523e4e7125c7124e6b1b1b5c7988452be5954d24cb534315d754d74c78e,2025-05-20T06:15:38.883000
CVE-2025-4323,0,0,a92a49c291d6e9dc74ae26b690a6171ab8ae00628949ef68fbb0006bd7671b31,2025-05-07T14:13:35.980000
CVE-2025-4324,0,0,58fa7de6e56ad865b5257250bcee13b8e1686fe64bd3ad7adcfbc671861c19e1,2025-05-07T14:13:35.980000
CVE-2025-4325,0,0,1299ff4897172a144ee0e16b1d34c0aad4d0fd187c1a443cf1078d388ba95503,2025-05-07T14:13:35.980000
@ -294809,4 +294810,5 @@ CVE-2025-4940,0,0,b6be136fc0ef4b0eb5a8eec752f22b0f38f3d3b001a9b3bbdf166af200dea9
CVE-2025-4941,0,0,4c57c981711880dd52105d2b77aac4c5f12f4423aa23a377c58de75d52cc1c76,2025-05-19T17:15:28.883000
CVE-2025-4945,0,0,da8fb39a1d18adc5b07df1f5ff561259b24dda4c7d62b67ade3bc1e2feb817ce,2025-05-19T17:15:29.103000
CVE-2025-4948,0,0,f655cc28946460aec5eb35f476b31c0d2a80bbf05c0aebc0d5eae8ac7d7d37b6,2025-05-19T16:15:36.790000
CVE-2025-4951,1,1,b4c30a581d030a75b450a9c4c5578dfa2f0031aca87c2209df151d924369b706,2025-05-20T09:15:21.207000
CVE-2025-4971,0,0,bd64c77f6ebfe3123c278b4a1adcfdb3e60cd3a30600fc53908cb97638876438,2025-05-20T00:15:25.253000

Can't render this file because it is too large.