mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-04-05T02:00:30.682267+00:00
This commit is contained in:
parent
1f4288dd88
commit
42c9f2e286
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-21T14:15:08.250",
|
||||
"lastModified": "2024-11-21T15:15:21.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.617",
|
||||
"lastModified": "2024-11-27T16:15:13.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.710",
|
||||
"lastModified": "2024-11-27T16:15:13.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.810",
|
||||
"lastModified": "2024-12-04T15:15:09.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-18T20:15:04.163",
|
||||
"lastModified": "2024-11-21T09:27:11.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4455",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-24T11:15:09.613",
|
||||
"lastModified": "2025-04-04T23:49:13.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-21T09:42:51.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,101 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yithemes:yith_woocommerce_ajax_search:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4.1",
|
||||
"matchCriteriaId": "A79EA785-D9C5-478E-AFEF-585271823788"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/yith-woocommerce-ajax-search/trunk/includes/admin/class-yith-wcas-admin-statistic-list-table.php#L213",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3091321",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0f5fd4-cd06-4d11-9f22-1f417b546afb?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/yith-woocommerce-ajax-search/trunk/includes/admin/class-yith-wcas-admin-statistic-list-table.php#L213",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3091321",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0f5fd4-cd06-4d11-9f22-1f417b546afb?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
|
||||
"published": "2024-06-25T20:15:14.013",
|
||||
"lastModified": "2024-11-21T09:47:20.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-20T09:15:10.530",
|
||||
"lastModified": "2024-11-21T09:49:45.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
56
CVE-2025/CVE-2025-15xx/CVE-2025-1500.json
Normal file
56
CVE-2025/CVE-2025-15xx/CVE-2025-1500.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-1500",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-05T01:15:42.000",
|
||||
"lastModified": "2025-04-05T01:15:42.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Application Suite 9.0 could allow an authenticated user to upload a file with dangerous types that could be executed by another user if opened."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7230140",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un desbordamiento de b\u00fafer basado en pila en Ivanti Connect Secure anterior a la versi\u00f3n 22.7R2.6, Ivanti Policy Secure anterior a la versi\u00f3n 22.7R1.4 e Ivanti ZTA Gateways anterior a la versi\u00f3n 22.8R2.2 permite que un atacante remoto no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
60
CVE-2025/CVE-2025-28xx/CVE-2025-2889.json
Normal file
60
CVE-2025/CVE-2025-28xx/CVE-2025-2889.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2889",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-05T00:15:15.287",
|
||||
"lastModified": "2025-04-05T00:15:15.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/link-library/tags/7.7.3/link-library-admin.php#L7610",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0881efbe-9b47-4b56-be2d-12258460b429?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka \"Unauthenticated HTTP(S) port access.\" A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to login_user_pass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username, which triggers the successful anypass authentication process, but the server will fail to find the expected SignedHeaders entry, resulting in an index-out-of-bounds error that stops the code from reaching the session cleanup. Together, these issues make it trivial to authenticate as any known or guessable user (e.g., crushadmin), and can lead to a full compromise of the system by obtaining an administrative account."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CrushFTP 10 anterior a la 10.8.4 y 11 anterior a la 11.3.1 permite omitir la autenticaci\u00f3n y tomar el control de la cuenta crushadmin (a menos que se utilice una instancia de proxy DMZ), como se explot\u00f3 en marzo y abril de 2025, tambi\u00e9n conocido como \"Acceso al puerto HTTP(S) sin autenticar\". Existe una condici\u00f3n de ejecuci\u00f3n en el m\u00e9todo de autorizaci\u00f3n AWS4-HMAC (compatible con S3) del componente HTTP del servidor FTP. El servidor verifica primero la existencia del usuario mediante una llamada a login_user_pass() sin necesidad de contrase\u00f1a. Esto autenticar\u00e1 la sesi\u00f3n mediante el proceso de verificaci\u00f3n HMAC hasta que el servidor vuelva a verificar la verificaci\u00f3n del usuario. La vulnerabilidad se puede estabilizar a\u00fan m\u00e1s, eliminando la necesidad de activar una condici\u00f3n de ejecuci\u00f3n, mediante el env\u00edo de un encabezado AWS4-HMAC alterado. Al proporcionar \u00fanicamente el nombre de usuario y una barra diagonal (/), el servidor encontrar\u00e1 un nombre de usuario, lo que activar\u00e1 la autenticaci\u00f3n anypass. Sin embargo, no encontrar\u00e1 la entrada SignedHeaders esperada, lo que generar\u00e1 un error de indexaci\u00f3n fuera de los l\u00edmites que impedir\u00e1 que el c\u00f3digo complete la limpieza de la sesi\u00f3n. En conjunto, estos problemas dificultan la autenticaci\u00f3n con cualquier usuario conocido o indeterminado (p. ej., crushadmin) y pueden comprometer por completo el sistema al obtener una cuenta administrativa."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
36
README.md
36
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-04T23:55:19.567471+00:00
|
||||
2025-04-05T02:00:30.682267+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-04T23:49:13.973000+00:00
|
||||
2025-04-05T01:15:42+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,37 +27,37 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-04-03T00:00:04.356823+00:00
|
||||
2025-04-05T00:00:04.383687+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288671
|
||||
288673
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-04-05T01:15:42.000`)
|
||||
- [CVE-2025-2889](CVE-2025/CVE-2025-28xx/CVE-2025-2889.json) (`2025-04-05T00:15:15.287`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2024-12254](CVE-2024/CVE-2024-122xx/CVE-2024-12254.json) (`2025-04-04T23:15:39.980`)
|
||||
- [CVE-2024-23444](CVE-2024/CVE-2024-234xx/CVE-2024-23444.json) (`2025-04-04T23:15:41.133`)
|
||||
- [CVE-2024-36945](CVE-2024/CVE-2024-369xx/CVE-2024-36945.json) (`2025-04-04T23:15:41.307`)
|
||||
- [CVE-2024-36958](CVE-2024/CVE-2024-369xx/CVE-2024-36958.json) (`2025-04-04T23:15:41.430`)
|
||||
- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2025-04-04T23:49:13.973`)
|
||||
- [CVE-2024-50602](CVE-2024/CVE-2024-506xx/CVE-2024-50602.json) (`2025-04-04T23:15:41.537`)
|
||||
- [CVE-2024-53580](CVE-2024/CVE-2024-535xx/CVE-2024-53580.json) (`2025-04-04T23:15:41.727`)
|
||||
- [CVE-2024-5688](CVE-2024/CVE-2024-56xx/CVE-2024-5688.json) (`2025-04-04T23:46:14.507`)
|
||||
- [CVE-2025-1147](CVE-2025/CVE-2025-11xx/CVE-2025-1147.json) (`2025-04-04T23:15:41.910`)
|
||||
- [CVE-2025-1148](CVE-2025/CVE-2025-11xx/CVE-2025-1148.json) (`2025-04-04T23:15:42.083`)
|
||||
- [CVE-2025-1153](CVE-2025/CVE-2025-11xx/CVE-2025-1153.json) (`2025-04-04T23:15:42.230`)
|
||||
- [CVE-2025-30204](CVE-2025/CVE-2025-302xx/CVE-2025-30204.json) (`2025-04-04T23:15:42.443`)
|
||||
- [CVE-2024-11088](CVE-2024/CVE-2024-110xx/CVE-2024-11088.json) (`2024-11-21T15:15:21.097`)
|
||||
- [CVE-2024-11701](CVE-2024/CVE-2024-117xx/CVE-2024-11701.json) (`2024-11-27T16:15:13.470`)
|
||||
- [CVE-2024-11702](CVE-2024/CVE-2024-117xx/CVE-2024-11702.json) (`2024-11-27T16:15:13.660`)
|
||||
- [CVE-2024-11703](CVE-2024/CVE-2024-117xx/CVE-2024-11703.json) (`2024-12-04T15:15:09.437`)
|
||||
- [CVE-2024-39090](CVE-2024/CVE-2024-390xx/CVE-2024-39090.json) (`2024-11-21T09:27:11.500`)
|
||||
- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2024-11-21T09:42:51.933`)
|
||||
- [CVE-2024-5276](CVE-2024/CVE-2024-52xx/CVE-2024-5276.json) (`2024-11-21T09:47:20.107`)
|
||||
- [CVE-2024-6497](CVE-2024/CVE-2024-64xx/CVE-2024-6497.json) (`2024-11-21T09:49:45.437`)
|
||||
- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-03T16:15:35.370`)
|
||||
- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-03T20:15:25.373`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
44
_state.csv
44
_state.csv
@ -245547,7 +245547,7 @@ CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355
|
||||
CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000
|
||||
CVE-2024-11088,0,0,63268aae491d1c648e7cfec2d8bb4b9b8988c9a8de960fef99629298e381225d,2024-11-21T15:15:21.097000
|
||||
CVE-2024-11088,0,1,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000
|
||||
CVE-2024-11089,0,0,0f46a9a629be88f215b4a7ad0d79575a4e3b0caab898de683427fa2e5561e411,2024-11-21T15:15:21.500000
|
||||
CVE-2024-1109,0,0,a7b1e71489d6774ecfe851782646b725fb9b27ab957ae0f8b7f311d63d7950f6,2024-11-21T08:49:48.980000
|
||||
CVE-2024-11090,0,0,c176ccf3141a40259cf6c4995f025e29b8341ceb796ecba9c85f772827fb28cf,2025-02-04T20:03:08.833000
|
||||
@ -246163,9 +246163,9 @@ CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7
|
||||
CVE-2024-11699,0,0,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000
|
||||
CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000
|
||||
CVE-2024-11700,0,0,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000
|
||||
CVE-2024-11701,0,0,c825848705d456c74824a186f3a702976bbd1db3104a2cd1c202a595c80d93b4,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,0,e280c66930279c933ba67473303c53b6d6772276abccd746d35e492c09179838,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,0,066d1bf191b3c715a9f0e76133a16cb73e57cb6df71926665b900ef9b350c267,2024-12-04T15:15:09.437000
|
||||
CVE-2024-11701,0,1,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,1,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,1,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000
|
||||
CVE-2024-11704,0,0,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff729c0,2025-02-04T14:15:30.700000
|
||||
CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14
|
||||
CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce0e6,2024-11-26T17:15:23.010000
|
||||
@ -246720,7 +246720,7 @@ CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e
|
||||
CVE-2024-12251,0,0,dda4d3d898648e187bcccf5df20d7c8aca677d53f4ed4b4ecfb65153761a4c41,2025-03-28T18:33:37.333000
|
||||
CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000
|
||||
CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000
|
||||
CVE-2024-12254,0,1,976d5bdc66f5280972e0a945f02b4d24fbb18a073445a80e18a1cdb637f945ee,2025-04-04T23:15:39.980000
|
||||
CVE-2024-12254,0,0,976d5bdc66f5280972e0a945f02b4d24fbb18a073445a80e18a1cdb637f945ee,2025-04-04T23:15:39.980000
|
||||
CVE-2024-12255,0,0,3e6ee7ef8ecf957b3c9750bb4e9452362942858fad7f6d35e3c4d339eaa5898b,2024-12-12T15:15:09.967000
|
||||
CVE-2024-12256,0,0,c941079a381520ece27502570cadaf7ad5874ae769a71d660938dc9b1a958440,2025-01-07T05:15:16.857000
|
||||
CVE-2024-12257,0,0,51052901a7cca4cc3e08f8db1db23715b8800d7e5a86753505efbff635c332e0,2024-12-07T02:15:19.187000
|
||||
@ -251760,7 +251760,7 @@ CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01af
|
||||
CVE-2024-23441,0,0,5fbfae92029097d4fc891359f80283dcab2b38733988c2bba5734ba6888ded2a,2024-11-21T08:57:42.840000
|
||||
CVE-2024-23442,0,0,85a9a2957fc08ee9b474618a1da6b8d0a607c36f5bd40b243be47bb63ce225c4,2024-11-21T08:57:42.983000
|
||||
CVE-2024-23443,0,0,79d3867a4e948824eaf20b1806b13e7084a9b2c28ab2263038bce23380ab86d5,2024-11-21T08:57:43.147000
|
||||
CVE-2024-23444,0,1,db3d0b628516f2559978838ef3c759c9a331ddfdac474bda6c11f5a1d748495b,2025-04-04T23:15:41.133000
|
||||
CVE-2024-23444,0,0,db3d0b628516f2559978838ef3c759c9a331ddfdac474bda6c11f5a1d748495b,2025-04-04T23:15:41.133000
|
||||
CVE-2024-23445,0,0,5a98d70239e8a6725edcc504c99917a137f22d7333af5692831022efa1e7fc8e,2024-11-21T08:57:43.363000
|
||||
CVE-2024-23446,0,0,5dac469644df56e016069cb2b6033de032a2a84a296ba41a4b3adb64c5000379,2024-11-21T08:57:43.497000
|
||||
CVE-2024-23447,0,0,6afa966e7df879c22a58cc28eb7dd08f955e5e8addd70577ae0aef510a1a7749,2024-11-21T08:57:43.630000
|
||||
@ -262046,7 +262046,7 @@ CVE-2024-36941,0,0,0222ea69f43ad46c3fce7bf3cc89a74c5d85c25a7339eb5a186c15794aa9e
|
||||
CVE-2024-36942,0,0,6990c41ddeed02c5583595840ca0180a77872ea659da5f8a0bb089b504569ae8,2025-02-27T20:15:39.403000
|
||||
CVE-2024-36943,0,0,9e8bdb62eb129ccfd7f8944661396439f413c214652e234e842dfcaa990b1f85,2024-11-21T09:22:52.417000
|
||||
CVE-2024-36944,0,0,8364d2cf73259d980ea2a7d90012b786bad5d6d4218210694e8d7ab25797f564,2025-04-01T18:35:48.893000
|
||||
CVE-2024-36945,0,1,1683fc8ac505c513b85c54362fd0c97e9de8c9bd3b42eb3a0a0278810f9df59d,2025-04-04T23:15:41.307000
|
||||
CVE-2024-36945,0,0,1683fc8ac505c513b85c54362fd0c97e9de8c9bd3b42eb3a0a0278810f9df59d,2025-04-04T23:15:41.307000
|
||||
CVE-2024-36946,0,0,f7720481f875ad60323f73dfece362f55869f5bf618838e67f86d53b9ec416f4,2024-11-21T09:22:52.860000
|
||||
CVE-2024-36947,0,0,ad57448cd824c61b99dcb8bb5a6830ff85aabec778ec9016bb3e53b843279f52,2024-11-21T09:22:52.987000
|
||||
CVE-2024-36948,0,0,5d1a47a335dbad3c82a10fcb17ccd4f0f40beddd9a2aa396f82c4e52ec25a557,2024-11-21T09:22:53.177000
|
||||
@ -262060,7 +262060,7 @@ CVE-2024-36954,0,0,28106aec0b590601b75bf1ccd0fb0f1ce8ae213b8c50aeeacdc1c70aeacca
|
||||
CVE-2024-36955,0,0,f1e2221279c4ad89e89477cefcafb3dea4feb0b616de471525edd589d52783b8,2025-04-01T18:35:58.960000
|
||||
CVE-2024-36956,0,0,670367ce28b981b19beb483f65703c81b6c9e3f1cfa11ba71ef0de2c9fd73281,2024-11-21T09:22:54.340000
|
||||
CVE-2024-36957,0,0,e832b85488d403a3576dfa9850b89c0e9192ac2af139c7d8635591403bb02162,2024-11-21T09:22:54.457000
|
||||
CVE-2024-36958,0,1,411d738158d23c7da5e1735045c20a1b1e40917f0cea854f1c7f3ec9d78c4fe6,2025-04-04T23:15:41.430000
|
||||
CVE-2024-36958,0,0,411d738158d23c7da5e1735045c20a1b1e40917f0cea854f1c7f3ec9d78c4fe6,2025-04-04T23:15:41.430000
|
||||
CVE-2024-36959,0,0,5ea22f91ec0ae9d206a9d5aa206a0a0a40192b401da7b70baff93b240bf4beab,2025-01-14T15:38:24.327000
|
||||
CVE-2024-3696,0,0,cd040b6d57fb41b2dd28accf6deb260c071daedb053591412e6549f703975831,2025-03-04T17:50:15.240000
|
||||
CVE-2024-36960,0,0,36c5553dc36ab4e347e540bc68144e1a6b8ee977d6414130075940cbba6a80c2,2025-04-01T18:36:15.960000
|
||||
@ -263908,7 +263908,7 @@ CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a
|
||||
CVE-2024-3908,0,0,32cc26b53789ac42f9085c7424d4e7e5e1385983e1e04bf11b22f248840a758b,2025-01-17T21:16:07.327000
|
||||
CVE-2024-39081,0,0,1ea98431957362ab56a3af379eeef002d3bbd99853a222b010a3be68bd797b7b,2025-03-17T15:15:40.787000
|
||||
CVE-2024-3909,0,0,d5574f4925d57273c75b63e724e2aae982f973388b6e621ddd87893b5d997ccf,2025-02-07T01:57:01.643000
|
||||
CVE-2024-39090,0,0,c1fb932b3c7852f6751439bcd02ca4ef3c48bbe1e8476802f1cae84e9705ca59,2024-11-21T09:27:11.500000
|
||||
CVE-2024-39090,0,1,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000
|
||||
CVE-2024-39091,0,0,c140294e78a78cd7474377e032af5887e358fd95402a58bcd7abb93d413219ea,2024-08-13T21:35:02.617000
|
||||
CVE-2024-39094,0,0,3489f753e4de88b28bdf0c4a0934830757dd9bc356968fa920ba404447b0e998,2025-03-13T16:15:20.363000
|
||||
CVE-2024-39097,0,0,2ffe2246b6dcf8095996d63654e4d34504f5907f265a5a3acdcc049adc39575e,2024-08-27T16:35:13.930000
|
||||
@ -268027,7 +268027,7 @@ CVE-2024-44541,0,0,360d36038a09153826fdb7f75c9d2e58a990ae541d7e417f9aef6615b41fd
|
||||
CVE-2024-44542,0,0,69649467d837964ae89a10ea879537e85831463615e76c2141ca248d248803a6,2024-09-20T12:30:17.483000
|
||||
CVE-2024-44546,0,0,e2c66d94fd13e792ad683596bcac74d7412b12faf579386ee0b995b81a04d1c6,2024-11-19T20:35:24.240000
|
||||
CVE-2024-44549,0,0,a5aaecd9ba75cc32cf841f25e868951de8e2b2b047d881486d13d5755c1993c4,2024-08-27T14:28:55.157000
|
||||
CVE-2024-4455,0,1,86fb5ac865589bd6dbf1b2f040499164e25192c3199bbf5250acc72b40c8d8cd,2025-04-04T23:49:13.973000
|
||||
CVE-2024-4455,0,1,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000
|
||||
CVE-2024-44550,0,0,6e5e7c90073553915c6cbf84e10c6c9591a0626baa58af3865b7686a30be241b,2024-08-27T14:29:02.370000
|
||||
CVE-2024-44551,0,0,491acb9f04edacb91a77c381669fbbb0354d22a271035ec891cb7e6dae2aedd9,2025-03-26T21:15:22.887000
|
||||
CVE-2024-44552,0,0,a087d6467b3cb42f42c6e6b84dd6f027e5da09823e0cbf8267d22b995bc21428,2025-03-18T20:15:23.460000
|
||||
@ -272521,7 +272521,7 @@ CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4
|
||||
CVE-2024-5060,0,0,9259331461b85b218344bae9506c1ccc79a5eb7cd745e49fb425d4b8636feb8f,2025-04-04T18:07:39.117000
|
||||
CVE-2024-50600,0,0,1f18a87c7801886bd3cde354ace808a7f14db6d1a9a3674ff94ef2cb61a86901,2025-03-07T15:15:13.750000
|
||||
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
|
||||
CVE-2024-50602,0,1,c8679d01dce94350b3e4ccaad0dce0d8f82380fa70421ca1de89b3de391bf339,2025-04-04T23:15:41.537000
|
||||
CVE-2024-50602,0,0,c8679d01dce94350b3e4ccaad0dce0d8f82380fa70421ca1de89b3de391bf339,2025-04-04T23:15:41.537000
|
||||
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
|
||||
CVE-2024-50608,0,0,51ecf10e9baf01633bbb5e85c324d80569aba0c84ef45dfc95415a77cf18f169,2025-02-19T15:15:13.970000
|
||||
CVE-2024-50609,0,0,13a80120c263e02c26f34abc2d26a7abd63cd9ad83e4a9b5fc5a520f4fc3fb3a,2025-02-19T15:15:14.497000
|
||||
@ -273910,7 +273910,7 @@ CVE-2024-52754,0,0,48cc5ef43bab6bce1fa386028923c49e7c0923b15806ef09a5c3018ee7e7d
|
||||
CVE-2024-52755,0,0,de05a221f5f303a3571b07e9ee4904991bf517e05068473d4c58937000dd6d05,2024-11-22T17:15:09.970000
|
||||
CVE-2024-52757,0,0,7f8fc8be0915a027b31c09e256572b3c7a9077292f6f9e0c888cfd25a0470d57,2024-11-22T17:15:10.150000
|
||||
CVE-2024-52759,0,0,8e96e54d579bea017f42ee64add5580e7ddfbb0696f13a1d140017fedbef2f3c,2024-11-22T17:15:10.323000
|
||||
CVE-2024-5276,0,0,edb47b4fe2542b2c75fac72cbc867c5689134063ef49ae4ca2b14ec2831ef12d,2024-11-21T09:47:20.107000
|
||||
CVE-2024-5276,0,1,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000
|
||||
CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000
|
||||
CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000
|
||||
CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000
|
||||
@ -274500,7 +274500,7 @@ CVE-2024-53566,0,0,5169befd7db7ebb5725344c6b1622ae4de4cab71c37cd96a53ae5495bb145
|
||||
CVE-2024-5357,0,0,6b143c42b66b249c10cf8060085531a38dd8ab251749df6a73e8b8c9b5bd7537,2025-02-21T19:48:37.280000
|
||||
CVE-2024-53573,0,0,c3e20d8447ccfff87f007a16c3e4b4b7293cce35a180bc230bee89e192db70cd,2025-03-04T21:15:11.833000
|
||||
CVE-2024-5358,0,0,6d33ba8bbcb714232ba00a0ab155f47abf8c1c38a71cb020e5efc05fb9de6ae3,2025-02-21T19:47:18.300000
|
||||
CVE-2024-53580,0,1,c5e46c5931c19a96ceafdb3cc318319b1b3214d7bb4c4a1939f2bedf2aa6c360,2025-04-04T23:15:41.727000
|
||||
CVE-2024-53580,0,0,c5e46c5931c19a96ceafdb3cc318319b1b3214d7bb4c4a1939f2bedf2aa6c360,2025-04-04T23:15:41.727000
|
||||
CVE-2024-53582,0,0,0bed2b68c86a00a5eda33444832ab7ea42f89b515cdb605a2399539bf83966b2,2025-03-24T17:15:19.513000
|
||||
CVE-2024-53584,0,0,7ba23112667b3f7675b9d0f4383b067aedf47db324f1184621b694602d01b58a,2025-03-18T19:15:46.150000
|
||||
CVE-2024-53586,0,0,301d02093d38a6f54562884a5fff3b8994d8a5baf163448220588eedaadf08a2,2025-02-11T15:15:17.870000
|
||||
@ -276558,7 +276558,7 @@ CVE-2024-56841,0,0,ed3d95bc1950728799aee37326d32f44c3872f343c5377c0bf1bddfc86b58
|
||||
CVE-2024-5685,0,0,2d6b631f654a98eb4d420c5da149286286a9d638c829ff7827b94e7c52131735,2025-03-07T16:07:06.043000
|
||||
CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c1645806,2024-11-21T09:48:09.690000
|
||||
CVE-2024-5687,0,0,ceba3175c3bfd14790e93d6d60cf2282164bca8098cfa2f452b5343d2a9e086b,2025-03-27T20:13:57.260000
|
||||
CVE-2024-5688,0,1,d5859f0e06cb4ebc97487fae3042b7b415f604e561186dfe8f72fb7cc29fccbc,2025-04-04T23:46:14.507000
|
||||
CVE-2024-5688,0,0,d5859f0e06cb4ebc97487fae3042b7b415f604e561186dfe8f72fb7cc29fccbc,2025-04-04T23:46:14.507000
|
||||
CVE-2024-56882,0,0,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000
|
||||
CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000
|
||||
CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000
|
||||
@ -277908,7 +277908,7 @@ CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff162
|
||||
CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000
|
||||
CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000
|
||||
CVE-2024-6496,0,0,8ee0438cf6f5aca09ea72030714574ba710a867e64257498ed88d82c0fbc800e,2024-08-07T14:35:07.403000
|
||||
CVE-2024-6497,0,0,07f4d140fbb599c99c6629075818a1f612c766637045bca9f32104a7501b4ace,2024-11-21T09:49:45.437000
|
||||
CVE-2024-6497,0,1,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000
|
||||
CVE-2024-6498,0,0,d6615d703509a8a6bb0fec23352394e0db77972d8a99657bf636fa92bfdaa089,2024-09-06T17:35:19.293000
|
||||
CVE-2024-6499,0,0,35c38f947633fe6fdfe909156ebfa6cfdc8e69372314f896d5eab4274f10b227,2024-09-26T22:07:50.040000
|
||||
CVE-2024-6500,0,0,fd0ae55a5b49a6356709e92760fc530e49b2c4c056147200f16a6a1f57743bcc,2024-08-19T13:00:23.117000
|
||||
@ -281866,13 +281866,13 @@ CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a
|
||||
CVE-2025-1144,0,0,ea84fba2bf084de3cf1b34f4f34b09f9b0291948806cd61b72532d8b5e4fe2be,2025-02-11T06:15:20.310000
|
||||
CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000
|
||||
CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000
|
||||
CVE-2025-1147,0,1,865eb59d87f74829541be6178639d8cb467ad3f301bf8882b0520a24d5fe1971,2025-04-04T23:15:41.910000
|
||||
CVE-2025-1148,0,1,ab97a8d74c669cc2672af73f8ee896ed43a3f6138e60ccd9bdb64646e1e40185,2025-04-04T23:15:42.083000
|
||||
CVE-2025-1147,0,0,865eb59d87f74829541be6178639d8cb467ad3f301bf8882b0520a24d5fe1971,2025-04-04T23:15:41.910000
|
||||
CVE-2025-1148,0,0,ab97a8d74c669cc2672af73f8ee896ed43a3f6138e60ccd9bdb64646e1e40185,2025-04-04T23:15:42.083000
|
||||
CVE-2025-1149,0,0,35bfbff22496bb11a6694c9d96c7c8eced02f5e02ddd56bc706518a22d5cfe5d,2025-03-04T15:50:19.490000
|
||||
CVE-2025-1150,0,0,ffb8572ccf12d9cddae4d61931487456e4318f6c507382ea2cc71d589e44e06e,2025-03-11T19:01:04.727000
|
||||
CVE-2025-1151,0,0,16859969cc19367f9df05829a9cc5c45eff42c6325c91deddd3e9bc3033bbc96,2025-03-04T17:16:19.053000
|
||||
CVE-2025-1152,0,0,ccb9190c23d5cf50ceb423977e314585a07ee764df998e5508a7818295875653,2025-03-03T17:32:01.613000
|
||||
CVE-2025-1153,0,1,74fcf3e928e33955da925db020a639386dcb9b0be937a3908554d5e4009286dc,2025-04-04T23:15:42.230000
|
||||
CVE-2025-1153,0,0,74fcf3e928e33955da925db020a639386dcb9b0be937a3908554d5e4009286dc,2025-04-04T23:15:42.230000
|
||||
CVE-2025-1154,0,0,57272d35734346cb9c87a9c3d8280a92cef919f388fe5cd9152692becb234631,2025-02-10T20:15:42.173000
|
||||
CVE-2025-1155,0,0,80c10c69f8c4209d273d0f2f525d1dc06e697593fb801952ed2e59d173c27449,2025-02-10T21:15:22.020000
|
||||
CVE-2025-1156,0,0,b9d7f43a66be70b99a0c5a29d90bee603b5f0498d98b3e0e919a25713e636c40,2025-02-10T21:15:22.133000
|
||||
@ -282102,6 +282102,7 @@ CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f2
|
||||
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000
|
||||
CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000
|
||||
CVE-2025-1500,1,1,dcd5011d60876332630bb48dff1042eb265608cd51b2d8c03e8e8bb9695b5a52,2025-04-05T01:15:42
|
||||
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
|
||||
CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000
|
||||
CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000
|
||||
@ -283744,7 +283745,7 @@ CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3
|
||||
CVE-2025-2245,0,0,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
|
||||
CVE-2025-22457,0,0,d15ae9efc4d84549a102fdac173000023601aa5d5cf3a5e807d8e19a71b8f59b,2025-04-03T16:15:35.370000
|
||||
CVE-2025-22457,0,1,43cc3b0988fd78cd00211e228df2e73a7b4a75544cecc0bddfcf8b3ddb9bdddf,2025-04-03T16:15:35.370000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
|
||||
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
|
||||
@ -287156,6 +287157,7 @@ CVE-2025-28885,0,0,bcaf9c42e10ccff4d56f81fc7722ea247bf8a733f08f824c9662923ba239a
|
||||
CVE-2025-28886,0,0,8829096276344aa5296745d321667067925dd057c12550ef0a399cb1c9566caa,2025-03-11T21:15:46.113000
|
||||
CVE-2025-28887,0,0,57bd8f01d02ed8afd5599ea32c65ee4847f50f38cef546351412e6715f07165d,2025-03-11T21:15:46.270000
|
||||
CVE-2025-28889,0,0,732c22dbcd124786284c91a1d934fea11c90f1310342dd8b73b00ffff26c19da,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2889,1,1,2b8634441a09b229c7a1d292815f332ea11180a684b0f330efc2fbed9fe63456,2025-04-05T00:15:15.287000
|
||||
CVE-2025-28890,0,0,4a332fde3e2ea608ea5eb36fa4d3f0981ec81767d5f2cf4ce855cdc2b6daff5f,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28891,0,0,a1b5bb5f2f1783066a2dc188201e0fee55eed7b8b66d4a435f23c2884b26ac7b,2025-03-11T21:15:46.420000
|
||||
CVE-2025-28892,0,0,8aa9cbc46d03648f41dcf59189028804e3b767a8c273cd789a68b3e54bc7fd91,2025-03-11T21:15:46.570000
|
||||
@ -287503,7 +287505,7 @@ CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7f
|
||||
CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000
|
||||
CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000
|
||||
CVE-2025-30203,0,0,e800abc36567cdb1aba654be30422b80d90780ac94d6ea5cf2b8a4bf6a4b6384,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30204,0,1,7bd4031e29493ef25dd2042a5f778e7f2ac78e134a5c8efc8e92df9ba66c9513,2025-04-04T23:15:42.443000
|
||||
CVE-2025-30204,0,0,7bd4031e29493ef25dd2042a5f778e7f2ac78e134a5c8efc8e92df9ba66c9513,2025-04-04T23:15:42.443000
|
||||
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30209,0,0,ca85555ac6409e2cc639554bb6f23475b46a539ab4ead27cd69c29cc29e86660,2025-04-01T20:26:22.890000
|
||||
@ -287987,7 +287989,7 @@ CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb
|
||||
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000
|
||||
CVE-2025-31161,0,0,3c7f17450075e76cf16966cb078a2ededc4721ff6cd674a4dc8540798dc935c0,2025-04-03T20:15:25.373000
|
||||
CVE-2025-31161,0,1,31ce1d1c0f1506c2c2dddc897b8bc45aea29e21aeae54f317466f0652eacf801,2025-04-03T20:15:25.373000
|
||||
CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user