mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2025-02-22T17:00:20.157115+00:00
This commit is contained in:
parent
3d34cef4cc
commit
92fbb0de8d
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-8900",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-02-21T22:15:10.393",
|
||||
"lastModified": "2025-02-21T22:15:10.393",
|
||||
"lastModified": "2025-02-22T16:15:30.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/941987",
|
||||
|
33
CVE-2024/CVE-2024-125xx/CVE-2024-12577.json
Normal file
33
CVE-2024/CVE-2024-125xx/CVE-2024-12577.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-12577",
|
||||
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"published": "2025-02-22T15:15:10.227",
|
||||
"lastModified": "2025-02-22T15:15:10.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-823"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-469xx/CVE-2024-46975.json
Normal file
33
CVE-2024/CVE-2024-469xx/CVE-2024-46975.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-46975",
|
||||
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"published": "2025-02-22T15:15:10.377",
|
||||
"lastModified": "2025-02-22T15:15:10.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-270"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-478xx/CVE-2024-47896.json
Normal file
33
CVE-2024/CVE-2024-478xx/CVE-2024-47896.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-47896",
|
||||
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"published": "2025-02-22T15:15:10.503",
|
||||
"lastModified": "2025-02-22T15:15:10.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-823"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-529xx/CVE-2024-52939.json
Normal file
33
CVE-2024/CVE-2024-529xx/CVE-2024-52939.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-52939",
|
||||
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"published": "2025-02-22T15:15:10.633",
|
||||
"lastModified": "2025-02-22T15:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to trigger a write data outside the Guest's virtualised GPU memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-823"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
|
||||
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7695",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2025-01-29T08:15:19.933",
|
||||
"lastModified": "2025-02-07T07:15:15.317",
|
||||
"lastModified": "2025-02-22T15:15:10.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -103,6 +103,10 @@
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches",
|
||||
"source": "psirt@moxa.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240164-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-en-50155-switches",
|
||||
"source": "psirt@moxa.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26622",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-21T22:15:13.447",
|
||||
"lastModified": "2025-02-21T22:15:13.447",
|
||||
"lastModified": "2025-02-22T16:15:31.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26750.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26750.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26750",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.210",
|
||||
"lastModified": "2025-02-22T16:15:31.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in appsbd Vitepos allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Vitepos: from n/a through 3.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/vitepos-lite/vulnerability/wordpress-vitepos-plugin-3-1-3-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26756.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26756.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26756",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.350",
|
||||
"lastModified": "2025-02-22T16:15:31.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grimdonkey Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/magic-the-gathering-card-tooltips/vulnerability/wordpress-magic-the-gathering-card-tooltips-plugin-3-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26757.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26757.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26757",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.493",
|
||||
"lastModified": "2025-02-22T16:15:31.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/full-customer/vulnerability/wordpress-full-cliente-plugin-3-1-26-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26760.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26760.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26760",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.633",
|
||||
"lastModified": "2025-02-22T16:15:31.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Wow-Company Calculator Builder allows PHP Local File Inclusion. This issue affects Calculator Builder: from n/a through 1.6.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/calculator-builder/vulnerability/wordpress-calculator-builder-plugin-1-6-2-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26763.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26763.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26763",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.773",
|
||||
"lastModified": "2025-02-22T16:15:31.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection. This issue affects Responsive Slider by MetaSlider: from n/a through 3.94.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/ml-slider/vulnerability/wordpress-slider-gallery-and-carousel-by-metaslider-image-slider-video-slider-plugin-3-94-0-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26764.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26764.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26764",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:31.910",
|
||||
"lastModified": "2025-02-22T16:15:31.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/distance-based-shipping-calculator/vulnerability/wordpress-distance-based-shipping-calculator-plugin-2-0-22-settings-change-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26774.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26774.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26774",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:32.060",
|
||||
"lastModified": "2025-02-22T16:15:32.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rock Solid Responsive Modal Builder for High Conversion \u2013 Easy Popups allows Reflected XSS. This issue affects Responsive Modal Builder for High Conversion \u2013 Easy Popups: from n/a through 1.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/easy-popups/vulnerability/wordpress-responsive-modal-builder-for-high-conversion-easy-popups-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26776.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26776.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26776",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:32.203",
|
||||
"lastModified": "2025-02-22T16:15:32.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/chaty-pro/vulnerability/wordpress-chaty-pro-plugin-3-3-3-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26973.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26973.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26973",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:32.347",
|
||||
"lastModified": "2025-02-22T16:15:32.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WarfarePlugins Social Warfare allows DOM-Based XSS. This issue affects Social Warfare: from n/a through 4.5.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/social-warfare/vulnerability/wordpress-social-warfare-plugin-4-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-270xx/CVE-2025-27012.json
Normal file
56
CVE-2025/CVE-2025-270xx/CVE-2025-27012.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-27012",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-22T16:15:32.497",
|
||||
"lastModified": "2025-02-22T16:15:32.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This issue affects A1POST.BG Shipping for Woo: from n/a through 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/a1post-bg-shipping-for-woocommerce/vulnerability/wordpress-a1post-bg-shipping-for-woo-plugin-1-5-1-csrf-to-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27104",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-21T22:15:13.773",
|
||||
"lastModified": "2025-02-21T22:15:13.773",
|
||||
"lastModified": "2025-02-22T16:15:32.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27105",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-21T22:15:13.910",
|
||||
"lastModified": "2025-02-21T22:15:13.910",
|
||||
"lastModified": "2025-02-22T16:15:32.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27106",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-21T22:15:14.033",
|
||||
"lastModified": "2025-02-21T22:15:14.033",
|
||||
"lastModified": "2025-02-22T16:15:33.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,12 +55,34 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
36
README.md
36
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-22T15:00:21.190758+00:00
|
||||
2025-02-22T17:00:20.157115+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-22T14:15:29.710000+00:00
|
||||
2025-02-22T16:15:33.003000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
282073
|
||||
282087
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-13869](CVE-2024/CVE-2024-138xx/CVE-2024-13869.json) (`2025-02-22T13:15:10.920`)
|
||||
- [CVE-2025-0918](CVE-2025/CVE-2025-09xx/CVE-2025-0918.json) (`2025-02-22T13:15:11.687`)
|
||||
- [CVE-2025-0953](CVE-2025/CVE-2025-09xx/CVE-2025-0953.json) (`2025-02-22T13:15:11.850`)
|
||||
- [CVE-2025-0957](CVE-2025/CVE-2025-09xx/CVE-2025-0957.json) (`2025-02-22T14:15:29.710`)
|
||||
- [CVE-2025-1556](CVE-2025/CVE-2025-15xx/CVE-2025-1556.json) (`2025-02-22T13:15:12.010`)
|
||||
- [CVE-2025-1557](CVE-2025/CVE-2025-15xx/CVE-2025-1557.json) (`2025-02-22T13:15:12.247`)
|
||||
- [CVE-2024-12577](CVE-2024/CVE-2024-125xx/CVE-2024-12577.json) (`2025-02-22T15:15:10.227`)
|
||||
- [CVE-2024-46975](CVE-2024/CVE-2024-469xx/CVE-2024-46975.json) (`2025-02-22T15:15:10.377`)
|
||||
- [CVE-2024-47896](CVE-2024/CVE-2024-478xx/CVE-2024-47896.json) (`2025-02-22T15:15:10.503`)
|
||||
- [CVE-2024-52939](CVE-2024/CVE-2024-529xx/CVE-2024-52939.json) (`2025-02-22T15:15:10.633`)
|
||||
- [CVE-2025-26750](CVE-2025/CVE-2025-267xx/CVE-2025-26750.json) (`2025-02-22T16:15:31.210`)
|
||||
- [CVE-2025-26756](CVE-2025/CVE-2025-267xx/CVE-2025-26756.json) (`2025-02-22T16:15:31.350`)
|
||||
- [CVE-2025-26757](CVE-2025/CVE-2025-267xx/CVE-2025-26757.json) (`2025-02-22T16:15:31.493`)
|
||||
- [CVE-2025-26760](CVE-2025/CVE-2025-267xx/CVE-2025-26760.json) (`2025-02-22T16:15:31.633`)
|
||||
- [CVE-2025-26763](CVE-2025/CVE-2025-267xx/CVE-2025-26763.json) (`2025-02-22T16:15:31.773`)
|
||||
- [CVE-2025-26764](CVE-2025/CVE-2025-267xx/CVE-2025-26764.json) (`2025-02-22T16:15:31.910`)
|
||||
- [CVE-2025-26774](CVE-2025/CVE-2025-267xx/CVE-2025-26774.json) (`2025-02-22T16:15:32.060`)
|
||||
- [CVE-2025-26776](CVE-2025/CVE-2025-267xx/CVE-2025-26776.json) (`2025-02-22T16:15:32.203`)
|
||||
- [CVE-2025-26973](CVE-2025/CVE-2025-269xx/CVE-2025-26973.json) (`2025-02-22T16:15:32.347`)
|
||||
- [CVE-2025-27012](CVE-2025/CVE-2025-270xx/CVE-2025-27012.json) (`2025-02-22T16:15:32.497`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2019-8900](CVE-2019/CVE-2019-89xx/CVE-2019-8900.json) (`2025-02-22T16:15:30.333`)
|
||||
- [CVE-2024-7695](CVE-2024/CVE-2024-76xx/CVE-2024-7695.json) (`2025-02-22T15:15:10.770`)
|
||||
- [CVE-2025-26622](CVE-2025/CVE-2025-266xx/CVE-2025-26622.json) (`2025-02-22T16:15:31.033`)
|
||||
- [CVE-2025-27104](CVE-2025/CVE-2025-271xx/CVE-2025-27104.json) (`2025-02-22T16:15:32.640`)
|
||||
- [CVE-2025-27105](CVE-2025/CVE-2025-271xx/CVE-2025-27105.json) (`2025-02-22T16:15:32.827`)
|
||||
- [CVE-2025-27106](CVE-2025/CVE-2025-271xx/CVE-2025-27106.json) (`2025-02-22T16:15:33.003`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
38
_state.csv
38
_state.csv
@ -143347,7 +143347,7 @@ CVE-2019-8896,0,0,0aa9f842d33b9654dca889f38decb1175af9e672aff0de6031f4293693edf6
|
||||
CVE-2019-8897,0,0,3a223b38a5e7116d2df782d1b5e1ba7ab87c296ada6b209ce5ca6d5edff411fa,2023-11-07T03:13:34.413000
|
||||
CVE-2019-8898,0,0,813b02bbfc4312cb306a094d98b5f0ac09c3f6363393f87aa8b3daaa16fed4bd,2024-11-21T04:50:37.380000
|
||||
CVE-2019-8899,0,0,adf1901d7d55b77103a59c4f9ec8380c05cd97ee805925ad10db4d2ed3234af5,2023-11-07T03:13:34.457000
|
||||
CVE-2019-8900,0,0,1235aa2494f8a5312ff00cb6a0bb6dca1f76b306c676ecd6ce0076f37169ffae,2025-02-21T22:15:10.393000
|
||||
CVE-2019-8900,0,1,e4e312bbd11851ef36112cafd58dc7a32763c873d4d9e13b8f99469799d30700,2025-02-22T16:15:30.333000
|
||||
CVE-2019-8901,0,0,43232e83bf8db4ecdfe2bc0ccfa5289d05fdd242ffbb871121e8cabe69591986,2024-11-21T04:50:37.507000
|
||||
CVE-2019-8902,0,0,1ae49e00242bce279d5f897c9e5597933981a7d3a204202a57299ddd8069fd2d,2024-11-21T04:50:37.610000
|
||||
CVE-2019-8903,0,0,27a56ed767f19aeb566cd9b0ebd8b7ebfdd6ff5db988a0d0511852cd09fe5d47,2024-11-21T04:50:37.747000
|
||||
@ -245877,6 +245877,7 @@ CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63
|
||||
CVE-2024-12571,0,0,4f61ab2b24612e0b1a75d43cf9d9be2b77f4416d126de6e970d9338abb76a3be,2024-12-20T07:15:12.380000
|
||||
CVE-2024-12572,0,0,b5830ae1a3c6182c738f484a7555b2d49502aecd75946e90268f33cb1f4e6fca,2024-12-13T04:15:05.233000
|
||||
CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f2a8,2024-12-13T05:15:07.310000
|
||||
CVE-2024-12577,1,1,6ee87bba10aa1e065a77ecfeab673b0150252e4b2f520b57bd8fa010c92f6508,2025-02-22T15:15:10.227000
|
||||
CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6eab5,2024-12-14T05:15:12
|
||||
CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000
|
||||
CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000
|
||||
@ -246918,7 +246919,7 @@ CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04
|
||||
CVE-2024-13855,0,0,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000
|
||||
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-13869,1,1,6cf76ca30972bb4e146a69d16f09015336f9457aca89967f7112327623dcc3eb,2025-02-22T13:15:10.920000
|
||||
CVE-2024-13869,0,0,6cf76ca30972bb4e146a69d16f09015336f9457aca89967f7112327623dcc3eb,2025-02-22T13:15:10.920000
|
||||
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
|
||||
CVE-2024-13873,0,0,ddf058f4c75682e8cf7335d38f43094b08f172b8fcc2d656f2cc5238777fc340,2025-02-22T04:15:09.567000
|
||||
CVE-2024-13879,0,0,9feaa77a4a107496b778129b23b28c9a020cd8ce5e3b7bb155fa8c6898d38c2d,2025-02-17T16:15:15.950000
|
||||
@ -268059,6 +268060,7 @@ CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d258
|
||||
CVE-2024-46972,0,0,95b9b829ac40a71aa8b72076be82f629ce22983a71f926ad95be3c5975b4b190,2025-02-18T22:15:11.490000
|
||||
CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000
|
||||
CVE-2024-46974,0,0,dfb76a0433767383a52519f3e13a26b3bbbc934082dde21f8b8c392f6cc03115,2025-02-18T19:15:16.563000
|
||||
CVE-2024-46975,1,1,51212e6537fae775c84eeaaef90c69bc00dfdb4ee429555487d625bebff99c3d,2025-02-22T15:15:10.377000
|
||||
CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
|
||||
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
|
||||
CVE-2024-46978,0,0,6b4b273c251da2584d7ee17daf2abe4b18d0c96b507318935ca3196d6f3415b7,2025-02-07T15:48:36.660000
|
||||
@ -268888,6 +268890,7 @@ CVE-2024-47891,0,0,589f151bfbb431a12dbbe664c389c02417f09703d0aa2898a70b48482ecdd
|
||||
CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000
|
||||
CVE-2024-47894,0,0,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000
|
||||
CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000
|
||||
CVE-2024-47896,1,1,871fd2d0f269201a8e07c6453c192307ab508c012a0013b74a9ec8e55e94186f,2025-02-22T15:15:10.503000
|
||||
CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000
|
||||
CVE-2024-47898,0,0,cce74231486c3ab80f60eacc0cea75369d5a573cb99e87ef432e0f8d422293db,2025-02-18T19:15:16.970000
|
||||
CVE-2024-47899,0,0,f9f806d8192d8d0f2624a3e2583fa5ff6207a910765e6fd3f29aa741332463b7,2025-02-18T19:15:17.117000
|
||||
@ -272375,6 +272378,7 @@ CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c
|
||||
CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000
|
||||
CVE-2024-52937,0,0,4e2e200c911871605d656a523330fd8515bef881c87955645314df4efb4a35e8,2025-01-13T16:15:18.093000
|
||||
CVE-2024-52938,0,0,25ccbcee31d517a9492c1820a88aa96739f339ebff7e4c4e42b2b7d66f53baa0,2025-01-13T15:15:09.300000
|
||||
CVE-2024-52939,1,1,2612192fe55e224d850f3f85b19b41bb402c0d44131b3e68472a22f17abc4348,2025-02-22T15:15:10.633000
|
||||
CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa253,2024-11-21T09:47:22.597000
|
||||
CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000
|
||||
@ -276983,7 +276987,7 @@ CVE-2024-7691,0,0,6dad0c769fb572b88a068528267f61949164dc392b80af6f168258a6b2c7f6
|
||||
CVE-2024-7692,0,0,4b38ff30e017e91d8a002928077306fde8ee04d0be5e9045460020d6ccc3af22,2024-10-04T17:14:50.990000
|
||||
CVE-2024-7693,0,0,dd3e43863a4776bf6aa9cee54c3310fd08dfe98f5bd8663ebc12432cb7153f16,2024-09-06T16:51:35.647000
|
||||
CVE-2024-7694,0,0,3a2582a984429d8c89c3dd71bc863aef01ff80b7baff4f3e3f71f54998d90a46,2024-09-06T17:24:42.573000
|
||||
CVE-2024-7695,0,0,d66e4052522e37dd3d70b1b0ccdc13ab04126c332bcc3bdf4c747e8c62819761,2025-02-07T07:15:15.317000
|
||||
CVE-2024-7695,0,1,8ed03f85e899961b16a928bb1a6bcd0d9f749610e6437211ce1f0e00d868b60f,2025-02-22T15:15:10.770000
|
||||
CVE-2024-7696,0,0,f0052f9d5e178b3ea159f04ebcfd4751f930fb606630e5cab2ff7b8b63a94d0f,2025-01-07T06:15:17.827000
|
||||
CVE-2024-7697,0,0,122b8f72aeda3c5b2d61460f1dce24bd382a6f877b1c3f9efb3e322459b58ee0,2024-09-06T18:04:28.030000
|
||||
CVE-2024-7698,0,0,28382cbcfd0fa7ea6a7d15c9ccdd01abba2e948df9ed5ab95948fe232327814d,2024-09-27T19:39:43.350000
|
||||
@ -279407,7 +279411,7 @@ CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e
|
||||
CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000
|
||||
CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17
|
||||
CVE-2025-0916,0,0,9f634049c98a708569d7f2be6c0fdaeeb2a62cd7e2136bc12c84981688ac3796,2025-02-19T12:15:31.630000
|
||||
CVE-2025-0918,1,1,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000
|
||||
CVE-2025-0918,0,0,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000
|
||||
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
|
||||
CVE-2025-0924,0,0,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace42,2025-02-17T05:15:09.410000
|
||||
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
|
||||
@ -279426,8 +279430,8 @@ CVE-2025-0947,0,0,d86087faf15d7e6a63109e47bfca07163762fc534d74ac472b8031d14a77e7
|
||||
CVE-2025-0948,0,0,8aa6a50c200d1920de9f20b6b39e518a0d142377f946f24ca23afa086a6a6c5e,2025-02-03T18:15:41.580000
|
||||
CVE-2025-0949,0,0,039d871602cd9428128821cc37027e6e8dee60ecee8ac64dcd53b31ffe11da3d,2025-02-03T18:15:41.727000
|
||||
CVE-2025-0950,0,0,b7bfb032b40dfc48cfc3ea52c5e6e62b743bd5cc010ad44bc8604664ed295438,2025-02-03T18:15:41.847000
|
||||
CVE-2025-0953,1,1,048cc197ca970de5fde847ecab581986b58675b3dc4db0983287b715bf967350,2025-02-22T13:15:11.850000
|
||||
CVE-2025-0957,1,1,ce96b57dc5a1d7911b2973eca447d8c2a84bd9409019560a93b413d929c8b35e,2025-02-22T14:15:29.710000
|
||||
CVE-2025-0953,0,0,048cc197ca970de5fde847ecab581986b58675b3dc4db0983287b715bf967350,2025-02-22T13:15:11.850000
|
||||
CVE-2025-0957,0,0,ce96b57dc5a1d7911b2973eca447d8c2a84bd9409019560a93b413d929c8b35e,2025-02-22T14:15:29.710000
|
||||
CVE-2025-0960,0,0,7d99f6e3510e94dddcebd5fc3388664132c2f2132e2b612ed8279ce23b89027f,2025-02-04T20:15:50.103000
|
||||
CVE-2025-0961,0,0,51398360322c1646c196e54ab1a92e1f37267b5b266c9b18c4da19ec7b68c1a4,2025-02-10T13:15:26.413000
|
||||
CVE-2025-0967,0,0,48a999283e5df37f2ad381f76667fdb4991732db2f436607d24ac0a470ce1d15,2025-02-02T16:15:27.693000
|
||||
@ -279688,8 +279692,8 @@ CVE-2025-1546,0,0,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb
|
||||
CVE-2025-1548,0,0,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000
|
||||
CVE-2025-1553,0,0,b76c346b19ed32adbb90097d30125f53b18d6b15a685f1353673e4fcdc636324,2025-02-22T10:15:09.853000
|
||||
CVE-2025-1555,0,0,1c7a4c27ed9d1502d0e15c0e5a57e371d72228c620058c2537224f8b85248601,2025-02-21T21:15:13.703000
|
||||
CVE-2025-1556,1,1,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
|
||||
CVE-2025-1557,1,1,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
|
||||
CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
|
||||
CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -282026,15 +282030,21 @@ CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972b
|
||||
CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000
|
||||
CVE-2025-26618,0,0,f8dd04a088e9c1ef15892f10db1e49060d6c91ccfb0e2ca83ac304f0769b1d61,2025-02-20T21:15:26.073000
|
||||
CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000
|
||||
CVE-2025-26622,0,0,10fa8e85badd27077b77602e62b207dcb865c86def2eb3a55216ba95053df31e,2025-02-21T22:15:13.447000
|
||||
CVE-2025-26622,0,1,0bafa51d37f905d32266f99250febec707833a89fe716aea0a37fd117490a259,2025-02-22T16:15:31.033000
|
||||
CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000
|
||||
CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000
|
||||
CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000
|
||||
CVE-2025-26750,1,1,2a3b9db13d9cd9c23552d1acf8bba46a50acb1724584ded2752728f67ebbd57a,2025-02-22T16:15:31.210000
|
||||
CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000
|
||||
CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000
|
||||
CVE-2025-26756,1,1,42d04b5d3d066a5165b76b4a05636a3c0666943b80a7eece51bcf45901a52bd7,2025-02-22T16:15:31.350000
|
||||
CVE-2025-26757,1,1,9d984c4bf0ab9c149dbbadf2c5bcf69972bb1dae33868ecbce1e57e2cc64642c,2025-02-22T16:15:31.493000
|
||||
CVE-2025-26758,0,0,a26f515dcd360cc3ddbe170c3b554583598aed711ba91a215b8cd7112059dd35,2025-02-17T12:15:28.407000
|
||||
CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000
|
||||
CVE-2025-26760,1,1,6919f9acb07b01de194066d8c4e7e1e484a5db7bb553969b1a854be951f5b945,2025-02-22T16:15:31.633000
|
||||
CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000
|
||||
CVE-2025-26763,1,1,835f6aa5c53311e67700f12536c4097703646350e62d41b3ab02781e700771af,2025-02-22T16:15:31.773000
|
||||
CVE-2025-26764,1,1,f829f1e71e376c08611e3e8d7b71345b7be3ee4dd3ad058017645a5c43219fe6,2025-02-22T16:15:31.910000
|
||||
CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000
|
||||
CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000
|
||||
CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000
|
||||
@ -282044,7 +282054,9 @@ CVE-2025-26770,0,0,b8458cb1a3e8b55edb12423478e672f2088dbbbcb505215466ec38c374218
|
||||
CVE-2025-26771,0,0,1172594f01315a68b1db7af85146cea8365106bb718e61572460a2e4c4a81b19,2025-02-17T12:15:28.833000
|
||||
CVE-2025-26772,0,0,c07c6cc8f50d1e9a48d9bbe77ef3064c2299e1d25b700ebf62ce9cf490ea5fb9,2025-02-17T12:15:28.980000
|
||||
CVE-2025-26773,0,0,2e012b5456eae6488f8204215cfc7953086c04f4520b05ba5b5d35b16125c8f5,2025-02-17T12:15:29.123000
|
||||
CVE-2025-26774,1,1,c82979ba8301822d7b27e62dd6fe18c9258cb4d0e5f477952295cd2d0dcc9a0c,2025-02-22T16:15:32.060000
|
||||
CVE-2025-26775,0,0,04dff38e991d1b46c040974dfcb68e80377672de97a81d8017423e599debe554,2025-02-17T12:15:29.260000
|
||||
CVE-2025-26776,1,1,d6756beb38c049d281a6d0a03e475b1f412bcd9d7c8e36a75fb74880a3fd777a,2025-02-22T16:15:32.203000
|
||||
CVE-2025-26778,0,0,f4f3856714356e410e7f4f3388bedae25b32fbe8e18283316af64b40400930e7,2025-02-17T12:15:29.417000
|
||||
CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000
|
||||
CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000
|
||||
@ -282054,6 +282066,8 @@ CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6b
|
||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||
CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000
|
||||
CVE-2025-26856,0,0,97d830a9ee806f0ef850d5b5eea5c095e7e2e4dee4401ad5b7fd9fb34c2341f7,2025-02-20T06:15:21.673000
|
||||
CVE-2025-26973,1,1,610ca521f6df23787468cbd6d7246985670b9cbd38aeda403a910446401c6120,2025-02-22T16:15:32.347000
|
||||
CVE-2025-27012,1,1,7363d114ae429e53b3d9610c9cb193ed78cd11421be4a33a19fcf6bd0f11da65,2025-02-22T16:15:32.497000
|
||||
CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000
|
||||
CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000
|
||||
CVE-2025-27088,0,0,09d6e70f976103888a70528f06cfe4d5e2532860157df7adae24247eee34e541,2025-02-21T22:15:13.673000
|
||||
@ -282065,9 +282079,9 @@ CVE-2025-27096,0,0,32224f1c51b54efe47a565f7e551ac8c6822a2af21d493c489fef5b8bd7d4
|
||||
CVE-2025-27097,0,0,5b9fc582a5c5e9bf93a07d4ec3deca2e89df01f5ebbf3bb4a854ac4e8c549a46,2025-02-20T21:15:26.227000
|
||||
CVE-2025-27098,0,0,766aa0528b8030648a329da18fe8e03c04c956bcb8a3fc39487da75af24bc862,2025-02-20T21:15:26.370000
|
||||
CVE-2025-27100,0,0,c241d778cc69afadd153119784c98cb751150e20e8824ef0500e107bbd54eb0d,2025-02-21T00:15:09.250000
|
||||
CVE-2025-27104,0,0,40ecb8458c0f422c4d17b89997bd21480392269b442a2b63c90701e5d610e1af,2025-02-21T22:15:13.773000
|
||||
CVE-2025-27105,0,0,1a4265143ce795251c3264e6a9d90ecd10dd01652b6699a31976001d67d47d89,2025-02-21T22:15:13.910000
|
||||
CVE-2025-27106,0,0,939fa3534ddbf4f51b416a9d012f675603de51232faf931d2ce4703a465566d3,2025-02-21T22:15:14.033000
|
||||
CVE-2025-27104,0,1,15aaaf6917676f5eff2f89fbd0c3a21c0c13a6b224565fcd05537a337b8876ab,2025-02-22T16:15:32.640000
|
||||
CVE-2025-27105,0,1,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b7cb,2025-02-22T16:15:32.827000
|
||||
CVE-2025-27106,0,1,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
|
||||
CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000
|
||||
CVE-2025-27109,0,0,2aad45f7ceaec8c99923923cc63daf5c71560a762e95714d9599cb9bc274547c,2025-02-21T22:15:14.303000
|
||||
CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user