mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-16T07:00:20.672506+00:00
This commit is contained in:
parent
a73ceda6af
commit
9b3630828b
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6942",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-01-30T09:15:47.757",
|
||||
"lastModified": "2024-11-21T08:44:53.183",
|
||||
"lastModified": "2025-01-16T05:15:07.950",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
|
||||
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -62,7 +62,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-6943",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-01-30T09:15:47.960",
|
||||
"lastModified": "2024-11-21T08:44:53.360",
|
||||
"lastModified": "2025-01-16T05:15:09.533",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
|
||||
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -62,7 +62,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-7033",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-02-27T04:15:06.473",
|
||||
"lastModified": "2024-11-21T08:45:05.300",
|
||||
"lastModified": "2025-01-16T05:15:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
|
||||
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-R series CPU module, MELSEC iQ-L series CPU module, MELSEC iQ-R Ethernet Interface Module, MELSEC iQ-R CC-Link IE TSN Master/Local Module, CC-Link IE TSN Remote I/O Module, CC-Link IE TSN Analog-Digital Converter Module, CC-Link IE TSN Digital-Analog Converter Module, CC-Link IE TSN - CC-Link IE Field Network Bridge Module, CC-Link IE TSN - AnyWireASLINK Bridge Module, CC-Link IE TSN FPGA Module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Motion Module, MELSEC iQ-L Motion Module, MELSEC iQ-F FX5 Motion Module, MELSEC iQ-F Series CPU module, MELSEC iQ-F Series Ethernet module, MELSEC iQ-F Series Ethernet/IP module, MELSEC iQ-F Series OPC UA Module, MELSEC iQ-F Series CC-Link IE TSN master/local module, GOT2000 Series CC-Link IE TSN Communication Unit, FR-A800-E series inverters, FR-F800-E series inverters, FR-E800-E series inverters, INVERTER CC-Link IE TSN Plug-in option, INVERTER CC-Link IE TSN Safety Plug-in option, INVERTER CC-Link IE TSN communication function built-in type, MR-J5 series AC Servos MELSERVO, MR-JET series AC Servos MELSERVO, MR-MD333G series AC Servos MELSERVO, MR-JE series AC Servos MELSERVO, MELSERVO-J4 AC Servos MELSERVO and Embedded Type Servo System Controller allow a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48463",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-04T21:15:04.707",
|
||||
"lastModified": "2024-11-06T19:35:17.717",
|
||||
"lastModified": "2025-01-16T06:15:26.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,10 @@
|
||||
{
|
||||
"url": "https://www.usebruno.com/changelog",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Jan/6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-16T05:00:27.873866+00:00
|
||||
2025-01-16T07:00:20.672506+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-16T04:15:08.287000+00:00
|
||||
2025-01-16T06:15:26.940000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,24 +38,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-10789](CVE-2024/CVE-2024-107xx/CVE-2024-10789.json) (`2025-01-16T04:15:08.127`)
|
||||
- [CVE-2024-11452](CVE-2024/CVE-2024-114xx/CVE-2024-11452.json) (`2025-01-16T04:15:08.287`)
|
||||
- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-01-16T03:15:06.313`)
|
||||
- [CVE-2025-22905](CVE-2025/CVE-2025-229xx/CVE-2025-22905.json) (`2025-01-16T03:15:06.430`)
|
||||
- [CVE-2025-22906](CVE-2025/CVE-2025-229xx/CVE-2025-22906.json) (`2025-01-16T03:15:06.530`)
|
||||
- [CVE-2025-22907](CVE-2025/CVE-2025-229xx/CVE-2025-22907.json) (`2025-01-16T03:15:06.630`)
|
||||
- [CVE-2025-22912](CVE-2025/CVE-2025-229xx/CVE-2025-22912.json) (`2025-01-16T03:15:06.723`)
|
||||
- [CVE-2025-22913](CVE-2025/CVE-2025-229xx/CVE-2025-22913.json) (`2025-01-16T03:15:06.850`)
|
||||
- [CVE-2025-22916](CVE-2025/CVE-2025-229xx/CVE-2025-22916.json) (`2025-01-16T03:15:06.970`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2025-0457](CVE-2025/CVE-2025-04xx/CVE-2025-0457.json) (`2025-01-16T02:15:27.553`)
|
||||
- [CVE-2023-6942](CVE-2023/CVE-2023-69xx/CVE-2023-6942.json) (`2025-01-16T05:15:07.950`)
|
||||
- [CVE-2023-6943](CVE-2023/CVE-2023-69xx/CVE-2023-6943.json) (`2025-01-16T05:15:09.533`)
|
||||
- [CVE-2023-7033](CVE-2023/CVE-2023-70xx/CVE-2023-7033.json) (`2025-01-16T05:15:09.720`)
|
||||
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2025-01-16T06:15:26.940`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
28
_state.csv
28
_state.csv
@ -242011,8 +242011,8 @@ CVE-2023-6938,0,0,bf6ce0bd25ccb84e8585516f5f1e96599e70c565d5e6071dfb462f8acaae7a
|
||||
CVE-2023-6939,0,0,9013c4f20cfa53f9418c260cc38f77fa6695014f1b33d48beba0b416f70e2975,2024-11-21T08:44:52.757000
|
||||
CVE-2023-6940,0,0,1c68075899f5f28aacff5c0715f7a3755d2bf8d797a66e5c13ff31fd3decf9da,2024-11-21T08:44:52.890000
|
||||
CVE-2023-6941,0,0,2161dd2689afce97b74cdf5f24ce41a948f3ac2aa7b9fe9ce548fe9f9673b96a,2024-11-21T08:44:53.043000
|
||||
CVE-2023-6942,0,0,e3eac9be15854abefc989a2e01cd2b43becc96377db4a63912413055ebb2c3cb,2024-11-21T08:44:53.183000
|
||||
CVE-2023-6943,0,0,bb6fd8b1a5071fe1ff64c8e6bead86d136b045f61616068f93cae1cbcd76b456,2024-11-21T08:44:53.360000
|
||||
CVE-2023-6942,0,1,63ff759cff72a7fb12664254d3b67e72e27f3864a44d1d149daa963c45a02d79,2025-01-16T05:15:07.950000
|
||||
CVE-2023-6943,0,1,cf3bf415a18baeec3ddec8dcbf2d7dfeb26dc8235685b2b41a64289b36009776,2025-01-16T05:15:09.533000
|
||||
CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89f6,2024-11-21T08:44:53.520000
|
||||
CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000
|
||||
CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000
|
||||
@ -242097,7 +242097,7 @@ CVE-2023-7029,0,0,ff4956ed28d25d29eca37970978058cc4c79d9b58f07982222e98f39c0eebb
|
||||
CVE-2023-7030,0,0,3c0e7e678cd5c617b5ce9677e1be89fed25cef8cbc989aad9df6d54a4663d59b,2024-11-21T08:45:04.850000
|
||||
CVE-2023-7031,0,0,d56d1f243e4bd6c87e3002c4501e9fe5a78b6fc19e814625316adbaf20b3903f,2024-11-21T08:45:04.987000
|
||||
CVE-2023-7032,0,0,90028d31b608d7a4d2fc3aaf47e6ddce9fe1fee5eae81e1705864bc5b8e20e15,2024-11-21T08:45:05.137000
|
||||
CVE-2023-7033,0,0,910f8db060630e17377205b4dd4ef01f142c6966165dd9e87eeb04f37145de01,2024-11-21T08:45:05.300000
|
||||
CVE-2023-7033,0,1,3740bc13eb2fe0e0616085b4a70bef4c5f396920119b20e38bd7301edafc37d2,2025-01-16T05:15:09.720000
|
||||
CVE-2023-7035,0,0,9a580e747a6f691e954c5cf866c67d6926e0732ca03645e320728e14627545d3,2024-11-21T08:45:05.527000
|
||||
CVE-2023-7036,0,0,e8a0ecd56cc1901f1ceaafdfee06a05cea7e8ad945252611e87d6c4ac4ef2ec2,2024-11-21T08:45:05.700000
|
||||
CVE-2023-7037,0,0,43c6fec2f65f06abfabe29dda4ceaabe11aa4fb5a5ee0860d8c7a05dfe2b8e1a,2024-11-21T08:45:05.857000
|
||||
@ -243907,7 +243907,7 @@ CVE-2024-10785,0,0,3f01bd087d273daf30380c315f820020814d213e2340745da66061077350c
|
||||
CVE-2024-10786,0,0,ccc5097d72c9d28e3db11dc281f3f9385330979372f0eb8c07e82e1cc6da99f0,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10787,0,0,e4342596cadc13376c45fe50690327764f44d01e21796411a0b18745cbef6e4c,2024-12-04T09:15:04.323000
|
||||
CVE-2024-10788,0,0,62788f949bca5d7e37cdb922f69d1fcd20199b1de5b86ec020525fca7a998fe6,2024-11-21T13:57:24.187000
|
||||
CVE-2024-10789,1,1,326b4c9cd14597942539e336ac48055d70bbbea16751093a371cdebc8e9b05e9,2025-01-16T04:15:08.127000
|
||||
CVE-2024-10789,0,0,326b4c9cd14597942539e336ac48055d70bbbea16751093a371cdebc8e9b05e9,2025-01-16T04:15:08.127000
|
||||
CVE-2024-1079,0,0,076f0d90756c2348b32c6cbe4a55fada41785208b845fa866d02741439c7a75a,2024-11-21T08:49:45.060000
|
||||
CVE-2024-10790,0,0,6341528a54cdf3270385869d50c1019cff42d20615be0c52b3565e350b691531,2024-11-12T13:55:21.227000
|
||||
CVE-2024-10791,0,0,ac0a06f123ca4f2a82c8817f0119d46a6b214304ec50f56d301c5704362b7969,2024-11-06T15:05:38.240000
|
||||
@ -244466,7 +244466,7 @@ CVE-2024-11447,0,0,bd53c50380b55196efb74cff3fad5c24687f184135cfde8b6a52ffe6934cf
|
||||
CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e4176804,2024-11-21T08:49:54.097000
|
||||
CVE-2024-11450,0,0,d9225aed2ac8475bb91c6ace69e4cc88aaeb28d7907e757183e21dfd957a870f,2024-12-06T09:15:07.137000
|
||||
CVE-2024-11451,0,0,1ae0af532d165e743ffcab70ed2c779554ae651574ede2e8a8329313fc3507ad,2024-12-07T02:15:18.117000
|
||||
CVE-2024-11452,1,1,be6218bb73af4916bcdfb49b679c8c453a76008a24ac12876ba169e1c1829357,2025-01-16T04:15:08.287000
|
||||
CVE-2024-11452,0,0,be6218bb73af4916bcdfb49b679c8c453a76008a24ac12876ba169e1c1829357,2025-01-16T04:15:08.287000
|
||||
CVE-2024-11453,0,0,5ddaa320fe1d4d03e381c657f388a7d4f2fbdff28eda17ec4fc3bcaf67d9e87d,2024-12-03T08:15:05.830000
|
||||
CVE-2024-11454,0,0,54cb66d7c340e670e7be7c1c93e117d3d3f291412c8539746ac6183c30e6034e,2024-12-09T18:15:22.400000
|
||||
CVE-2024-11455,0,0,2585d76118af0f8584c93ef70fec17184fe9addb803068b4dbf20f8e44717637,2024-11-21T13:57:24.187000
|
||||
@ -267852,7 +267852,7 @@ CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a
|
||||
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
|
||||
CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000
|
||||
CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48463,0,0,1903ada97c27caa907bf2f503c17630a02c1e83d664e419cb87c103722376f0b,2024-11-06T19:35:17.717000
|
||||
CVE-2024-48463,0,1,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000
|
||||
CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8455,2024-10-30T18:35:15.410000
|
||||
CVE-2024-4847,0,0,c22f0a9897ae48897485c24e89d63816b43b2f4df2bd2f027cb4528747492fd8,2024-11-21T09:43:43.737000
|
||||
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
|
||||
@ -277052,7 +277052,7 @@ CVE-2025-0447,0,0,138036fe549fb5dfab13974a3a7e47ae79c89eaed414c24b8cf74783a36c14
|
||||
CVE-2025-0448,0,0,9737e1fa272da2233ef1ed93dd9ff1970ce75261fdc9a589a193db451cacf099,2025-01-15T15:15:16.277000
|
||||
CVE-2025-0455,0,0,7e0ad5449b041c53f734be428a31bc6a89dc398ea20bdfa939a9fd70a4abf29c,2025-01-16T02:15:27.203000
|
||||
CVE-2025-0456,0,0,c9c279a8e9b15f51a325b001d98fa11372919fecd3f4fd4a6edf61e03b1f1c0f,2025-01-16T02:15:27.387000
|
||||
CVE-2025-0457,0,1,405b792def7adc24ffc4fcc8d4e99a3e6be8693d2375d98d328f438c15858c78,2025-01-16T02:15:27.553000
|
||||
CVE-2025-0457,0,0,405b792def7adc24ffc4fcc8d4e99a3e6be8693d2375d98d328f438c15858c78,2025-01-16T02:15:27.553000
|
||||
CVE-2025-0458,0,0,45329d1650f63d093b7e8acb76f7370c8c0262fb6197b3161a1f0db17a2920b7,2025-01-14T16:15:34.397000
|
||||
CVE-2025-0459,0,0,7f66205a9ceec34ce8406cb81bab600a3721d11d4c8a05bee0623fea9fbc9cf7,2025-01-14T16:15:34.617000
|
||||
CVE-2025-0460,0,0,4ed76bb5f64af8fe8c4011df0eca20c45ae0fdebb5a3f0252615a76ad2d1b042,2025-01-14T16:15:34.800000
|
||||
@ -277572,13 +277572,13 @@ CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f
|
||||
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
|
||||
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
|
||||
CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000
|
||||
CVE-2025-22904,1,1,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
|
||||
CVE-2025-22905,1,1,7ce0ff9256a4854fc352d077f3f0c739a33a0a92874bf3c98059151498413642,2025-01-16T03:15:06.430000
|
||||
CVE-2025-22906,1,1,b430df8a6e6400aee0d0b5dedcfd1ceca5ac91f1415ad22a738e6b90d9215435,2025-01-16T03:15:06.530000
|
||||
CVE-2025-22907,1,1,3a606e36c0c8fbf9d55b43d449cfe35e7f71d0a76ec87887dc5c5630771d2b0f,2025-01-16T03:15:06.630000
|
||||
CVE-2025-22912,1,1,9bdac6d997fb4afcd0ffdb49cf15bb2a6d4a40fead5179445a0f3cc7227fc94c,2025-01-16T03:15:06.723000
|
||||
CVE-2025-22913,1,1,43a94f497f840a978d8316cb659d9517bb656ec1d12ffe55ff10808892909274,2025-01-16T03:15:06.850000
|
||||
CVE-2025-22916,1,1,49672c014458a546bd5e8ed40fbb9d744fa61afd0b8f15aa50934354bd803c8d,2025-01-16T03:15:06.970000
|
||||
CVE-2025-22904,0,0,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
|
||||
CVE-2025-22905,0,0,7ce0ff9256a4854fc352d077f3f0c739a33a0a92874bf3c98059151498413642,2025-01-16T03:15:06.430000
|
||||
CVE-2025-22906,0,0,b430df8a6e6400aee0d0b5dedcfd1ceca5ac91f1415ad22a738e6b90d9215435,2025-01-16T03:15:06.530000
|
||||
CVE-2025-22907,0,0,3a606e36c0c8fbf9d55b43d449cfe35e7f71d0a76ec87887dc5c5630771d2b0f,2025-01-16T03:15:06.630000
|
||||
CVE-2025-22912,0,0,9bdac6d997fb4afcd0ffdb49cf15bb2a6d4a40fead5179445a0f3cc7227fc94c,2025-01-16T03:15:06.723000
|
||||
CVE-2025-22913,0,0,43a94f497f840a978d8316cb659d9517bb656ec1d12ffe55ff10808892909274,2025-01-16T03:15:06.850000
|
||||
CVE-2025-22916,0,0,49672c014458a546bd5e8ed40fbb9d744fa61afd0b8f15aa50934354bd803c8d,2025-01-16T03:15:06.970000
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,9276342af8ee37607a1ffae2d3f1aeab3d942e0b55b28a72d519f8d3d1707262,2025-01-14T15:15:28.637000
|
||||
CVE-2025-22963,0,0,ddb005db611e43367f0caf5873d662acfb7b90267f1a87ba259499e665e1b39e,2025-01-13T16:15:19.367000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user