mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-02-14T00:55:25.359569+00:00
This commit is contained in:
parent
787dfc5839
commit
9b60c96b0b
21
CVE-2023/CVE-2023-344xx/CVE-2023-34401.json
Normal file
21
CVE-2023/CVE-2023-344xx/CVE-2023-34401.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-34401",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:08.867",
|
||||
"lastModified": "2025-02-13T23:15:08.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside profile folder there is a file, which is encoded with proprietary UD2 codec. Due to missed size checks in the enapsulate file, attacker can achieve Out-of-Bound Read in heap memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-344xx/CVE-2023-34402.json
Normal file
21
CVE-2023/CVE-2023-344xx/CVE-2023-34402.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-34402",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:09.337",
|
||||
"lastModified": "2025-02-13T23:15:09.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-344xx/CVE-2023-34403.json
Normal file
21
CVE-2023/CVE-2023-344xx/CVE-2023-34403.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-34403",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:09.440",
|
||||
"lastModified": "2025-02-13T23:15:09.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to this pins and get access to internal network. A race condition can be acquired and attacker can spoof \u201cUserData\u201d with desirable file path and access it though backup on USB."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-344xx/CVE-2023-34404.json
Normal file
21
CVE-2023/CVE-2023-344xx/CVE-2023-34404.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-34404",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:09.553",
|
||||
"lastModified": "2025-02-13T23:15:09.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mercedes-Benz head-unit NTG6 has Ethernet pins on Base Board to connect module CSB. Attacker can connect to these pins and get access to internal network. As a result, by accessing a specific port an attacker can send call request to all registered services in router and achieve command injection vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-344xx/CVE-2023-34406.json
Normal file
21
CVE-2023/CVE-2023-344xx/CVE-2023-34406.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-34406",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:09.633",
|
||||
"lastModified": "2025-02-13T23:15:09.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on Mercedes Benz NTG 6. A possible integer overflow exists in the user data import/export function of NTG (New Telematics Generation) 6 head units. To perform this attack, local access to USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2024/CVE-2024-120xx/CVE-2024-12054.json
Normal file
104
CVE-2024/CVE-2024-120xx/CVE-2024-12054.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2024-12054",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T23:15:09.823",
|
||||
"lastModified": "2025-02-13T23:15:09.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ZF Roll Stability Support Plus (RSSPlus) \nis vulnerable to an authentication bypass vulnerability targeting \ndeterministic RSSPlus SecurityAccess service seeds, which may allow an \nattacker to remotely (proximal/adjacent with RF equipment or via pivot \nfrom J2497 telematics devices) call diagnostic functions intended for \nworkshop or repair scenarios. This can impact system availability, \npotentially degrading performance or erasing software, however the \nvehicle remains in a safe vehicle state."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-305"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nmfta.org/wp-content/media/2022/11/Actionable_Mitigations_Options_v9_DIST.pdf",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-03",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-376xx/CVE-2024-37600.json
Normal file
44
CVE-2024/CVE-2024-376xx/CVE-2024-37600.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-37600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.000",
|
||||
"lastModified": "2025-02-13T23:15:10.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack buffer overflow in the Service Broker service affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the Service Broker service. With prepared HTTP requests, an attacker can cause the Service-Broker service to fail."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-376xx/CVE-2024-37601.json
Normal file
21
CVE-2024/CVE-2024-376xx/CVE-2024-37601.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-37601",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.113",
|
||||
"lastModified": "2025-02-13T23:15:10.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible heap buffer overflow exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-376xx/CVE-2024-37602.json
Normal file
44
CVE-2024/CVE-2024-376xx/CVE-2024-37602.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-37602",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.197",
|
||||
"lastModified": "2025-02-13T23:15:10.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible NULL pointer dereference in the Apple Car Play function affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the AirTunes / AirPlay service. With prepared HTTP requests, an attacker can cause the Car Play service to fail."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-376xx/CVE-2024-37603.json
Normal file
21
CVE-2024/CVE-2024-376xx/CVE-2024-37603.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-37603",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.313",
|
||||
"lastModified": "2025-02-13T23:15:10.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible type confusion exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53309.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53309.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.400",
|
||||
"lastModified": "2025-02-13T23:15:10.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when an overly long string is passed to the \"-f\" parameter. This can lead to memory corruption, potentially allowing arbitrary code execution or causing a denial of service via specially crafted input."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53309/CVE-2024-53309.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53310.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53310.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.493",
|
||||
"lastModified": "2025-02-13T23:15:10.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Structured Exception Handler based buffer overflow vulnerability exists in Effectmatrix Total Video Converter Command Line (TVCC) 2.50 when a specially crafted file is passed to the -ff parameter. The vulnerability occurs due to improper handling of file input with overly long characters, leading to memory corruption. This can result in arbitrary code execution or denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53310/CVE-2024-53310.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53311.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53311.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53311",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.587",
|
||||
"lastModified": "2025-02-13T23:15:10.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stack buffer overflow in the arguments parameter in Immunity Inc. Immunity Debugger v1.85 allows attackers to execute arbitrary code via a crafted input that exceeds the buffer size."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ufist/vulnerability-research/blob/main/CVE-2024-53311/CVE-2024-53311.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-549xx/CVE-2024-54951.json
Normal file
21
CVE-2024/CVE-2024-549xx/CVE-2024-54951.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.677",
|
||||
"lastModified": "2025-02-13T23:15:10.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Monica 4.1.2 is vulnerable to Cross Site Scripting (XSS). A malicious user can create a malformed contact and use that contact in the \"HOW YOU MET\" customization options to trigger the XSS."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Allevon412/Monica-Stored-XSS-Vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-569xx/CVE-2024-56908.json
Normal file
21
CVE-2024/CVE-2024-569xx/CVE-2024-56908.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56908",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.773",
|
||||
"lastModified": "2025-02-13T23:15:10.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Perfex Crm < 3.2.1, an authenticated attacker can send a crafted HTTP POST request to the affected upload_sales_file endpoint. By providing malicious input in the rel_id parameter, combined with improper input validation, the attacker can bypass restrictions and upload arbitrary files to directories of their choice, potentially leading to remote code execution or server compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/JuyLang/7406077e3e5e6b2ff35c80f1853e298f",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-577xx/CVE-2024-57782.json
Normal file
21
CVE-2024/CVE-2024-577xx/CVE-2024-57782.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57782",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.863",
|
||||
"lastModified": "2025-02-13T23:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Docker-proxy v18.09.0 allows attackers to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tzzhang123456/test123/issues/2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-229xx/CVE-2025-22960.json
Normal file
21
CVE-2025/CVE-2025-229xx/CVE-2025-22960.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22960",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:10.960",
|
||||
"lastModified": "2025-02-13T23:15:10.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-229xx/CVE-2025-22961.json
Normal file
21
CVE-2025/CVE-2025-229xx/CVE-2025-22961.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22961",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:11.047",
|
||||
"lastModified": "2025-02-13T23:15:11.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A critical information disclosure vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters due to Incorrect Access Control (CWE-284). Unauthenticated attackers can directly access sensitive database backup files (snapshot_users.db) via publicly exposed URLs (/logs/devcfg/snapshot/ and /logs/devcfg/user/). Exploiting this vulnerability allows retrieval of sensitive user data, including login credentials, potentially leading to full system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22961",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-229xx/CVE-2025-22962.json
Normal file
21
CVE-2025/CVE-2025-229xx/CVE-2025-22962.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22962",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-13T23:15:11.140",
|
||||
"lastModified": "2025-02-13T23:15:11.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22962",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26511",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2025-02-13T16:16:50.270",
|
||||
"lastModified": "2025-02-13T16:16:50.270",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-14T00:15:07.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,7 +42,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-13T23:00:21.869606+00:00
|
||||
2025-02-14T00:55:25.359569+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-13T22:15:13.417000+00:00
|
||||
2025-02-14T00:15:07.667000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,61 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281295
|
||||
281314
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `19`
|
||||
|
||||
- [CVE-2023-34397](CVE-2023/CVE-2023-343xx/CVE-2023-34397.json) (`2025-02-13T22:15:10.470`)
|
||||
- [CVE-2023-34398](CVE-2023/CVE-2023-343xx/CVE-2023-34398.json) (`2025-02-13T22:15:10.603`)
|
||||
- [CVE-2023-34399](CVE-2023/CVE-2023-343xx/CVE-2023-34399.json) (`2025-02-13T22:15:10.730`)
|
||||
- [CVE-2023-34400](CVE-2023/CVE-2023-344xx/CVE-2023-34400.json) (`2025-02-13T22:15:10.847`)
|
||||
- [CVE-2024-57378](CVE-2024/CVE-2024-573xx/CVE-2024-57378.json) (`2025-02-13T22:15:11.167`)
|
||||
- [CVE-2025-1283](CVE-2025/CVE-2025-12xx/CVE-2025-1283.json) (`2025-02-13T22:15:11.413`)
|
||||
- [CVE-2025-20615](CVE-2025/CVE-2025-206xx/CVE-2025-20615.json) (`2025-02-13T22:15:11.590`)
|
||||
- [CVE-2025-22896](CVE-2025/CVE-2025-228xx/CVE-2025-22896.json) (`2025-02-13T22:15:11.737`)
|
||||
- [CVE-2025-23411](CVE-2025/CVE-2025-234xx/CVE-2025-23411.json) (`2025-02-13T22:15:11.913`)
|
||||
- [CVE-2025-23421](CVE-2025/CVE-2025-234xx/CVE-2025-23421.json) (`2025-02-13T22:15:12.073`)
|
||||
- [CVE-2025-24836](CVE-2025/CVE-2025-248xx/CVE-2025-24836.json) (`2025-02-13T22:15:12.270`)
|
||||
- [CVE-2025-24861](CVE-2025/CVE-2025-248xx/CVE-2025-24861.json) (`2025-02-13T22:15:12.457`)
|
||||
- [CVE-2025-24865](CVE-2025/CVE-2025-248xx/CVE-2025-24865.json) (`2025-02-13T22:15:12.613`)
|
||||
- [CVE-2025-25067](CVE-2025/CVE-2025-250xx/CVE-2025-25067.json) (`2025-02-13T22:15:12.780`)
|
||||
- [CVE-2025-25195](CVE-2025/CVE-2025-251xx/CVE-2025-25195.json) (`2025-02-13T22:15:13.100`)
|
||||
- [CVE-2025-25281](CVE-2025/CVE-2025-252xx/CVE-2025-25281.json) (`2025-02-13T22:15:13.263`)
|
||||
- [CVE-2025-26473](CVE-2025/CVE-2025-264xx/CVE-2025-26473.json) (`2025-02-13T22:15:13.417`)
|
||||
- [CVE-2023-34401](CVE-2023/CVE-2023-344xx/CVE-2023-34401.json) (`2025-02-13T23:15:08.867`)
|
||||
- [CVE-2023-34402](CVE-2023/CVE-2023-344xx/CVE-2023-34402.json) (`2025-02-13T23:15:09.337`)
|
||||
- [CVE-2023-34403](CVE-2023/CVE-2023-344xx/CVE-2023-34403.json) (`2025-02-13T23:15:09.440`)
|
||||
- [CVE-2023-34404](CVE-2023/CVE-2023-344xx/CVE-2023-34404.json) (`2025-02-13T23:15:09.553`)
|
||||
- [CVE-2023-34406](CVE-2023/CVE-2023-344xx/CVE-2023-34406.json) (`2025-02-13T23:15:09.633`)
|
||||
- [CVE-2024-12054](CVE-2024/CVE-2024-120xx/CVE-2024-12054.json) (`2025-02-13T23:15:09.823`)
|
||||
- [CVE-2024-37600](CVE-2024/CVE-2024-376xx/CVE-2024-37600.json) (`2025-02-13T23:15:10.000`)
|
||||
- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-13T23:15:10.113`)
|
||||
- [CVE-2024-37602](CVE-2024/CVE-2024-376xx/CVE-2024-37602.json) (`2025-02-13T23:15:10.197`)
|
||||
- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-13T23:15:10.313`)
|
||||
- [CVE-2024-53309](CVE-2024/CVE-2024-533xx/CVE-2024-53309.json) (`2025-02-13T23:15:10.400`)
|
||||
- [CVE-2024-53310](CVE-2024/CVE-2024-533xx/CVE-2024-53310.json) (`2025-02-13T23:15:10.493`)
|
||||
- [CVE-2024-53311](CVE-2024/CVE-2024-533xx/CVE-2024-53311.json) (`2025-02-13T23:15:10.587`)
|
||||
- [CVE-2024-54951](CVE-2024/CVE-2024-549xx/CVE-2024-54951.json) (`2025-02-13T23:15:10.677`)
|
||||
- [CVE-2024-56908](CVE-2024/CVE-2024-569xx/CVE-2024-56908.json) (`2025-02-13T23:15:10.773`)
|
||||
- [CVE-2024-57782](CVE-2024/CVE-2024-577xx/CVE-2024-57782.json) (`2025-02-13T23:15:10.863`)
|
||||
- [CVE-2025-22960](CVE-2025/CVE-2025-229xx/CVE-2025-22960.json) (`2025-02-13T23:15:10.960`)
|
||||
- [CVE-2025-22961](CVE-2025/CVE-2025-229xx/CVE-2025-22961.json) (`2025-02-13T23:15:11.047`)
|
||||
- [CVE-2025-22962](CVE-2025/CVE-2025-229xx/CVE-2025-22962.json) (`2025-02-13T23:15:11.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `26`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2022-48226](CVE-2022/CVE-2022-482xx/CVE-2022-48226.json) (`2025-02-13T22:15:08.423`)
|
||||
- [CVE-2022-48227](CVE-2022/CVE-2022-482xx/CVE-2022-48227.json) (`2025-02-13T22:15:08.713`)
|
||||
- [CVE-2023-0967](CVE-2023/CVE-2023-09xx/CVE-2023-0967.json) (`2025-02-13T21:15:11.897`)
|
||||
- [CVE-2023-20675](CVE-2023/CVE-2023-206xx/CVE-2023-20675.json) (`2025-02-13T21:15:12.143`)
|
||||
- [CVE-2023-22985](CVE-2023/CVE-2023-229xx/CVE-2023-22985.json) (`2025-02-13T21:15:12.317`)
|
||||
- [CVE-2023-24747](CVE-2023/CVE-2023-247xx/CVE-2023-24747.json) (`2025-02-13T21:15:12.490`)
|
||||
- [CVE-2023-27760](CVE-2023/CVE-2023-277xx/CVE-2023-27760.json) (`2025-02-13T22:15:09.083`)
|
||||
- [CVE-2023-27761](CVE-2023/CVE-2023-277xx/CVE-2023-27761.json) (`2025-02-13T22:15:09.283`)
|
||||
- [CVE-2023-27762](CVE-2023/CVE-2023-277xx/CVE-2023-27762.json) (`2025-02-13T22:15:09.487`)
|
||||
- [CVE-2023-27763](CVE-2023/CVE-2023-277xx/CVE-2023-27763.json) (`2025-02-13T22:15:09.683`)
|
||||
- [CVE-2023-27764](CVE-2023/CVE-2023-277xx/CVE-2023-27764.json) (`2025-02-13T22:15:09.873`)
|
||||
- [CVE-2023-27765](CVE-2023/CVE-2023-277xx/CVE-2023-27765.json) (`2025-02-13T22:15:10.063`)
|
||||
- [CVE-2023-27766](CVE-2023/CVE-2023-277xx/CVE-2023-27766.json) (`2025-02-13T22:15:10.267`)
|
||||
- [CVE-2023-27767](CVE-2023/CVE-2023-277xx/CVE-2023-27767.json) (`2025-02-13T21:15:12.653`)
|
||||
- [CVE-2023-27768](CVE-2023/CVE-2023-277xx/CVE-2023-27768.json) (`2025-02-13T21:15:12.810`)
|
||||
- [CVE-2023-27769](CVE-2023/CVE-2023-277xx/CVE-2023-27769.json) (`2025-02-13T21:15:12.970`)
|
||||
- [CVE-2023-27771](CVE-2023/CVE-2023-277xx/CVE-2023-27771.json) (`2025-02-13T21:15:13.123`)
|
||||
- [CVE-2023-29415](CVE-2023/CVE-2023-294xx/CVE-2023-29415.json) (`2025-02-13T21:15:13.287`)
|
||||
- [CVE-2023-29416](CVE-2023/CVE-2023-294xx/CVE-2023-29416.json) (`2025-02-13T21:15:13.473`)
|
||||
- [CVE-2024-34520](CVE-2024/CVE-2024-345xx/CVE-2024-34520.json) (`2025-02-13T21:15:14.113`)
|
||||
- [CVE-2024-4212](CVE-2024/CVE-2024-42xx/CVE-2024-4212.json) (`2025-02-13T21:15:14.770`)
|
||||
- [CVE-2024-46910](CVE-2024/CVE-2024-469xx/CVE-2024-46910.json) (`2025-02-13T21:15:14.590`)
|
||||
- [CVE-2024-51376](CVE-2024/CVE-2024-513xx/CVE-2024-51376.json) (`2025-02-13T21:15:15.083`)
|
||||
- [CVE-2025-1094](CVE-2025/CVE-2025-10xx/CVE-2025-1094.json) (`2025-02-13T22:15:11.300`)
|
||||
- [CVE-2025-25069](CVE-2025/CVE-2025-250xx/CVE-2025-25069.json) (`2025-02-13T22:15:12.930`)
|
||||
- [CVE-2025-26511](CVE-2025/CVE-2025-265xx/CVE-2025-26511.json) (`2025-02-14T00:15:07.667`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
107
_state.csv
107
_state.csv
@ -200084,7 +200084,7 @@ CVE-2022-31885,0,0,f30f0097d4464ce53d40951dbf9edf2d7114ac031001699119f335f0d6349
|
||||
CVE-2022-31886,0,0,816d2e94f4379147c60d46ace56eeaca0d5d7e7431f917d426ff8b02fa64c472,2024-11-21T07:05:26.257000
|
||||
CVE-2022-31887,0,0,998d759ca13f6317ff35b9fe0dbcdb82c5e2f263dc9086419f869fa355c8a3b4,2024-11-21T07:05:26.417000
|
||||
CVE-2022-31888,0,0,e997b7585f01e276820155625ce95b6c84ac6fcc647bb3a6c1d676e898914242,2025-02-13T17:15:40.707000
|
||||
CVE-2022-31889,0,1,7bf028581967fb23b1381c879bfaac81d56b492430ace6568cb76eb75f0254f2,2025-02-13T21:15:11.217000
|
||||
CVE-2022-31889,0,0,7bf028581967fb23b1381c879bfaac81d56b492430ace6568cb76eb75f0254f2,2025-02-13T21:15:11.217000
|
||||
CVE-2022-3189,0,0,e7d548859100ddb6d04bca464c55d8caed0e8a2a134e1418315b1026e1fed597,2024-11-21T07:19:00.523000
|
||||
CVE-2022-31890,0,0,0265474ae73516ba39374fd36e0aa764d833beba2c251bfd2fc87b8933b7b0d9,2025-02-13T20:15:28.320000
|
||||
CVE-2022-31897,0,0,a461f02f9809dc1857ed2e240c74a8fa727acdb230c95747b738747c4fc9ff57,2024-11-21T07:05:27.433000
|
||||
@ -212327,8 +212327,8 @@ CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c
|
||||
CVE-2022-48223,0,0,1a1b8d147489a3c3fa5c81528f9e431f114304a422558985b701d70f8184d20d,2024-11-21T07:32:59.567000
|
||||
CVE-2022-48224,0,0,ee88c8665f12e05560c7526b3c91f6382c5a60e0b726f261a3d980bf7ada1b7a,2024-11-21T07:32:59.707000
|
||||
CVE-2022-48225,0,0,a6ae54d41691aeae705047c9c3cf015025166454e1c3fadfea923075e53d65cc,2024-11-21T07:32:59.857000
|
||||
CVE-2022-48226,0,1,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000
|
||||
CVE-2022-48227,0,1,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000
|
||||
CVE-2022-48226,0,0,4d199d8daa7b07efe29a5c09e3794288c0e5ef2a855af019325c29755103bd6c,2025-02-13T22:15:08.423000
|
||||
CVE-2022-48227,0,0,1e9c74ac05bd7f6b98c5dc03521f82da8815cef7e8dfa953ef12568152bb5556,2025-02-13T22:15:08.713000
|
||||
CVE-2022-48228,0,0,1728bc5020e9d5ce083789f95266fe6819a7c18f8e1fdc2ca823020c212eae33,2024-11-21T07:33:00.293000
|
||||
CVE-2022-4823,0,0,e7fc5fb9db54eb08d7bdb32316cd03ccc89eddab098ff51ef8ef039a2942405f,2024-11-21T07:36:00.993000
|
||||
CVE-2022-48230,0,0,e6db329d7865ba3b22f42e4c81ac2be3c151cb8eaf5834575e98ae1fd4a66d36,2024-11-21T07:33:00.437000
|
||||
@ -214113,7 +214113,7 @@ CVE-2023-0963,0,0,e76c4515e101df845abd9e0cd22380cd7b19a33696d5d8f67abd8ddb667a7d
|
||||
CVE-2023-0964,0,0,963f3a566f3a79a2337c835b6816d91dd7ecc7ad85ac2ebc6a0afd29b88b7157,2024-11-21T07:38:11.770000
|
||||
CVE-2023-0965,0,0,371ba41b12fc48fbaee5b4688da85d732d4c4614bbe866fa68b5520397d16fa9,2024-11-21T07:38:11.893000
|
||||
CVE-2023-0966,0,0,4cd2a56099a504d2f466d308e07dd69e48f6365ba4b9ab454a42e7c16e2a7122,2024-11-21T07:38:12.017000
|
||||
CVE-2023-0967,0,1,bdaaafe2df1d1735780a8e28b7bd2a2e64b5aa6579340c3788cc39827c9973a9,2025-02-13T21:15:11.897000
|
||||
CVE-2023-0967,0,0,bdaaafe2df1d1735780a8e28b7bd2a2e64b5aa6579340c3788cc39827c9973a9,2025-02-13T21:15:11.897000
|
||||
CVE-2023-0968,0,0,e5bc3ae62aa8c07f47da6f606b18597e36d54de8486b821a41d8e216785ebd88,2024-11-21T07:38:12.250000
|
||||
CVE-2023-0969,0,0,80994f4d879f4b8f636042272616a496d53175adca3717df2d2456587d8e02a6,2024-11-21T07:38:12.370000
|
||||
CVE-2023-0970,0,0,c8c2deca64dbd8ab3e898c77810961b2c968c39c5a0596426e77b4cf0c3c846a,2024-11-21T07:38:12.510000
|
||||
@ -215551,7 +215551,7 @@ CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b318
|
||||
CVE-2023-20670,0,0,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000
|
||||
CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000
|
||||
CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000
|
||||
CVE-2023-20675,0,1,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000
|
||||
CVE-2023-20675,0,0,7aa7d68c7cc56117546c0a113e3ab20340729652469bbbf530b5b910f1f76562,2025-02-13T21:15:12.143000
|
||||
CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35
|
||||
CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000
|
||||
CVE-2023-20679,0,0,bc056dc1c31fbcb599ca8278730b2a5ae7f450cce065487c52635fab0636d2ba,2025-02-12T16:15:35.183000
|
||||
@ -217753,7 +217753,7 @@ CVE-2023-22974,0,0,85415b262be91cde3a112e04d995d9163e65d13b859bc6dfd72ba4fee38ce
|
||||
CVE-2023-22975,0,0,eb8873b34352e4a3cc09ef54ad0d7ccdd681ae65fd1d5bde5e48e17ea477cee6,2024-11-21T07:45:45.080000
|
||||
CVE-2023-2298,0,0,989f644c1451c5a67e467bb23faffc2f4e6cbf5ba286ec24661d092839141574,2024-11-21T07:58:20.190000
|
||||
CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a53714146d,2024-11-21T07:45:45.220000
|
||||
CVE-2023-22985,0,1,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000
|
||||
CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000
|
||||
CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee831,2024-11-21T07:58:20.323000
|
||||
CVE-2023-22995,0,0,93e6265683ddad7b70d16ea39dd84aa9bcf8f539c4ef1ce28d88da0e81fedf71,2024-11-21T07:45:45.550000
|
||||
CVE-2023-22996,0,0,fe442cb87d4861b04715d9721093b1f2e793cffbe47ffe19ce9d81d6e93c6a1f,2024-11-21T07:45:45.700000
|
||||
@ -219091,7 +219091,7 @@ CVE-2023-24736,0,0,64d857016a76527a8740ee1e1c43d0addfc04b72038970083b97686e99dff
|
||||
CVE-2023-24737,0,0,94181775e6f22dc84465e3e4362e4fabf7657336f68abafe1b74be175ea98c57,2024-11-21T07:48:21.480000
|
||||
CVE-2023-2474,0,0,b9e27b61e50695a5330292e86ca2876b43f16fb3da823598b3c65b2c35fd0b2d,2024-11-21T07:58:41.230000
|
||||
CVE-2023-24744,0,0,b1b273342b8ba4691ae682d019a2596c7ccca937698635804e714294c7debe50,2025-01-29T22:15:28.470000
|
||||
CVE-2023-24747,0,1,03975b8c13701d122fdcca957ee0ada15d6e1234a6b814086a40cc26c630938a,2025-02-13T21:15:12.490000
|
||||
CVE-2023-24747,0,0,03975b8c13701d122fdcca957ee0ada15d6e1234a6b814086a40cc26c630938a,2025-02-13T21:15:12.490000
|
||||
CVE-2023-2475,0,0,c188cdbbc9d9188f8fdc3657f235f48d23e99c97c2b4c85032b31b2a7997d083,2024-11-21T07:58:41.357000
|
||||
CVE-2023-24751,0,0,131257e46990aa72ffdccb413b9cc6d489c2b7178ddf8c577d4b56b95fad7267,2024-11-21T07:48:21.897000
|
||||
CVE-2023-24752,0,0,e326f18a2fa1fbea25f07bee3ac3e3ad424ac372a5503c19527265590f0101c2,2024-11-21T07:48:22.033000
|
||||
@ -221503,18 +221503,18 @@ CVE-2023-27755,0,0,030e4e29a08e32cec80a06cfd9ceed9e6a484ac94095525885308529b6a52
|
||||
CVE-2023-27757,0,0,2b1c31a8bd90f1ac9fd058810f197194db7cc21789aa13aeb9c645b2425f2f86,2024-11-21T07:53:25.947000
|
||||
CVE-2023-27759,0,0,a5a7499505e5eb10085796c47747c10374553b53ecdd40ee382826bcf99fd9ef,2024-11-21T07:53:26.090000
|
||||
CVE-2023-2776,0,0,c43d162098572ad524d5e0e996e016c6aa5164a6c37cb6f3692cd2e35bfd14fd,2024-11-21T07:59:16.263000
|
||||
CVE-2023-27760,0,1,e030fbde06c94af855dcd532801f471acbc0186148872501268b8b74ad215be1,2025-02-13T22:15:09.083000
|
||||
CVE-2023-27761,0,1,270ebc6bed1d0454b51818bf8db299057a6af687838cbabc83082626fa67dde3,2025-02-13T22:15:09.283000
|
||||
CVE-2023-27762,0,1,e5391af1c5dfe871e262b4eac7242f76c9e6a9bf7b92b14e8fc17f80d12701af,2025-02-13T22:15:09.487000
|
||||
CVE-2023-27763,0,1,3fbd542cdd0631a8a202721c46a621b39ec64041828337fff0623747857c71a7,2025-02-13T22:15:09.683000
|
||||
CVE-2023-27764,0,1,b061169e40053f9687d73393c47ef28639aa9c10546e27f14541f7ff3d3f6300,2025-02-13T22:15:09.873000
|
||||
CVE-2023-27765,0,1,b8154da79dc5ec61c76e59430e20c35b2dff13291097e7712aaa93e2553dc6c8,2025-02-13T22:15:10.063000
|
||||
CVE-2023-27766,0,1,c9c5c9d3b383a4447789659812a27e96ea31a9efe6ff89fdad87908b7840e214,2025-02-13T22:15:10.267000
|
||||
CVE-2023-27767,0,1,d7a95f3931eb43e78609df84dafcce3436e2b8b9f22e3bc8afce85017a8b9dcf,2025-02-13T21:15:12.653000
|
||||
CVE-2023-27768,0,1,717b9b686a6c3cb792d9e39d1721db726125903bce617663ee4ae74641106ad5,2025-02-13T21:15:12.810000
|
||||
CVE-2023-27769,0,1,566effd7212c1522781e5ea4a5e269ae9d2ec72ca85dbd8d31cc26b8c49f66fb,2025-02-13T21:15:12.970000
|
||||
CVE-2023-27760,0,0,e030fbde06c94af855dcd532801f471acbc0186148872501268b8b74ad215be1,2025-02-13T22:15:09.083000
|
||||
CVE-2023-27761,0,0,270ebc6bed1d0454b51818bf8db299057a6af687838cbabc83082626fa67dde3,2025-02-13T22:15:09.283000
|
||||
CVE-2023-27762,0,0,e5391af1c5dfe871e262b4eac7242f76c9e6a9bf7b92b14e8fc17f80d12701af,2025-02-13T22:15:09.487000
|
||||
CVE-2023-27763,0,0,3fbd542cdd0631a8a202721c46a621b39ec64041828337fff0623747857c71a7,2025-02-13T22:15:09.683000
|
||||
CVE-2023-27764,0,0,b061169e40053f9687d73393c47ef28639aa9c10546e27f14541f7ff3d3f6300,2025-02-13T22:15:09.873000
|
||||
CVE-2023-27765,0,0,b8154da79dc5ec61c76e59430e20c35b2dff13291097e7712aaa93e2553dc6c8,2025-02-13T22:15:10.063000
|
||||
CVE-2023-27766,0,0,c9c5c9d3b383a4447789659812a27e96ea31a9efe6ff89fdad87908b7840e214,2025-02-13T22:15:10.267000
|
||||
CVE-2023-27767,0,0,d7a95f3931eb43e78609df84dafcce3436e2b8b9f22e3bc8afce85017a8b9dcf,2025-02-13T21:15:12.653000
|
||||
CVE-2023-27768,0,0,717b9b686a6c3cb792d9e39d1721db726125903bce617663ee4ae74641106ad5,2025-02-13T21:15:12.810000
|
||||
CVE-2023-27769,0,0,566effd7212c1522781e5ea4a5e269ae9d2ec72ca85dbd8d31cc26b8c49f66fb,2025-02-13T21:15:12.970000
|
||||
CVE-2023-27770,0,0,0277aa9983dd53ba4ebc77e25b195be9647ff5b9cc853e2c7170da3d9f91a924,2025-02-13T16:15:41.010000
|
||||
CVE-2023-27771,0,1,b9309a0c2c576d50528d6f5b49f6ca45150489ee97047b75937f2c2c01995b62,2025-02-13T21:15:13.123000
|
||||
CVE-2023-27771,0,0,b9309a0c2c576d50528d6f5b49f6ca45150489ee97047b75937f2c2c01995b62,2025-02-13T21:15:13.123000
|
||||
CVE-2023-27772,0,0,7ef297c555763637e256ba5f03a2a87e47c9050df35a7e9b311ac060d45c3773,2025-02-07T17:15:26.333000
|
||||
CVE-2023-27775,0,0,c328c66aa6075952b628655650d586d004c5e1c99d054b10121df930574fbff7,2025-02-08T03:15:09.810000
|
||||
CVE-2023-27776,0,0,821bfbcd28344012610595833b8a1c5c475750e44dd09aa01bb06cb83268ec2b,2025-02-05T16:15:35.903000
|
||||
@ -223052,8 +223052,8 @@ CVE-2023-29411,0,0,b0b5dcd4734f6628fdada1e59048b94a9d241ec79656d0491b41e185d6f01
|
||||
CVE-2023-29412,0,0,2f8043764e5e22066ce32d65095d0431bd5e5f4b6498eb8605bca575ed780f1d,2024-11-21T07:57:00.663000
|
||||
CVE-2023-29413,0,0,95db2c23acc68d1e72f038afb0e079209e6e1e4314c41232a32e9ec5f5ad1154,2024-11-21T07:57:00.790000
|
||||
CVE-2023-29414,0,0,995f6dfbce7b6373c94f8f4446e5c1ab9db1d57586ede22a39a9b94d2ae5ed03,2024-11-21T07:57:00.903000
|
||||
CVE-2023-29415,0,1,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000
|
||||
CVE-2023-29416,0,1,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000
|
||||
CVE-2023-29415,0,0,99a6595de9b1a1d8c6fe47e11af9186d2e228dc0ac8dcc954021c089753a480e,2025-02-13T21:15:13.287000
|
||||
CVE-2023-29416,0,0,929e3a57da902720d03f73007363a686a9d7ae6a54fc8b432c92099e4ba63cfe,2025-02-13T21:15:13.473000
|
||||
CVE-2023-29417,0,0,af1671cdf04819caefb52843b9d73da01d07e147abbd4c3ea9e6ae4d1237e052,2024-11-21T07:57:01.327000
|
||||
CVE-2023-29418,0,0,216edffe831d0d592ec0d83d60d807b6fddc27336e8ac8763ba6f9057d2f454c,2024-11-21T07:57:01.473000
|
||||
CVE-2023-29419,0,0,eee99d945f06108a5e40a1ec9c523d1176d85c277e5d1c52341cf8f78429a077,2024-11-21T07:57:01.617000
|
||||
@ -226934,11 +226934,16 @@ CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608
|
||||
CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c6740d0,2024-11-21T08:07:09.990000
|
||||
CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000
|
||||
CVE-2023-34396,0,0,cabb805a02df64f428d581ac19cc4a5993ad0b37fa13e2c2b635c0e2751edd5c,2025-02-13T17:16:36.117000
|
||||
CVE-2023-34397,1,1,249577ceb91ef7e113cb65f6b19506db3856bc2ebed7264fcfc2f88129aee8f5,2025-02-13T22:15:10.470000
|
||||
CVE-2023-34398,1,1,1f12e56c45fe1c1220e96832c656b1bd5fc51e1632b5dc21f1555c6214ea9f7c,2025-02-13T22:15:10.603000
|
||||
CVE-2023-34399,1,1,0c3b36247c736bcfd69a9407b89938ceed0202f9e093f20c1d489d20cb170fd4,2025-02-13T22:15:10.730000
|
||||
CVE-2023-34397,0,0,249577ceb91ef7e113cb65f6b19506db3856bc2ebed7264fcfc2f88129aee8f5,2025-02-13T22:15:10.470000
|
||||
CVE-2023-34398,0,0,1f12e56c45fe1c1220e96832c656b1bd5fc51e1632b5dc21f1555c6214ea9f7c,2025-02-13T22:15:10.603000
|
||||
CVE-2023-34399,0,0,0c3b36247c736bcfd69a9407b89938ceed0202f9e093f20c1d489d20cb170fd4,2025-02-13T22:15:10.730000
|
||||
CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000
|
||||
CVE-2023-34400,1,1,c5be95075437fd5867697c3f2c6ea06de62d25c541de8b0de4525dbe7442c060,2025-02-13T22:15:10.847000
|
||||
CVE-2023-34400,0,0,c5be95075437fd5867697c3f2c6ea06de62d25c541de8b0de4525dbe7442c060,2025-02-13T22:15:10.847000
|
||||
CVE-2023-34401,1,1,a56ec84af0fc63a7e1b026ee8045ffc0b54afd7dbac33da84057cec72673c587,2025-02-13T23:15:08.867000
|
||||
CVE-2023-34402,1,1,192b4617fe538192127cae04e62c627e8669702950b4404c454130dab6128709,2025-02-13T23:15:09.337000
|
||||
CVE-2023-34403,1,1,eb0dca1a5f6454558c31d75b6ed692ae490c22c970720bd85806096597d47c16,2025-02-13T23:15:09.440000
|
||||
CVE-2023-34404,1,1,335287281ac129a1025cb1021db0841bd6f7c8376ff5d231f9f4540744b0246e,2025-02-13T23:15:09.553000
|
||||
CVE-2023-34406,1,1,36bc16e478a055fb4fedf2e4d8547169137b2607058a49615980dca05a514b16,2025-02-13T23:15:09.633000
|
||||
CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000
|
||||
CVE-2023-34408,0,0,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000
|
||||
CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000
|
||||
@ -245328,6 +245333,7 @@ CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4
|
||||
CVE-2024-12049,0,0,42e54420720f33c4562344743dcb6a33224d938ded42006d07df2fa0d0a23306,2025-01-07T05:15:14.147000
|
||||
CVE-2024-1205,0,0,7a555763b4ee56426377ab020ddc9dc79c7bd15b9be6f5edc39ecd5779b4ad33,2024-11-21T08:50:02.210000
|
||||
CVE-2024-12053,0,0,bc2b289301180bd6933809c4de004e58bcafd2b88fa0501ccb1750c43496ee92,2025-01-02T17:47:20.023000
|
||||
CVE-2024-12054,1,1,4ba12ec29f03e1b31732298e7df713c42f5671645c234efaa4d4cee36bba5e97,2025-02-13T23:15:09.823000
|
||||
CVE-2024-12056,0,0,d7fbaa89c201679c30b80d6484a6860abf01d1ecc41424a8e0b08b504062cb8c,2024-12-04T15:15:09.700000
|
||||
CVE-2024-12057,0,0,bd805d2c90bd77944ba46eb8c9dc7c23cbacd60316de3cfa41d8ef3c61043848,2024-12-09T19:15:12.750000
|
||||
CVE-2024-12058,0,0,1297ad1337a6a14996d96d7694aaa54397421de227302137e2c91e0896f21be7,2025-02-11T16:15:38.663000
|
||||
@ -258478,7 +258484,7 @@ CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f
|
||||
CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c66635e,2024-11-21T09:18:50.773000
|
||||
CVE-2024-34517,0,0,e9e99883991af2360e74003fd76d7d9474c4615f3c04d4c9966be6f605ba3976,2024-11-21T09:18:50.990000
|
||||
CVE-2024-34519,0,0,9923095c8ead28a85094bbf98c9269e81fc27f56b86f7b0b473592a53f6f330d,2024-11-21T09:18:51.220000
|
||||
CVE-2024-34520,0,1,3940f2626dfd21cc81f4f316b6ff90f799fda5e2ff7bfc481835fbee1c70daea,2025-02-13T21:15:14.113000
|
||||
CVE-2024-34520,0,0,3940f2626dfd21cc81f4f316b6ff90f799fda5e2ff7bfc481835fbee1c70daea,2025-02-13T21:15:14.113000
|
||||
CVE-2024-34521,0,0,e26ea59913eb8ed4248c06c253cb04fc81acdd8fc9ce6901db39d7797658eca7,2025-02-12T23:15:10.730000
|
||||
CVE-2024-34523,0,0,9238c9d15fb625bf913096c040c0bef2ba8c758ca26eb1436542b02504490f9d,2024-11-21T09:18:51.440000
|
||||
CVE-2024-34524,0,0,c38382eedbf78ed000ded50091e5476087f57b5ee1f5f0c45a0fd37c8ca78066,2024-11-21T09:18:51.663000
|
||||
@ -260976,6 +260982,10 @@ CVE-2024-37575,0,0,fb41a93cda92e423debc2a813128d4d353bf25b2fe44666c8d6cd43b5e9b3
|
||||
CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9b1,2025-01-02T19:04:15.777000
|
||||
CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000
|
||||
CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000
|
||||
CVE-2024-37600,1,1,b79a51c094f0a6fed9f65e54b9a39c093b563e53c9ad91e82bfd0b19e4aafe5f,2025-02-13T23:15:10
|
||||
CVE-2024-37601,1,1,aec0cb3ba1cbe8af2217e7a003790bea0a3bc0a521a72f99614a77c683ba988e,2025-02-13T23:15:10.113000
|
||||
CVE-2024-37602,1,1,ec442a35e466f5fd5257edca5d419584b6ca1840882c802195e64121f0957b75,2025-02-13T23:15:10.197000
|
||||
CVE-2024-37603,1,1,5e87b65dd6dc773292958ca8ecc777b9991649642bca0fdd87232f42b10c39f3,2025-02-13T23:15:10.313000
|
||||
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
|
||||
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
|
||||
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
|
||||
@ -264311,7 +264321,7 @@ CVE-2024-42116,0,0,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e
|
||||
CVE-2024-42117,0,0,806c7bbaa47a63c79c153148308d6c18cdc47e890955b3b9c1e9c60deecd59dd,2024-11-21T09:33:38.313000
|
||||
CVE-2024-42118,0,0,bfa5d9240584a5e4f4f49f97b36f2463fb85b4110cf08dde6942a6188e7d2aa3,2024-11-21T09:33:38.430000
|
||||
CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b832,2024-11-21T09:33:38.543000
|
||||
CVE-2024-4212,0,1,86c29a7b1919d72ea963552028257ad6e66d351fe99835995b8488350816b1ae,2025-02-13T21:15:14.770000
|
||||
CVE-2024-4212,0,0,86c29a7b1919d72ea963552028257ad6e66d351fe99835995b8488350816b1ae,2025-02-13T21:15:14.770000
|
||||
CVE-2024-42120,0,0,c55507381d2dbda42ba1186aae324969076618a383d70d402103e69c7c75737d,2024-11-21T09:33:38.673000
|
||||
CVE-2024-42121,0,0,bf6415bde3191c5f5fcd25ffd10af7590ee25a7ffb8661d1b1bd658227b8f687,2024-11-21T09:33:38.810000
|
||||
CVE-2024-42122,0,0,8f80f34dcee523cc5df99cdb9e0b5f5fb6ff4777f77fd53a4e265209d3244689,2024-12-09T13:10:02.027000
|
||||
@ -267744,7 +267754,7 @@ CVE-2024-46906,0,0,9392cc16a6f8541a5ae7fa23a655b4084d1de04fab349df70429579f7befe
|
||||
CVE-2024-46907,0,0,078e0a524a643e2b9cff1a23a8c0882ba95612d7520992e82078626dfc38983e,2024-12-10T18:23:41.573000
|
||||
CVE-2024-46908,0,0,55b70ed532f1853f99cc2c331e5a024319deea33e2ff1a3d0d6d3f10416dda38,2024-12-10T18:23:09.100000
|
||||
CVE-2024-46909,0,0,23c76f6e1a6ff88eaca1f23c162ae0295380b6a8eaa129068dfbfc189f6b8c77,2024-12-10T18:10:35.043000
|
||||
CVE-2024-46910,0,1,19c35e4a586a075f1d6c3c0126830f7f29749b700c6bfb541416c07500b10fd9,2025-02-13T21:15:14.590000
|
||||
CVE-2024-46910,0,0,19c35e4a586a075f1d6c3c0126830f7f29749b700c6bfb541416c07500b10fd9,2025-02-13T21:15:14.590000
|
||||
CVE-2024-46911,0,0,3d0ee5b10efd83bd968feb73195ce7d2aa3abe80ac847507929e8b55f2484d57,2024-11-21T09:39:07.520000
|
||||
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
|
||||
CVE-2024-46918,0,0,4ffbb01b562296291ac13b104d12d655761406982e7cf7d77cad5d9f13d483f1,2024-09-20T18:14:23.897000
|
||||
@ -270957,7 +270967,7 @@ CVE-2024-51365,0,0,d837cc1586c1d4910b5dfde0140d794651911e802de0b0b7889dd34212429
|
||||
CVE-2024-51366,0,0,8cb37b642efd94f1ef2cb009c97c3b6b6785b34318fa56f7821210d8849df437,2024-12-04T16:15:25.903000
|
||||
CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
|
||||
CVE-2024-5137,0,0,41ad2c3a0cd14fabc2d82c1eb5d81c11af2ccc9f81f9390b031e63a9eafa7739,2024-11-21T09:47:03.080000
|
||||
CVE-2024-51376,0,1,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000
|
||||
CVE-2024-51376,0,0,f700ac102ba582e72dbdc7fed72c59b433027ff0357273ca7f73e1576035ebe0,2025-02-13T21:15:15.083000
|
||||
CVE-2024-51377,0,0,454a574f7d41cec5c0e5592441622f9e1eef9cc67c58f07bfdfa7571c5635b7b,2024-11-14T23:23:52.997000
|
||||
CVE-2024-51378,0,0,60b518476e0f52f1f42de1d9edd060a172f8f183ad7a51b636d39c5e7781b145,2024-12-06T18:17:17.377000
|
||||
CVE-2024-51379,0,0,13c494ffdbcfebeae28d4137631165977c5751c7591d4d79351ef75570cbecdb,2024-11-06T18:17:17.287000
|
||||
@ -272414,7 +272424,10 @@ CVE-2024-53295,0,0,b8e985a8e27bd0c49159e8a0c89472687e5b7e5449b7c5ba70064bf994d36
|
||||
CVE-2024-53296,0,0,be682d3eb2a02cb859d07bb38fd2cdf79c5c9c446624f27b1fefa1f7d7732c2c,2025-02-07T19:54:50.490000
|
||||
CVE-2024-53299,0,0,2311d06f0f8179bedcf518ce1bde420954fcc87b5db6c467bb518cf92e75888f,2025-02-04T19:15:31.877000
|
||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||
CVE-2024-53309,1,1,fbd192ebe8ddc3ba7c6c8bca9f108e5de178d036f56947c6f5d14ea2aed01d0d,2025-02-13T23:15:10.400000
|
||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||
CVE-2024-53310,1,1,bb9e3e768922d5b2c6f52d290405822e84f0ba0511a6111a2bc22311f7f3fa04,2025-02-13T23:15:10.493000
|
||||
CVE-2024-53311,1,1,1d95306049f15b3ba580c1cb4607e72763bc84a9d8705b243ef89765e2a00bb4,2025-02-13T23:15:10.587000
|
||||
CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000
|
||||
CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000
|
||||
CVE-2024-53320,0,0,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000
|
||||
@ -273396,6 +273409,7 @@ CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b67
|
||||
CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000
|
||||
CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000
|
||||
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
|
||||
CVE-2024-54951,1,1,a2306e7c3868313e0c3e4349c435a20c45c14ebd21b4714e4c34697848fd3c8c,2025-02-13T23:15:10.677000
|
||||
CVE-2024-54954,0,0,250bc145ec3f51ab356a556d3d29ab0cef21c9b82ddd8fae33865ef33a929590,2025-02-10T18:15:29.663000
|
||||
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
|
||||
CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
|
||||
@ -274400,6 +274414,7 @@ CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b2
|
||||
CVE-2024-56901,0,0,6d3fbd070e3d1e938268fa85659056edc11eed45889b8e3be3e844885855df5f,2025-02-04T16:15:38.687000
|
||||
CVE-2024-56902,0,0,5bc241ca860cc70d4907c4f9287830a987c40db50a399ecf7dc53f6afa5ba16c,2025-02-04T15:15:18.163000
|
||||
CVE-2024-56903,0,0,ae8a42ff86d56e0afca1c5364c916f572bc5dbf89afdb88962064980d81030e3,2025-02-04T15:15:18.387000
|
||||
CVE-2024-56908,1,1,5432237ac8b7fb042a60e387b8cd04a7f17a411a13db8c6306624d4d5eeb87a5,2025-02-13T23:15:10.773000
|
||||
CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000
|
||||
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
||||
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
|
||||
@ -274569,7 +274584,7 @@ CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279f
|
||||
CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000
|
||||
CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000
|
||||
CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000
|
||||
CVE-2024-57378,1,1,60220413d47246cdaebafb55bd59c289f14acd59650a423e904224ff431c74c9,2025-02-13T22:15:11.167000
|
||||
CVE-2024-57378,0,0,60220413d47246cdaebafb55bd59c289f14acd59650a423e904224ff431c74c9,2025-02-13T22:15:11.167000
|
||||
CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000
|
||||
CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000
|
||||
CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000
|
||||
@ -274782,6 +274797,7 @@ CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b101590
|
||||
CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
|
||||
CVE-2024-57777,0,0,e81fdc551542b79f75c8f99f496223d9b803cf79f3ada1cc2529ab07650b1016,2025-02-11T22:15:29.680000
|
||||
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
|
||||
CVE-2024-57782,1,1,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000
|
||||
CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
|
||||
CVE-2024-57785,0,0,da53710abc0b38f1f9720d31a7383037ac10a091073d73f356e9f0e15e997042,2025-02-04T15:15:18.943000
|
||||
CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000
|
||||
@ -279088,7 +279104,7 @@ CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd
|
||||
CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000
|
||||
CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000
|
||||
CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000
|
||||
CVE-2025-1094,0,1,1f35385685029241a25445869883c4349971e28c47ea61140019459a47b4eb93,2025-02-13T22:15:11.300000
|
||||
CVE-2025-1094,0,0,1f35385685029241a25445869883c4349971e28c47ea61140019459a47b4eb93,2025-02-13T22:15:11.300000
|
||||
CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000
|
||||
CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000
|
||||
CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000
|
||||
@ -279190,7 +279206,7 @@ CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b7
|
||||
CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000
|
||||
CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1283,1,1,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000
|
||||
CVE-2025-1283,0,0,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
|
||||
@ -279231,7 +279247,7 @@ CVE-2025-20185,0,0,491fde53e83dcec798e13e2d9a67fb94569c05a8d72f92415306e757631fd
|
||||
CVE-2025-20204,0,0,ff147e6ad933304bf983a313f5a9204649ab468e5d74d3bafd7e71cfd1556e46,2025-02-05T17:15:26.077000
|
||||
CVE-2025-20205,0,0,1b69fdf9f7e74393787a2750d8687a735cb03e08811413756b75aeaf71635da5,2025-02-05T17:15:26.243000
|
||||
CVE-2025-20207,0,0,a5546524bd462a4b1c071578f9c02045541f6e2568f015c12b4f48db03f810aa,2025-02-05T17:15:26.410000
|
||||
CVE-2025-20615,1,1,6a75b2784e00d2f0092410fd2c8fee687111dbb32ed4616e80f66b6bfc8c4f66,2025-02-13T22:15:11.590000
|
||||
CVE-2025-20615,0,0,6a75b2784e00d2f0092410fd2c8fee687111dbb32ed4616e80f66b6bfc8c4f66,2025-02-13T22:15:11.590000
|
||||
CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000
|
||||
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
|
||||
CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000
|
||||
@ -280104,7 +280120,7 @@ CVE-2025-22880,0,0,cf4835bedc790305bfcac8a1a1a919d45f11f6a6f0ec4b92baca3d41dfc38
|
||||
CVE-2025-22890,0,0,db1d7eabf24b7e7d8b1b42d9869917c9793a935b6519f68f4ac1886abeb24e6f,2025-02-06T07:15:17.113000
|
||||
CVE-2025-22891,0,0,b6f8f5a3cdd97b175e2aad8e0e81733236d6c7ca889113c44c583bb0210e6ae2,2025-02-05T18:15:31.190000
|
||||
CVE-2025-22894,0,0,ac034cee2489b93651779dfcdd1d9a53e653fd8ed132b5fec5e2ed1fcc8856c1,2025-02-06T08:15:30.027000
|
||||
CVE-2025-22896,1,1,be4a55f33e527166c5f10efba2723b4fac6834eff35e9f31b028132ab4b137e8,2025-02-13T22:15:11.737000
|
||||
CVE-2025-22896,0,0,be4a55f33e527166c5f10efba2723b4fac6834eff35e9f31b028132ab4b137e8,2025-02-13T22:15:11.737000
|
||||
CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000
|
||||
CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000
|
||||
CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000
|
||||
@ -280118,6 +280134,9 @@ CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
|
||||
CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000
|
||||
CVE-2025-22960,1,1,909fd4543561b179cf19e362db8b8b06eacc11dd2ff530093e36ef46d4e67f11,2025-02-13T23:15:10.960000
|
||||
CVE-2025-22961,1,1,977c2fe378865dcb0b1e64b0c10fc2188b8a7bb82cfb2af8a0d422ceddc01711,2025-02-13T23:15:11.047000
|
||||
CVE-2025-22962,1,1,11cacc28ac51a133f30d8f5be6b02eda0da61cb7393367b6128a68160ae95816,2025-02-13T23:15:11.140000
|
||||
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
|
||||
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000
|
||||
@ -280249,12 +280268,12 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a
|
||||
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
|
||||
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
|
||||
CVE-2025-23403,0,0,6d407c3e99373ae4903bfa5d6d7fa08d06d40485486c2ac644fbc1bd23d41148,2025-02-11T11:15:16.420000
|
||||
CVE-2025-23411,1,1,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000
|
||||
CVE-2025-23411,0,0,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000
|
||||
CVE-2025-23412,0,0,ff772db46e84a8229b30da8226c3ba3ad9fc7920b08b4af19acab47bd1c2d2d6,2025-02-05T18:15:31.580000
|
||||
CVE-2025-23413,0,0,0d307b1166a05846ecd25a2b94e745105afb47dc17ea7dedca05f511b414c7de,2025-02-05T18:15:31.930000
|
||||
CVE-2025-23415,0,0,4c0256f2397ff6f22f96f8778d52ee55813f2a1944a2056311990c8aab282c58,2025-02-05T18:15:32.573000
|
||||
CVE-2025-23419,0,0,9931bce39336c9647788aebceaf6072233b0cffc8035c7bc13a0c7205e0176f9,2025-02-05T20:15:45.717000
|
||||
CVE-2025-23421,1,1,31d9e0bf02f259a27176eee791d237316c18e99df700a64323c30ab77b514d24,2025-02-13T22:15:12.073000
|
||||
CVE-2025-23421,0,0,31d9e0bf02f259a27176eee791d237316c18e99df700a64323c30ab77b514d24,2025-02-13T22:15:12.073000
|
||||
CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000
|
||||
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
|
||||
CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000
|
||||
@ -281039,12 +281058,12 @@ CVE-2025-24828,0,0,d6c7252c68dc48223ad23e8fe02a63238ede39167f9cb9fd8d861384db181
|
||||
CVE-2025-24829,0,0,ca820c15f81c2d9533d0e35b5e9ae251c4458d25ef994b8ce2c2028dfde11883,2025-01-31T16:15:36.170000
|
||||
CVE-2025-24830,0,0,e5e3ddd057bd01ca95f7c00a7286edb5ae4fbf2a7516a5daaf16a92524651ed9,2025-01-31T16:15:36.327000
|
||||
CVE-2025-24831,0,0,76c0f53ba7a5b958c42589ba4ec89e6cdb3f20971cbf64204b6a1a874d34c8a2,2025-01-31T16:15:36.487000
|
||||
CVE-2025-24836,1,1,7d6640e53d488e4a8518eb9a7696c5007d9b1a60158b80a832071b3c2565c39b,2025-02-13T22:15:12.270000
|
||||
CVE-2025-24836,0,0,7d6640e53d488e4a8518eb9a7696c5007d9b1a60158b80a832071b3c2565c39b,2025-02-13T22:15:12.270000
|
||||
CVE-2025-24845,0,0,c191a19dd89d489cf004f2053d6318da393b69a73424e805527f0cb35d2f088a,2025-02-06T08:15:30.673000
|
||||
CVE-2025-24858,0,0,3b82f7da2305463da0ac5aea20b0458ff46f3b144923110e5153f9a34733f4c3,2025-01-26T07:15:09.237000
|
||||
CVE-2025-24860,0,0,42b3b38d6d024182d8b5dc0fc36a681aa7d4abf967f4c7b6aca3952d970e3eba,2025-02-06T20:15:41.030000
|
||||
CVE-2025-24861,1,1,12379dfddeeb91a24bd31cefa119eb737ed33ae5f489ea9055a6373e1ed282bf,2025-02-13T22:15:12.457000
|
||||
CVE-2025-24865,1,1,7664de25ca85bc77d9188866eb96c66df0fda1d700c24f6808889946717d1511,2025-02-13T22:15:12.613000
|
||||
CVE-2025-24861,0,0,12379dfddeeb91a24bd31cefa119eb737ed33ae5f489ea9055a6373e1ed282bf,2025-02-13T22:15:12.457000
|
||||
CVE-2025-24865,0,0,7664de25ca85bc77d9188866eb96c66df0fda1d700c24f6808889946717d1511,2025-02-13T22:15:12.613000
|
||||
CVE-2025-24867,0,0,c4fd6e246160d29aa382cef3499dbaf6fc81e12e3c74418ac63da8711ee9ec32,2025-02-11T01:15:10.847000
|
||||
CVE-2025-24868,0,0,8ee24a9a34fad703f89f3defa2904d51acc20ad10ef817b45da7bfa8a7f5e321,2025-02-11T01:15:10.990000
|
||||
CVE-2025-24869,0,0,b6cd80e5bae1c894e0e6b555b0b2146ceab5fc28716a5af55b9f3bc5b2028f1e,2025-02-11T06:15:22.913000
|
||||
@ -281098,8 +281117,8 @@ CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485df
|
||||
CVE-2025-25064,0,0,6dceec11fd59119aed7d408b3f6402c7bd962bb609f5c09b6f193840bd49f8e7,2025-02-06T20:15:41.190000
|
||||
CVE-2025-25065,0,0,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000
|
||||
CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000
|
||||
CVE-2025-25067,1,1,48635577f720f65b54e59fdfccc15d6041cb2f427d01df6df84ce3f8ccecae2e,2025-02-13T22:15:12.780000
|
||||
CVE-2025-25069,0,1,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000
|
||||
CVE-2025-25067,0,0,48635577f720f65b54e59fdfccc15d6041cb2f427d01df6df84ce3f8ccecae2e,2025-02-13T22:15:12.780000
|
||||
CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000
|
||||
CVE-2025-25071,0,0,213b8fc33b3d471865d580a8fd827347f8efe6be1aa881cce0010783c682aa92,2025-02-07T10:15:11.840000
|
||||
CVE-2025-25072,0,0,02b74129718b0754e0f05cc9644f74acaf0742f3dcba59563afca00f32b5a1da,2025-02-07T10:15:12.023000
|
||||
CVE-2025-25073,0,0,848202a502252b3ee0d62d6fc1336dd4e0a1f103511c0d674c97b7dcb10ddc3d,2025-02-07T10:15:12.197000
|
||||
@ -281172,7 +281191,7 @@ CVE-2025-25189,0,0,d83847fe96d00072b7a8190c91ae5b2afdfef2e676164ac0785259c0f2731
|
||||
CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06ba52,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000
|
||||
CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25195,1,1,4eaa19fc37095ed0b6f6b72a1aad3914027d6a3ba6d1818c903f884ae192c5c8,2025-02-13T22:15:13.100000
|
||||
CVE-2025-25195,0,0,4eaa19fc37095ed0b6f6b72a1aad3914027d6a3ba6d1818c903f884ae192c5c8,2025-02-13T22:15:13.100000
|
||||
CVE-2025-25198,0,0,d4f423b8575a2b0e0c47d1cd874c15fb2da6a6a46ceaec62c0bfc272e6cf57b7,2025-02-12T18:15:27.757000
|
||||
CVE-2025-25199,0,0,55e40815cd021635d25d7610751f977ce7b772f67293cccb8c9a688735660385,2025-02-12T18:15:27.933000
|
||||
CVE-2025-25200,0,0,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1be52,2025-02-12T18:15:28.110000
|
||||
@ -281184,7 +281203,7 @@ CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb7
|
||||
CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000
|
||||
CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000
|
||||
CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000
|
||||
CVE-2025-25281,1,1,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24cfe4,2025-02-13T22:15:13.263000
|
||||
CVE-2025-25281,0,0,a94115e60627663bdcd98fb9e70426ac178c38adbb6a5330093c36633c24cfe4,2025-02-13T22:15:13.263000
|
||||
CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000
|
||||
CVE-2025-25286,0,0,d02a516e334a3f6a031f551547a6cf5db3f84dd4e0c98c8429bacf5acc75be44,2025-02-13T01:15:25.280000
|
||||
CVE-2025-25287,0,0,990f1bef848f5cb0ec832e1dc9fa9d35b18b0435a224d0f576726f1fa2e52a18,2025-02-13T16:16:49.187000
|
||||
@ -281262,14 +281281,14 @@ CVE-2025-26408,0,0,33b8ab1d964eed8374cf2895d0fb5039e22b031ca552fb49290499a2fa382
|
||||
CVE-2025-26409,0,0,ca13ca3a8e4796bfb9010cd7417af6b477b812c777fc3763439360034c7a9481,2025-02-11T15:15:21.537000
|
||||
CVE-2025-26410,0,0,7436cf38115e526a16ee35c34809d408cd39f53af45b718ca00b110673ee34d1,2025-02-11T15:15:21.700000
|
||||
CVE-2025-26411,0,0,9ef32a253b731b2ff18f782496eaf6c296b220e67d96855234ab4a5147a58482,2025-02-11T15:15:21.847000
|
||||
CVE-2025-26473,1,1,afdee1379c99d4f6b07907ea17580be8453e0aee18d47bd8de4ab55ed06e520b,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26473,0,0,afdee1379c99d4f6b07907ea17580be8453e0aee18d47bd8de4ab55ed06e520b,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b7b4921a5e7ebc8aa8e9b3ebfb385a49a963240b92f186756eca675a6c877147,2025-02-11T15:15:21.993000
|
||||
CVE-2025-26491,0,0,0e03bb492b5be045a20d72d7beaeb2d269957ba490b9886936bd524fd4160612,2025-02-11T15:15:22.100000
|
||||
CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e86b,2025-02-11T14:15:31.260000
|
||||
CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000
|
||||
CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000
|
||||
CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000
|
||||
CVE-2025-26511,0,0,3539874a9906ef1c6dcca91725c7051cb46878cc702ae6b254df1d60e3316495,2025-02-13T16:16:50.270000
|
||||
CVE-2025-26511,0,1,f60d5b8ed6462b3636b1bec6d86421fa2447443d87dddccbff41a72a635be633,2025-02-14T00:15:07.667000
|
||||
CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000
|
||||
CVE-2025-26538,0,0,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000
|
||||
CVE-2025-26539,0,0,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user