Auto-Update: 2025-02-24T23:00:29.175028+00:00

This commit is contained in:
cad-safe-bot 2025-02-24 23:03:57 +00:00
parent ae08ba54a7
commit dc646d78ad
9 changed files with 400 additions and 142 deletions

View File

@ -2,94 +2,15 @@
"id": "CVE-2024-13636",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T11:15:10.143",
"lastModified": "2025-02-21T15:21:17.950",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-24T22:15:11.277",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Brooklyn theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.9.2 via deserialization of untrusted input in the ot_decode function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
},
{
"lang": "es",
"value": "El tema de Brooklyn para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta 4.9.9.2 incluida, mediante la deserializaci\u00f3n de la entrada no confiable en la funci\u00f3n OT_Decode. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, inyecten un objeto PHP. No hay una cadena POP conocida en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale otro complemento o tema que contenga una cadena POP en el sitio. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el destino sistema, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo dependiendo de la cadena POP presente."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-24926. Reason: This candidate is a reservation duplicate of CVE-2024-24926. Notes: All CVE users should reference CVE-2024-24926 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unitedthemes:brooklyn:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.9.9.3",
"matchCriteriaId": "9EDE880E-D7F6-46EE-BD0C-9F674615A525"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/brooklyn-responsive-multipurpose-wordpress-theme/6221179",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://unitedthemes.com/changelog/",
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50cc3bd5-91ee-4b57-8159-60dd700375f3?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57608",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-24T22:15:22.157",
"lastModified": "2025-02-24T22:15:22.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Via Browser 6.1.0 allows a a remote attacker to execute arbitrary code via the mark.via.Shell component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Zkplo/AppVulHub/blob/main/mark.via.Shell/CWE-94.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25513",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-24T22:15:22.807",
"lastModified": "2025-02-24T22:15:22.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-26533",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-02-24T21:15:11.057",
"lastModified": "2025-02-24T21:15:11.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An SQL injection risk was identified in the module list filter within course search."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84271",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=466150",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2025-27137",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T21:15:11.213",
"lastModified": "2025-02-24T21:15:11.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Dependency-Track allows users with the `SYSTEM_CONFIGURATION` permission to customize notification templates. Templates are evaluated using the Pebble template engine. Pebble supports an `include` tag, which allows template authors to include the content of arbitrary files upon evaluation. Prior to version 4.12.6, users of Dependency-Track with the `SYSTEM_CONFIGURATION` permission can abuse the `include` tag by crafting notification templates that `include` sensitive local files, such as `/etc/passwd` or `/proc/1/environ`. By configuring such a template for a notification rule (aka \"Alert\"), and having it send notifications to a destination controlled by the actor, sensitive information may be leaked. The issue has been fixed in Dependency-Track 4.12.6. In fixed versions, the `include` tag can no longer be used. Usage of the tag will cause template evaluation to fail. As a workaround, avoid assigning the `SYSTEM_CONFIGURATION` permission to untrusted users. The `SYSTEM_CONFIGURATION` permission per default is only granted to members of the `Administrators` team. Assigning this permission to non-administrative users or teams is a security risk in itself, and highly discouraged."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://github.com/DependencyTrack/dependency-track/pull/4684",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/DependencyTrack/dependency-track/pull/4685",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-9582-88hr-54w3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-p75g-cxfj-7wrx",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PebbleTemplates/pebble/issues/680",
"source": "security-advisories@github.com"
},
{
"url": "https://pebbletemplates.io/wiki/tag/include",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-27140",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T22:15:22.913",
"lastModified": "2025-02-24T22:15:22.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-27141",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-24T22:15:23.077",
"lastModified": "2025-02-24T22:15:23.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Metabase Enterprise Edition is the enterprise version of Metabase business intelligence and data analytics software. Starting in version 1.47.0 and prior to versions 1.50.36, 1.51.14, 1.52.11, and 1.53.2 of Metabase Enterprise Edition, users with impersonation permissions may be able to see results of cached questions, even if their permissions don\u2019t allow them to see the data. If some user runs a question which gets cached, and then an impersonated user runs that question, then the impersonated user sees the same results as the previous user. These cached results may include data the impersonated user should not have access to. This vulnerability only impacts the Enterprise Edition of Metabase and not the Open Source Edition. Versions 1.53.2, 1.52.11, 1.51.14, and 1.50.36 contains a patch. Versions on the 1.49.X, 1.48.X, and 1.47.X branches are vulnerable but do not have a patch available, so users should upgrade to a major version with an available fix. Disabling question caching is a workaround for this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p",
"source": "security-advisories@github.com"
},
{
"url": "https://www.metabase.com/docs/latest/configuring-metabase/caching",
"source": "security-advisories@github.com"
},
{
"url": "https://www.metabase.com/docs/latest/permissions/impersonation",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-24T21:00:43.964845+00:00
2025-02-24T23:00:29.175028+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-24T20:15:34.180000+00:00
2025-02-24T22:15:23.077000+00:00
```
### Last Data Feed Release
@ -33,45 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
282222
282228
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `6`
- [CVE-2025-26525](CVE-2025/CVE-2025-265xx/CVE-2025-26525.json) (`2025-02-24T20:15:33.103`)
- [CVE-2025-26526](CVE-2025/CVE-2025-265xx/CVE-2025-26526.json) (`2025-02-24T20:15:33.263`)
- [CVE-2025-26527](CVE-2025/CVE-2025-265xx/CVE-2025-26527.json) (`2025-02-24T20:15:33.403`)
- [CVE-2025-26528](CVE-2025/CVE-2025-265xx/CVE-2025-26528.json) (`2025-02-24T20:15:33.543`)
- [CVE-2025-26529](CVE-2025/CVE-2025-265xx/CVE-2025-26529.json) (`2025-02-24T20:15:33.677`)
- [CVE-2025-26530](CVE-2025/CVE-2025-265xx/CVE-2025-26530.json) (`2025-02-24T20:15:33.807`)
- [CVE-2025-26531](CVE-2025/CVE-2025-265xx/CVE-2025-26531.json) (`2025-02-24T20:15:33.933`)
- [CVE-2025-26532](CVE-2025/CVE-2025-265xx/CVE-2025-26532.json) (`2025-02-24T20:15:34.053`)
- [CVE-2025-27112](CVE-2025/CVE-2025-271xx/CVE-2025-27112.json) (`2025-02-24T19:15:14.597`)
- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-24T19:15:14.763`)
- [CVE-2025-27364](CVE-2025/CVE-2025-273xx/CVE-2025-27364.json) (`2025-02-24T19:15:14.917`)
- [CVE-2024-57608](CVE-2024/CVE-2024-576xx/CVE-2024-57608.json) (`2025-02-24T22:15:22.157`)
- [CVE-2025-25513](CVE-2025/CVE-2025-255xx/CVE-2025-25513.json) (`2025-02-24T22:15:22.807`)
- [CVE-2025-26533](CVE-2025/CVE-2025-265xx/CVE-2025-26533.json) (`2025-02-24T21:15:11.057`)
- [CVE-2025-27137](CVE-2025/CVE-2025-271xx/CVE-2025-27137.json) (`2025-02-24T21:15:11.213`)
- [CVE-2025-27140](CVE-2025/CVE-2025-271xx/CVE-2025-27140.json) (`2025-02-24T22:15:22.913`)
- [CVE-2025-27141](CVE-2025/CVE-2025-271xx/CVE-2025-27141.json) (`2025-02-24T22:15:23.077`)
### CVEs modified in the last Commit
Recently modified CVEs: `15`
Recently modified CVEs: `1`
- [CVE-2018-25083](CVE-2018/CVE-2018-250xx/CVE-2018-25083.json) (`2025-02-24T20:15:31.150`)
- [CVE-2021-3923](CVE-2021/CVE-2021-39xx/CVE-2021-3923.json) (`2025-02-24T20:15:31.777`)
- [CVE-2022-2237](CVE-2022/CVE-2022-22xx/CVE-2022-2237.json) (`2025-02-24T20:15:31.973`)
- [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2025-02-24T19:15:12.707`)
- [CVE-2022-48348](CVE-2022/CVE-2022-483xx/CVE-2022-48348.json) (`2025-02-24T19:15:14.043`)
- [CVE-2022-48349](CVE-2022/CVE-2022-483xx/CVE-2022-48349.json) (`2025-02-24T19:15:14.227`)
- [CVE-2023-21044](CVE-2023/CVE-2023-210xx/CVE-2023-21044.json) (`2025-02-24T20:15:32.190`)
- [CVE-2023-21045](CVE-2023/CVE-2023-210xx/CVE-2023-21045.json) (`2025-02-24T20:15:32.380`)
- [CVE-2023-21048](CVE-2023/CVE-2023-210xx/CVE-2023-21048.json) (`2025-02-24T20:15:32.620`)
- [CVE-2024-10222](CVE-2024/CVE-2024-102xx/CVE-2024-10222.json) (`2025-02-24T19:43:57.037`)
- [CVE-2024-13775](CVE-2024/CVE-2024-137xx/CVE-2024-13775.json) (`2025-02-24T19:04:52.170`)
- [CVE-2024-45781](CVE-2024/CVE-2024-457xx/CVE-2024-45781.json) (`2025-02-24T19:15:14.423`)
- [CVE-2024-57160](CVE-2024/CVE-2024-571xx/CVE-2024-57160.json) (`2025-02-24T19:38:22.867`)
- [CVE-2024-57161](CVE-2024/CVE-2024-571xx/CVE-2024-57161.json) (`2025-02-24T19:38:43.083`)
- [CVE-2025-1489](CVE-2025/CVE-2025-14xx/CVE-2025-1489.json) (`2025-02-24T19:45:21.653`)
- [CVE-2024-13636](CVE-2024/CVE-2024-136xx/CVE-2024-13636.json) (`2025-02-24T22:15:11.277`)
## Download and Usage

View File

@ -121411,7 +121411,7 @@ CVE-2018-25079,0,0,48685ce9847add0e1ab9b8fceec97ce7a120ddb8b1b4b09c009c856d198e6
CVE-2018-25080,0,0,6c04fa6da42f79e635cc0cfe6f9f34c19609115b31e939d312cadffd27491508,2024-11-21T04:03:30.707000
CVE-2018-25081,0,0,4806ebac23e887becfaf51184ce6d12d8c88b37f8b3dfc1b14c300e4e20c2294,2024-11-21T04:03:30.847000
CVE-2018-25082,0,0,d7307469bd8b245316599e3552df8df9a48e8e1e76dbf66ac43e7bcba9fe864c,2024-11-21T04:03:31.080000
CVE-2018-25083,0,1,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000
CVE-2018-25083,0,0,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000
CVE-2018-25084,0,0,9c184f17da7aafecde9ed5052529315a36ee449d7077376af8b33a2cbd5d6c43,2024-11-21T04:03:31.363000
CVE-2018-25085,0,0,73bfea48ffd0c9cdf4c809f671883689556215e478ba2335dea12376d92bdc92,2024-11-21T04:03:31.500000
CVE-2018-25086,0,0,b66fd9bd4e9ee72936a4458a94a97d90fafb9ae16612a4f6f711df55e0868a80,2024-11-21T04:03:31.630000
@ -181593,7 +181593,7 @@ CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
CVE-2021-3923,0,1,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000
CVE-2021-3923,0,0,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000
CVE-2021-39230,0,0,a1ff4462fdf7e73cfc9f905531f8050df43fde4ffa355fe087d4f58aa28b9f70,2024-11-21T06:18:57.887000
CVE-2021-39231,0,0,69ac8f30e5ab6fd510e2644b69e1647296deefa37af2bf4373d60b90a662deae,2024-11-21T06:18:58.047000
CVE-2021-39232,0,0,46dca2479f21c28a81ec3dbdc29193e04bd5bd93ca4c70f295f263619234968f,2024-11-21T06:18:58.203000
@ -192084,7 +192084,7 @@ CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39ca
CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000
CVE-2022-22368,0,0,4575f523f8115fcbc6bf4fcce9d55648189bfb8804149d364401ff13b317f534,2024-11-21T06:46:42.703000
CVE-2022-22369,0,0,57d094f830c9aade14309e978b8c909e905f3069a575a6823563de9c6cc548bf,2024-11-21T06:46:42.820000
CVE-2022-2237,0,1,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000
CVE-2022-2237,0,0,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000
CVE-2022-22370,0,0,67d4116112ef932abd2bd63b802bb14e3f709993807fc0144ff90914519a656f,2024-11-21T06:46:42.937000
CVE-2022-22371,0,0,3c0ad31752e89144bb37a83b9d144a252c96c6ec5b4551862b225a581279dc8a,2024-11-21T06:46:43.060000
CVE-2022-22373,0,0,75763a7cca7f104d29029f2448a59f86f6607bf8aa5b41517082c08af9f29e22,2024-11-21T06:46:43.190000
@ -199498,7 +199498,7 @@ CVE-2022-31156,0,0,2eaf51f38380072e6df6598bc8ce64fdddae7651edad8425e219157401a34
CVE-2022-31157,0,0,f97dabe995205a4290cb284ef75e2678e935f9593f36e46051a4473bd3747780,2024-11-21T07:04:01.233000
CVE-2022-31158,0,0,d0bb5395bc1894916b6f96263e1c2b4f3801271bb0dc425949da7198d4395245,2024-11-21T07:04:01.367000
CVE-2022-31159,0,0,73592c7c0c7382416e092a874c18103dd659c120906594ad5be3f95252b49a45,2024-11-21T07:04:01.497000
CVE-2022-3116,0,1,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000
CVE-2022-3116,0,0,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000
CVE-2022-31160,0,0,3f3c950e160a4c2913d6e10c3f9e06df49d400b943dc94f33bbeae200029c88e,2024-11-21T07:04:01.617000
CVE-2022-31161,0,0,50f1400bdf87989a0c6d37c9cf60d06f1c39bde3cac5984099d4324714a40142,2024-11-21T07:04:01.790000
CVE-2022-31162,0,0,60ece6ef2e20ad2436826f672bc8ae1cdedb95d111b3216c989d89e826d75bb6,2024-11-21T07:04:01.930000
@ -212452,8 +212452,8 @@ CVE-2022-48344,0,0,99cfe32832587baf5d1527923c94101a148d12b13e3382d19bbf5f4f88a41
CVE-2022-48345,0,0,c43bfd3ba9d46379c49b9847b6f17f16ace8072a4eee27968587d44b52b60457,2024-11-21T07:33:13.103000
CVE-2022-48346,0,0,e9a6fca484067f694b4295c67382bb27add976e780c49b7a6de551ef92454947,2025-02-19T19:15:11.730000
CVE-2022-48347,0,0,2a2a2e7682966e3b51f22fc18957ee285c28256a87b17e92c00e8dd8185e131a,2025-02-19T19:15:11.850000
CVE-2022-48348,0,1,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000
CVE-2022-48349,0,1,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000
CVE-2022-48348,0,0,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000
CVE-2022-48349,0,0,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000
CVE-2022-4835,0,0,0342ae1f95dc8d2e957e0430756d0a4236a488c4c4e1a010bf206123dd786fcd,2024-11-21T07:36:02.473000
CVE-2022-48350,0,0,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000
CVE-2022-48351,0,0,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000
@ -215941,11 +215941,11 @@ CVE-2023-21040,0,0,c774c5983f36a821f7c5e24674b2f104bfce612ef836674ee849ac3705d7a
CVE-2023-21041,0,0,6a99a6b0541876b22115214a822814538877e83cbef9875bd54521daf0d2d9cb,2024-11-21T07:42:03.070000
CVE-2023-21042,0,0,92ab35321b2fd324542efae6d2f60a172590991a879dc4bde56d7ee1e48c0b18,2025-02-19T22:15:11.810000
CVE-2023-21043,0,0,4cf28ca85bcbd27b9227b2573af8a0495fc89cd1fdcf1c2734276d761401f69f,2024-11-21T07:42:03.320000
CVE-2023-21044,0,1,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000
CVE-2023-21045,0,1,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000
CVE-2023-21044,0,0,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000
CVE-2023-21045,0,0,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000
CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053229,2024-11-21T07:42:03.653000
CVE-2023-21047,0,0,a8d476de5c22475a663a6cd0b7905a4e2678b820fc08e9b5926d525d5d6554e1,2025-02-24T15:15:11.890000
CVE-2023-21048,0,1,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000
CVE-2023-21048,0,0,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000
CVE-2023-21049,0,0,bb73e93fe402a1a1fd3c7954e241829b82101223330bf83d184d14f361624b5f,2025-02-21T21:15:12.563000
CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000
CVE-2023-21050,0,0,c97a15ee08f147244a1178bb0faf4b2c275cbb0d598a4d3e22fffa17b5a3621d,2025-02-21T22:15:11.040000
@ -243715,7 +243715,7 @@ CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0
CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000
CVE-2024-1022,0,0,2538d56f6669aecae5f12904278656fbaaa9fa83dd2447751caf0dde04c23b1f,2024-11-21T08:49:37.160000
CVE-2024-10220,0,0,0717049f6d4c212a875763951e37b8f3da2918e18cb00732d9d60eff6c4a140d,2024-11-22T17:15:06.650000
CVE-2024-10222,0,1,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000
CVE-2024-10222,0,0,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000
CVE-2024-10223,0,0,5f5e151c95f5ef79d0a7fc297e9a009a73a481f63f2b3ce4a2e96835fd5bc43d,2024-11-01T12:57:03.417000
CVE-2024-10224,0,0,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
CVE-2024-10226,0,0,90902af4bb0025c8b4afcf3dd7a0c8ab645b3d8bdbe2f31e8aac22ff12a9d686,2024-10-31T16:48:41.553000
@ -246791,7 +246791,7 @@ CVE-2024-13625,0,0,556dbc652a367567d8dc0a1aca4ef96fa3721288585ae7ce8b84a84c5a8c1
CVE-2024-13626,0,0,5f376c892890a386d15b17c9d9f7768803772784cb9f45a9f61e63e74ea1223e,2025-02-19T22:15:22.753000
CVE-2024-13627,0,0,faf1d9bd245281ef1f9edc55f8aca71639e95b5ef38efdbbf353c5fc7ae2924c,2025-02-19T19:15:14.720000
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-13636,0,0,8f7090f3cee37c858f7afaf2983a2cabcdc65da940d26a01a270d2b24bb2e042,2025-02-21T15:21:17.950000
CVE-2024-13636,0,1,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000
CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13641,0,0,cd1890f30f24c13413424555c34b5a8741240269cfb8c1f67ec9e1b8c16fa87b,2025-02-14T06:15:19.957000
@ -246886,7 +246886,7 @@ CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15de
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
CVE-2024-13775,0,1,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
CVE-2024-13789,0,0,7e93b6d08cc6df1b6bc2f867c0f4be1ee78646a7a043ad72e374fd176f679c40,2025-02-20T10:15:10.637000
@ -267361,7 +267361,7 @@ CVE-2024-45775,0,0,dc9934913719b7ba371689f85d372f27a1c5a62c61667ba391c7f8d330af4
CVE-2024-45776,0,0,7a04b7c7af22da1288ed82b6f5b30f15805ed4d914e4fc273482119cb2625695,2025-02-18T20:15:19.313000
CVE-2024-45777,0,0,bcd0bab214a719b58ddcd730a7be37124827cbe868fcd457da07097e9b2f3848,2025-02-19T18:15:23.210000
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
CVE-2024-45781,0,1,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
CVE-2024-45783,0,0,e4aa133b1a4c5368c5e922eb069f3b52cda2e750027d303f7902e92d25e80622,2025-02-18T20:15:19.560000
CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000
CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000
@ -274846,8 +274846,8 @@ CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef975,2025-02-03T19:15:12.880000
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
CVE-2024-57160,0,1,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
CVE-2024-57161,0,1,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
@ -275011,6 +275011,7 @@ CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04
CVE-2024-57604,0,0,543c5b4910b41c72e908210bd3581236fe15916a3051d75b0cb98013a23bf9f9,2025-02-18T18:15:27.827000
CVE-2024-57605,0,0,7963b6f1477133cb94cbd1a3b1ada130c7fa95a02e2999810ff3a185f251a2ce,2025-02-18T18:15:27.983000
CVE-2024-57606,0,0,282e31e88d82eac2f58eed0179e45942a66af52f2bd7847e92a7866919540d55,2025-02-18T19:15:22.280000
CVE-2024-57608,1,1,4db4a039024361010a94538fd2696a2c6c6a3deeb62e035387a43fb1117798b9,2025-02-24T22:15:22.157000
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
CVE-2024-57610,0,0,fb8a513d5a0e34ee3275d17e53b163d875527cc466c4bde851405005eb787883,2025-02-07T16:15:38.303000
@ -279696,7 +279697,7 @@ CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c
CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000
CVE-2025-1483,0,0,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000
CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000
CVE-2025-1489,0,1,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000
CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000
CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000
@ -281917,6 +281918,7 @@ CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb
CVE-2025-25505,0,0,c69812bbe3b275d3bc181fb00a5a8c8f1f26c31684ed982db7260503469e7b3d,2025-02-21T21:15:23.723000
CVE-2025-25507,0,0,de0377abf29412c164b8ddbcc15e82dfdb0b23020e12eca7c6e04a6e73ed3fd7,2025-02-21T21:15:23.870000
CVE-2025-25510,0,0,4997c3387297db121e4e9c1042fc244ebe3429ef8058fdf6dffa5196020cd974,2025-02-21T21:15:24.023000
CVE-2025-25513,1,1,e1943590b94885dd95437dc0873156668d062e8b298f484c30409dc6927e7d11,2025-02-24T22:15:22.807000
CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000
CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000
CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000
@ -282062,14 +282064,15 @@ CVE-2025-26520,0,0,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae
CVE-2025-26522,0,0,81134038c496481bfa5c560aae63c4f4621e7f68899375180dc3955b52ec6e4d,2025-02-14T12:15:29.583000
CVE-2025-26523,0,0,cd12665da062e93af2c690c3b3ac969d692dcb2b834904fb031d67807c219377,2025-02-14T12:15:29.723000
CVE-2025-26524,0,0,bd7001926462f269d35a46f341242eea9f256eba3c891acb3af12e0119a6db89,2025-02-14T12:15:29.887000
CVE-2025-26525,1,1,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000
CVE-2025-26526,1,1,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000
CVE-2025-26527,1,1,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000
CVE-2025-26528,1,1,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000
CVE-2025-26529,1,1,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000
CVE-2025-26530,1,1,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000
CVE-2025-26531,1,1,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000
CVE-2025-26532,1,1,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000
CVE-2025-26525,0,0,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000
CVE-2025-26526,0,0,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000
CVE-2025-26527,0,0,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000
CVE-2025-26528,0,0,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000
CVE-2025-26529,0,0,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000
CVE-2025-26530,0,0,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000
CVE-2025-26531,0,0,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000
CVE-2025-26532,0,0,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000
CVE-2025-26533,1,1,2e8a56b149dbe20ccfc4e827ae1bcb7f473041b99ea11c02d4ecd8f4b9b62686,2025-02-24T21:15:11.057000
CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000
CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000
CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000
@ -282166,9 +282169,12 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
CVE-2025-27112,1,1,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000
CVE-2025-27112,0,0,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000
CVE-2025-27113,0,0,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000
CVE-2025-27133,1,1,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
CVE-2025-27137,1,1,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
CVE-2025-27140,1,1,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
CVE-2025-27141,1,1,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000
@ -282220,4 +282226,4 @@ CVE-2025-27353,0,0,e9330e465bd2b224e768917457bf183dd9e6e3a03d6a86b1c73c647172eb9
CVE-2025-27355,0,0,66e7c6f2a2b25e7dd96aabb373de405f0d7238e697b5f6eca301307be69d4dd5,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d5028c9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000
CVE-2025-27364,1,1,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000

Can't render this file because it is too large.